• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

hacking:

  1. itsMe

    Ethical Hacking: Metasploit

    What you’ll learn     How to use Metasploit     How to Search Exploits     How to use Exploits     How to exploit Win 2k and Ubuntu 16 Requirements     Kali Linux live USB Description This course teaches you the basics of metasploit, a popular hacking and exploitation tool. You will...
  2. dEEpEst

    La Evolución del Hacking: Desde sus inicios hasta la actualidad

    La Evolución del Hacking: Desde sus inicios hasta la actualidad El hacking es una actividad que ha estado presente desde los primeros días de la informática y ha evolucionado a medida que los sistemas informáticos y la tecnología han avanzado. En la década de 1960 y 1970, los primeros hackers...
  3. dEEpEst

    Cómo proteger su red contra el hacking: Una guía completa sobre qué es el hacking de red y cómo prevenirlo

    Aprenda sobre el hacking de red y los peligros que conlleva en la era digital. Descubra las mejores prácticas y medidas de seguridad para proteger su red y sus datos sensibles. Introducción: En un mundo cada vez más conectado, la seguridad de las redes es esencial para proteger los datos y la...
  4. dEEpEst

    Los conceptos básicos del hacking: tipos, herramientas y técnicas

    Conceptos del hacking El hacking es una disciplina que se ha vuelto cada vez más popular en los últimos años, y con razón: el mundo digital es cada vez más importante en nuestras vidas, y el conocimiento de cómo funciona y cómo protegerse es esencial para cualquier persona...
  5. itsMe

    Ethical Hacking: Network Scan Nmap& Nessus| Network Security

    Description Welcome to the “Ethical Hacking: Network Scan Nmap& Nessus| Network Security” course. Scan networks with vulnerabilities by using Nmap& Nessus. Master Cyber Security, ethical hacking, network hacking skills This is our 3rd course in our Ethical Hacking series. Whether you...
  6. itsMe

    Ethical Hacking: Eternalblue

    Description Microsoft Windows is one of the most popular operating systems used worldwide. Windows includes an abundance of pre-installed applications, drivers, and updates. This high usage rate has led to Windows becoming a popular target for hackers. One of the most notorious exploits aimed...
  7. itsMe

    Ethical Hacking: Become Ethical Hacker | Penetration Testing

    Description Welcome to Ethical Hacking: Become Ethical Hacker | Penetration Testing course. Ethical Hacking | Penetration Testing, Bug Bounty and Ethical Hacking skills for your Certified Ethical Hacker career Whether you want to get your first job in IT security, become a white hat hacker...
  8. itsMe

    Ethical Hacking: System Hacking

    Description Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we’ve done our research, we’ve found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of...
  9. itsMe

    Ethical Hacking: OWASP top 10 Web Application Hacking

    Find out about the OWASP top 10 most common Cyber Security and Web Application hacking threats. What you’ll learn Ethical Hacking: OWASP top 10 Web Application Hacking     Find the top 10 threats from the OWASP list.     Web Application Security: The basics.     Each vulnerability has its own...
  10. itsMe

    Android Hacking: Ethical Hacking for Android Apps & Devices

    Description Hi there Welcome to my Android Hacking: Ethical Hacking for Android Apps & Devices course. Android Hacking, Android penetration testing with Android Ethical Hacking for Android Apps and devices | Android hack Whether you want to get your first job in IT security, become a...
  11. itsMe

    Ethical Hacking: SQL Injection (2021)

    Description SQL injections are a common way to gain unauthorized access to web applications and extract data from them. In this course, instructor Malcolm Shore shows you the SQL command language and how it is used by attackers to craft SQL Injections. Malcolm begins with commonly encountered...
  12. itsMe

    Ethical Hacking: Sniffers

    Ethical Hacking: Sniffers by Lisa Bock Ethical hackers: Get an inside look into the tools the black hat hackers use to “sniff” network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network...
  13. itsMe

    Ethical Hacking: Dive into Injections by Java & Spring boot

    Web Application Security and Ethical Hacking - Master Injection attacks with NoSQL, LDAP, LOG, CSV and SQL injection. What you'll learn     Ethical hacking with injection attacks     Web security     Secure coding     SQL Injection with PostgreSQL     NoSQL Injection with MongoDB     LDAP...
  14. itsMe

    Ethical Hacking: SQL Injection for Beginners

    Description What is sql injection? A SQL injection is an attack in which the attacker sends a specially crafted SQL query (statement), to a database server and modifies the database as desired. An SQL injection occurs when user input is improperly sanitized before being used in an SQL query...
  15. itsMe

    Real-World Ethical Hacking: Hands-on Cybersecurity

    Protect yourself, gain the hottest new job skills, and learn the tricks the bad guys use - with Kali Linux & Metasploit! What you'll learn     Secure your computer, your network, and your data from 99% of all attacks on the Internet.     Test for security vulnerabilities using the tricks...
  16. itsMe

    Ethical Hacking: Complete NMAP For Ethical Hacking | 2021

    Best Ethical Hacking course for hackers. Learn Advanced Scanning with Nmap, learn Hacking, become Cyber Security expert. What you'll learn     Learn Ethical Hacking with NMAP     Learn how to use Nmap     Learn Nmap Basic and Advanced Scanning Techniques     Learn about network scan types    ...
  17. itsMe

    Ethical Hacking: Enumeration

    Description Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targets and in optimizing their penetration testing. In this course, instructor Malcolm Shore teaches the basic methods of enumerating networks and targeting systems with common...
  18. itsMe

    Ethical Hacking: Vulnerability Analysis

    Description In order to assess—and ultimately, decrease—an organization’s risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you’re working to strengthen network security at your organization, it’s essential to have a solid grasp of the processes...
  19. itsMe

    Ethical Hacking: Introduction to Ethical Hacking

    Ethical Hacking: Introduction to Ethical Hacking with Lisa Bock — Lynda What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing...
  20. itsMe

    Ethical Hacking + Website Hacking + Mobile Hacking: CyberSec

    What you'll learn     You will learn all the important aspects of Ethical Hacking     You will also learn about Website Penetration Testing     You will learn about Bug Bounty     Mobile Hacking Forensics Practicals     Practical Approach and Live Training     Live Website Hacking     Both...
Back
Top