
Learn Ethical Hacking from zero to hero
Deal Score0
Deal Score0
Learn Ethical Hacking from zero to hero
here we learn about everything about Ethical Hacking like WIRESHARK, SQL INJECTION, ENCRYPTION, NMAP, FOOTPRINTING & Many More
What you’ll learn
- Ethical Hacking
- Security
Requirements
- Be able to contact me
Description
what we learn
- Kali Linux
- parrot os
- cyber threats
- basics of cyber security
- basics of cryptography
- History of Ethical Hacking
- Penetration Testing
- Footprinting
- using DNS to get more information
- TCP/IP
- wireshark
- DHCP
- Types of cryptography
- Cryptography Hashing
- TLS & SSL
- Disk encryption
- IDS Evasion
- Scanning
- Fundamentals Of Networking
- launch Kali Linux on WINDOWS Using vmware
- launch Kali Linux on MAC Using Virtual Box
- Installing Kali Tools On Linux Distribution
- Parrot OS detail
- Parrot Operating System
- Kali Linux v/s Parrot OS
- Penetration Testing
- Nmap
- Cross-site Scripting
- DDOS Attack
- SQL Injection
- SQL Injection Attack
- Stegnography
- LSB Stegnography
- Ethical Hacking Roadmap
- Interview questions
Who this course is for:
- computer science
- ethical hacker
- beginner to pro level ethical hacking