Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Ethical Hacking + Linux + Sql + Excel + Word : It Pro V2

Posted By: ELK1nG
Ethical Hacking + Linux + Sql + Excel + Word : It Pro V2

Ethical Hacking + Linux + Sql + Excel + Word : It Pro V2
Published 5/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.00 GB | Duration: 6h 40m

Learn System Hacking, Windows Security, Oracle SQL and Mob Hacking, Wi-Fi Hacking and Security, KALI Linux and More.

What you'll learn

Learn Windows Hacking and Security

Learn Kali tools and techniques

Learn about anonymity

Learn Cyber Security for PC

Learn Oracle Live SQL

Learn Advanced Excel

Learn RedHat Linux

Learn MS Word

Requirements

No experience needed. You will learn everything from scratch

Description

Learn everything from scratch and get to know Cyber Security in depth. This course is the first step for Ethical Hacking. This course is best suitable for beginners. If you are the one who wants to learn cyber security then this is the best course to start with. Let's jump into the course.Kali Linux is mainly used for Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.This course is specially designed for Beginners. You will learn a lot of things in Cyber Security from Scratch. Anyone who is interested in cyber security OR anyone who want to become Ethical Hacker may join this course. You will learn a lot of topics like-1. Introduction to Ethical Hacking2. Installing OS3. Creating virtual lab4. Types of Hackers5. Windows Security Architecture6. Hacking Windows Accounts with or without Software.7. Hash8. Other ways to crack windows account9. Using Live OS10. Accessing windows without any password11. Five stages of ethical hacking12. Backdooring13. Viruses and Worms13. Trojans Practical14. How to create undetectable trojan15. Ports16. Encryption basics17. SQL Inj. basics18. Creating and Hosting a website19. Server Side Script creation20. Using Google Dork21. Social Engineering22. Phishing Attack23. Reverse Engineering24. Oracle Live SQL25. Advanced ExcelMore.

Overview

Section 1: Introduction

Lecture 1 Creating LAB- OS 1

Lecture 2 OS 2

Lecture 3 OS 3 (I)

Lecture 4 OS 3 (II)

Lecture 5 Win 7

Lecture 6 Win 10

Lecture 7 Snapshots

Lecture 8 Network ?

Lecture 9 Network Configuration

Section 2: Ethical Hacking- Level I

Lecture 10 Hacking

Lecture 11 Hackers

Lecture 12 Ping

Lecture 13 Harvester

Lecture 14 NSLOOKUP

Lecture 15 Data Extraction

Lecture 16 Mirrioring

Lecture 17 Nmap 1

Lecture 18 Nmap 2

Lecture 19 Nmap 3

Lecture 20 Nmap 4

Lecture 21 Nmap 5

Lecture 22 Zenmap

Lecture 23 Finding OS

Lecture 24 Topology Finding

Lecture 25 Search Engine

Lecture 26 Google Keywords

Lecture 27 Steganography I

Lecture 28 Steganography II

Lecture 29 Steganography III

Lecture 30 Steganography IV

Lecture 31 Spoofing Email

Lecture 32 ADS Spy

Lecture 33 Keylogger

Section 3: ORACLE Live SQL 2024

Lecture 34 Intro

Lecture 35 Interface

Lecture 36 Database

Lecture 37 DB Mode

Lecture 38 DB Logical View

Lecture 39 DB Objects 1

Lecture 40 DB Objects 2

Lecture 41 DB Objects 3

Lecture 42 DB Objects 4

Lecture 43 DB Objects 5

Lecture 44 Data Types 1

Lecture 45 Data Types 2

Lecture 46 Data Types 3

Lecture 47 Data Types 4

Lecture 48 Data Types 5

Lecture 49 Data Constraints 1

Lecture 50 Data Constraints 2

Lecture 51 Data Constraints 3

Lecture 52 Data Constraints 4

Lecture 53 Data Constraints 5

Lecture 54 Data Constraints 6

Lecture 55 SQL 1

Lecture 56 SQL 2

Lecture 57 SQL 3

Lecture 58 SQL 4

Lecture 59 SQL 5

Lecture 60 DDL 1

Lecture 61 DDL 2

Lecture 62 DDL 3

Lecture 63 DDL 4

Lecture 64 DDL 5

Lecture 65 DDL 6

Lecture 66 DDL 7

Lecture 67 DDL 8

Lecture 68 DDL 9

Lecture 69 DDL 10

Lecture 70 DDL 11

Lecture 71 DDL 12

Lecture 72 DML 1

Lecture 73 DML 2

Lecture 74 DML 3

Lecture 75 DML 4

Lecture 76 DML 5

Lecture 77 DML 6

Lecture 78 DML 7

Lecture 79 TCL

Lecture 80 DCL

Lecture 81 DRL

Lecture 82 Functions 1

Lecture 83 Functions 2

Lecture 84 Functions 3

Lecture 85 Functions 4

Lecture 86 Numeric 1

Lecture 87 Numeric 2

Lecture 88 Numeric 3

Lecture 89 Date Time 1

Lecture 90 Date Time 2

Lecture 91 Conversion Func 1

Lecture 92 Conversion Func 2

Lecture 93 Conversion Func 3

Lecture 94 Joins 1

Lecture 95 Joins 2

Lecture 96 Congratulations

Anyone who is interested in Cyber Security