Jump to content

majed19845

Members
  • Content Count

    0
  • Joined

  • Last visited

Community Reputation

61 Excellent

About majed19845

  • Rank
    Newbie
  1. hope someone can share the Investigation Theory course [Hidden Content] Thank you
  2. amazing! do you have the Bro scripting course?
  3. or if we can get a triel version, it will be great
  4. Thank you very much,do you have a demo iso? Thanks
  5. if you want it for just parsing, I recommend you to use ElasticSearch, and they have a good combinations of tools logstash - to collect and parse the logs elasticsearch to search and query the data kibana - to visualize the data and its for free, open source
  6. CWAD - Cross-site Scripting This course is part of the Cyber Security Web Application Defender Certificate which teaches students Teach students how to identify, verify, exploit, remediate and report web-based vulnerabilities in an automated and educated way Cross-Site Scripting (XSS) is a vulnerability to inject client-side scripts into web pages Kali 101 Kali is a penetration testing Linux distribution created by the Offensive Security. It holds a repository of multiple tools for security related engineers including hacking wireless networks, web applications, databases, reverse engineering, password crackers, and much more! So as you can see, Kali is a versatile and powerful tool for anyone looking to do any cyber security related work. As indicated by the '101' in the course title, this course is a beginner's guide to getting started in Kali.to get your feet wet. The course is broken down into 3 sections; Getting started, Basic Configuration, and Tools overview. We first give you an overview of Kali and its use cases then offer a step-by-step walkthrough of installing Kali using VMware. Next we teach you some important configuration settings in the distribution including configuring your network and managing services in Kali. Knowing these procedures will help you setup the proper environments when using Kali and its tools. Finally we go over the top tools in Kali and describe their features. By the end of this course you will be able to have a fully functioning distribution Kali running on your machine. You will also have an understanding of the Linux environment and how to manage network and system services. Lastly you will have a basic overview of the top tools available in Kali. [hide] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  7. Certified Ethical Hacker Bootcamp In this course you will learn key issues plaguing the information security world, incident management process, and penetration testing. [hide] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  8. Thanks a lot can u please share more courses, like: Cyber Security Advanced Persistent Threat Defender
  9. Hii Any one please can share the [Pentester academy] Powershell for Pentesters, it will be really helpful Thanks!
  10. Big Thanks! but please reupload them, and thanks in advance!
  11. Hello, Plz i need this course : x86 Assembly Language and Shellcoding on Linux plz anyone have it, share it with us, and thanks in advance [Hidden Content]
  12. really this is amazing course and i appreciate your help my friend, and i am waiting the other modules
  13. i see that it's differnet from the course that in udemy.com, so please upload the other modules specially module 3
×
×
  • Create New...