Jump to content


  • Content Count

  • Joined

  • Last visited

Community Reputation

82 Excellent

About majed19845

  • Rank

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. can you please reupload the courses ...
  2. its down again can someone please reup
  3. can you please upload it again ...
  4. if you can update the link please
  5. can you please re-upload it
  6. hope someone can share the Investigation Theory course [Hidden Content] Thank you
  7. amazing! do you have the Bro scripting course?
  8. or if we can get a triel version, it will be great
  9. Thank you very much,do you have a demo iso? Thanks
  10. if you want it for just parsing, I recommend you to use ElasticSearch, and they have a good combinations of tools logstash - to collect and parse the logs elasticsearch to search and query the data kibana - to visualize the data and its for free, open source
  11. CWAD - Cross-site Scripting This course is part of the Cyber Security Web Application Defender Certificate which teaches students Teach students how to identify, verify, exploit, remediate and report web-based vulnerabilities in an automated and educated way Cross-Site Scripting (XSS) is a vulnerability to inject client-side scripts into web pages Kali 101 Kali is a penetration testing Linux distribution created by the Offensive Security. It holds a repository of multiple tools for security related engineers including hacking wireless networks, web applications, databases, reverse engineering, password crackers, and much more! So as you can see, Kali is a versatile and powerful tool for anyone looking to do any cyber security related work. As indicated by the '101' in the course title, this course is a beginner's guide to getting started in Kali.to get your feet wet. The course is broken down into 3 sections; Getting started, Basic Configuration, and Tools overview. We first give you an overview of Kali and its use cases then offer a step-by-step walkthrough of installing Kali using VMware. Next we teach you some important configuration settings in the distribution including configuring your network and managing services in Kali. Knowing these procedures will help you setup the proper environments when using Kali and its tools. Finally we go over the top tools in Kali and describe their features. By the end of this course you will be able to have a fully functioning distribution Kali running on your machine. You will also have an understanding of the Linux environment and how to manage network and system services. Lastly you will have a basic overview of the top tools available in Kali. [hide] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  12. Certified Ethical Hacker Bootcamp In this course you will learn key issues plaguing the information security world, incident management process, and penetration testing. [hide] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  13. Thanks a lot can u please share more courses, like: Cyber Security Advanced Persistent Threat Defender
  14. Hii Any one please can share the [Pentester academy] Powershell for Pentesters, it will be really helpful Thanks!
  • Create New...