By David Bombal | in Online Courses
Learn Wireshark practically. Wireshark pcapng files provided so you can practice while you learn! The course is very practical. You can practice while you learn! Learn how to analyze and interpret network protocols and leverage Wireshark for what it was originally intended: Deep Packet Inspection and network analysis. This course will show you have to hack network protocols using Kali Linux! Hack network protocols like DTP, VTP, STP, and DHCP using Ethical hacking tools included in Kali Linux.
Important Details
Requirements
By David Bombal | in Online Courses
Networks are all around us and you are using one right now to access this course. The Internet is extremely important in modern life today and this reliance is only predicted to continue with the growth of the Internet of Things (IoT) in the next few years. This course will teach you how networks actually work and how you are able to connect to websites like Facebook, Google, and YouTube. Companies throughout the world (from the smallest to the largest) rely on networks designed, installed, and maintained by networking engineers. Aside from the practical knowledge, this course preps you for the newest CCNA 200-301 exam. This is your first step towards attaining your Cisco certifications.
Important Details
Requirements
By Gabriel Avramescu | in Online Courses
Most of the data are now accessed via web applications, mobile, and APIs. As of today, more than 75% of the attacks are in the wild target web. Bug bounty is also focused more on web since the apps are more prone to security bugs compared with an infrastructure device. This training is based on a practical approach to day-by-day situations and it contains labs based on real environments. For the labs, target virtual machines are provided. The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. This course covers both theoretical and practical aspects and contains hands-on labs about hacking systems, networks, wireless, mobile, and websites.
Important Details
Requirements
By Gabriel Avramescu | in Online Courses
Lots of people are focusing on web security, but they many don't have enough knowledge to find and exploit vulnerabilities when it comes to infrastructure. Since bug bounty is a competition, every additional knowledge helps. This training is based on a practical approach to day-by-day situations and it contains labs based on real environments. For the labs, target virtual machines are provided. This course covers both theoretical and practical aspects and contains hands-on labs about hacking systems, networks, wireless, mobile, and websites.
Important Details
Requirements
By Juan Galvan | in Online Courses
This practical, hands-on course was created for newbies – that's to say, people with no prior training or knowledge in hacking and cybersecurity. The aim of this course is to give you the education not just to understand what black-hat hatters do and how, but also to learn exactly how to hack systems like a pro and win the cat and mouse game by securing systems like a professional security expert. This approach gives you the foundational education that you need not just to hack any given system, but also to secure it, with each module covering both sides of the coin.
Important Details
Requirements
By Oak Academy | in Online Courses
To be able to perform successful penetration testing or ethical hacking. First, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding with an ethical hacking operation. In this course, you`ll discover the secrets of ethical hacking and network discovery using Nmap. You’ll learn all the Nmap details, which is the most known and de facto network scanning tool. Then in further lessons, you’ll scan the vulnerabilities of the network you discovered by using Nessus. Nessus is the most known vulnerability scanner and is in the third place of the most popular cybersecurity tools.
Important Details
Requirements
By Total Seminars | in Online Courses
The CompTIA Network+ Certification is a trusted mid-level certification for network technicians. Network+ professionals possess well-grounded knowledge and skills in troubleshooting, configuring, and managing networks. With 21 hours of instruction, this course aims to make you a good Network Tech and, in the process, make sure you are ready to pass the CompTIA exam.
Important Details
Requirements
By Total Seminars | in Online Courses
This course covers everything you need to know to pass your CompTIA Security+ (SY0-601) certification exam. With over 17 hours of in-depth and fascinating content and 125 video lectures, this course will not only make you a good IT security tech but make sure you are ready to pass the CompTIA Security+ exam. Your new skills and the CompTIA Security+ Cert will help you land a great IT security tech job or, get that raise or advancement you are after.
Important Details
Requirements
By ZENVA | in Online Courses
This course will guide you through creating a fully-functional and smart security camera, using a Raspberry Pi or the webcam on your device. The purpose of the application in this course is to detect movement in the video footage and subsequently execute an action, such as sending out an email or an SMS. Sections covering both the theory and practical applications are included in this course. The theory videos demonstrate the building blocks so that you can understand how it all works. Topics taught in this course include summation notation, image similarity metrics, and video processing. Image similarity is a set of tools that we can use to compare images, which then helps us determine how similar they are.
Important Details
Requirements