Udemy – Build an Advanced Keylogger using C++ for Ethical Hacking

Udemy – Build an Advanced Keylogger using C++ for Ethical Hacking
English | Size: 2.91 GB
Category: Tutorial


What you’ll learn
A fully functional keylogger built from scratch in C++!
Feel confident in coding similar programs in C++.
A custom keylogger made for use in Windows compiled in the latest version of C++.
Get answers to every question you ask about C++ and about making this keylogger!

Infosecinstitute – EC-Council Certified Ethical Hacker (CEH)

Infosecinstitute – EC-Council Certified Ethical Hacker (CEH)
English | Size: 3.27 GB
Category: Tutorial


This learning path teaches you the hacking skills and methodology needed to perform a penetration test against an organization. You’ll learn the foundations of ethical hacking and penetration testing as you progress through 12 courses tied to the seven Certified Ethical Hacker (CEH) exam objectives. Upon completion you’ll be prepared to earn your CEH certification and have an established base of hacking knowledge that can be leveraged to progress into more advanced security certifications or open up new career roles.

Infosecinstitute – Ethical Hacking

Infosecinstitute – Ethical Hacking
English | Size: 4.91 GB
Category: Tutorial


This learning path teaches you the necessary hacking skills to conduct a formal penetration test. As you progress through 12 courses, you’ll build core pentesting skills such as intelligence gathering, reconnaissance, device exploitation, stealth techniques and more. Upon completion, you’ll have the knowledge and skills to carry out a penetration test against an organization to identify weaknesses and potential avenues of attack.

Cybrary – Penetration Testing and Ethical Hacking

Penetration Testing and Ethical Hacking | Cybrary
English | Size: 2.50 GB
Category: Tutorial


If you are considering working in the cyber security industry, then this training will benefit you greatly. With Cybrary’s online Penetration Testing and Ethical Hacking course, you will learn how to protect users from cyber attackers by becoming an ethical hacker and learning to exploit networks yourself.