arrow_back
Back
lock
Complete Course Preview
lock
Module 1: Cyberspace, Users and Hackers
lock
Importance of Cyberspace in Daily Life
lock
Digital Footprints left online
lock
Website Creation and DNS
lock
How our data is roaming around
lock
How attackers takeover people
lock
Module 2: Malicious Practice By Hackers
lock
Hyperlinks – Definition, Creation, and use
lock
COOKIES : Weapon for Hackers
lock
Art of Google Dorking
lock
Network Scanning Depth
lock
Wireshark for Beginners
lock
Immediate Prevention and Cure
lock
Module 3: Deep Dive in Web Applications
lock
Introduction to Burpsuite
lock
Website Databse Retrieval using SQL
lock
Cross Site Scripting
lock
Email Analysis In Detail
lock
Security Checks and Measure
lock
Module 4: Hackers Approach Methods
lock
WordPress Hacking
lock
User Information Gathering
lock
Admin Bypass Methods
lock
Cross Site Request Forgery
lock
FTP Credentials Cracks
lock
Module 5: Miscellaneous Hacking Methodology
lock
Mobile Risks and Exploiting Ways
lock
Cryptography: A very concerning subject.
lock
Miscellaneous Phishing Techniques
lock
Securing your Gadgets effectively
lock
Workflow behind Payment activities
lock
Additional Cybersecurity Measures
lock
Cannosa High School
lock
CCTR
Preview - Certified Cyber Threat Researcher (LIVE)
Discuss (
0
)
navigate_before
Previous
Next
navigate_next