Courses

We found 26 courses available for you
See
-90%

The Session Hijacking Course

5 Lessons
All Levels

Would you like to learn how to perform session hijacking …

What you'll learn
Session hijacking fundamentals
Becoming man in the middle with Kali Linux
Sniffing with Bettercap and Kali Linux
Basics of Burp with Kali Linux
Session hijacking with Kali Linux
-86%

The Hacking Web Applications Course

23 Lessons
All Levels

Would you like to learn how to hack web applications …

What you'll learn
Web application hacking fundamentals
HTML injection with Kali Linux
Basics of burp and requests with Kali Linux
Iframe injection with Kali Linux
Remote commands injection with Kali Linux
PHP arbitrary code injection with Kali Linux
Broken authentication
and much more…
-89%

The Cloud Computing Security and Hacking Course

15 Lessons
All Levels

Would you like to learn cloud computing security because this …

What you'll learn
Cloud computing theory
Cloud vulnerabilities theory
Cloud security controls
Data centers
Cloud solutions
Using Google Drive plus tips and tricks
Using Drive for hacking
and more…
-92%

Start White Hat Hacking

62 Lessons
All Levels

Would you like to learn what hackers do to setting …

What you'll learn
Introduction to Ethical Hacking! What is it?
Setting Up the Lab Environment
Kali Linux Basics
Network Penetration Testing
Network Penetration Testing - Pre Connection Attacks
Network Penetration Testing - Gaining Access To Networks
Network Penetration - Post Connection Attacks
Network Penetration - Detection & Security
Gaining Access to Computers - Server Side Attacks
-90%

Start Hacking with Android, iOS, and Windows Smartphones Today!

13 Lessons
All Levels

Would you like to learn how to hack with Android, …

What you'll learn
Mobile devices theory
Android hacking tools
Hacking mobile devices engagement
IOS security controls theory
Android security controls theory
How to protect your Android smartphone
and much more…
-91%

Start Hacking Today from Introduction to Vulnerability Analysis

18 Lessons
All Levels

Become an ethical hacker today from beginner to footprinting and …

-94%

OAuth 2.0 Authentication Protocol and Authorization Tokens for Beginners

11 Lessons
All Levels

Would you like to learn about the OAuth 2.0 Authentication …

What you'll learn
What is Oauth?
The problem and solution
Oauth default flow and other flows
Authorization code flow and implicit flow
Grant type client credentials and resource owner
OAuth practical videos
-89%

Internet of Things Hacking

8 Lessons
All Levels

Would you like to learn Internet of Things Hacking (IoT) …

What you'll learn
IoT theory
IoT hacking tools
Hacking IoT
IoT scenario
Smart devices
AWS basics
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare