![[NEW] FREE UDEMY COURSES 100% OFF COUPON](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEhO1_CkqKq7G97vDyQkRNtA9UGbfY3-wvtrf04sI29k-QpIZnfc4agvpDcKRYke8aXyy59FhKXhNgNkC-Qj4dpZYePIjUiZCNv1CHPsCMU7KApja9jBBn2SatgFqANrYtZrhyQn08EbA/w581-h325/t%25C3%25A9l%25C3%25A9chargement5.png)
[LIMITED PERIOD] FREE UDEMY COURSES 100% OFF COUPONS
Description
what we learn
- Kali Linux
- parrot os
- cyber threats
- basics of cyber security
- basics of cryptography
- History of Ethical Hacking
- Penetration Testing
- Footprinting
- using DNS to get more information
- TCP/IP
- wireshark
- DHCP
- Types of cryptography
- Cryptography Hashing
- TLS & SSL
- Disk encryption
- IDS Evasion
- Scanning
- Fundamentals Of Networking
- launch Kali Linux on WINDOWS Using vmware
- launch Kali Linux on MAC Using Virtual Box
- Installing Kali Tools On Linux Distribution
- Parrot OS detail
- Parrot Operating System
- Kali Linux v/s Parrot OS
- Penetration Testing
- Nmap
- Cross-site Scripting
- DDOS Attack
- SQL Injection
- SQL Injection Attack
- Stegnography
- LSB Stegnography
- Ethical Hacking Roadmap
- Interview questions
No comments:
Post a Comment