Skillshare – Ultimate Ethical Hacking & Cyber Security Course – 2020

Skillshare – Ultimate Ethical Hacking & Cyber Security Course – 2020
English | Size: 1.11 GB
Category: Tutorial

Learn ethical hacking, penetration testing and cyber security with this complete course for 2020!
This tutorial was designed for absolute beginners, and before you know it you will be coding your own apps to pentest.

Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH

Linkedin Learning – Ethical Hacking System Hacking UPDATE 20200103-ZH
English | Size: 223.38 MB
Category: Tutorial

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking password cracking, privilege escalation, spyware installation, and keylogging and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools

Linkedin Learning – Ethical Hacking Social Engineering

Linkedin Learning – Ethical Hacking Social Engineering-ZH
English | Size: 284.79 MB
Category: tUTORIAL

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.

Udemy – Practical Ethical Hacking – The Complete Course

Udemy – Practical Ethical Hacking – The Complete Course
English | Size: 11.95 GB
Category: E-learning | HACKING | Security

Note: The contents of this course are not covered in any of my other courses except for some basics. Although social engineering is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more operating systems, advanced exploitation, advanced post exploitation, bypassing security and more!