Course Curriculum

  footprinting part 2 and scanninfg part 1- Sourav sir
Available in days
days after you enroll
  Footprinting part 1 - Sourav Sir
Available in days
days after you enroll
  scannning part 2 and vulnerability assessment 1
Available in days
days after you enroll
  IOT, Cryptography - Hrishikesh sir
Available in days
days after you enroll
  Hacking email accounts, stegnography, hiding files, sniffing part 1
Available in days
days after you enroll
  sniffing part 2, social engineering and phishing
Available in days
days after you enroll
  penetration testing - Hrishikesh sir
Available in days
days after you enroll
  web application basics - part 0- how to install DVWA and XAMpp- Sourav sir
Available in days
days after you enroll
  Enumeration part 1 - hrishikesh sir
Available in days
days after you enroll
  web application hacking-part2 - sourav sir
Available in days
days after you enroll
  SQL Injection - Sourav Sir
Available in days
days after you enroll
  Enumeration part-2, Vulnerability Assessment - Hrishikesh sir
Available in days
days after you enroll
  web application hacking - part 3- sourav sir
Available in days
days after you enroll
  DOS and DDOS, Session Hijacking- Sourav sir
Available in days
days after you enroll
  System hacking- part 1- password cracking, metasploit - Hrishikesh sir
Available in days
days after you enroll
  Cross site scripting - Sourav sir
Available in days
days after you enroll
  Mobile platform Hacking - Sourav sir
Available in days
days after you enroll
  Keyloggers, Spywares, Virus Creation - Hrishikesh sir
Available in days
days after you enroll
  credit card frauds, free vpn, web application part 1 - sourav sir
Available in days
days after you enroll
  System Hacking- part 2 : How to hack windows machines and rootkits - Hrishikesh sir
Available in days
days after you enroll
  Hacking web application - part 3, hacking mobile platform- Sourav sir
Available in days
days after you enroll
  system Hacking part 3, stegnography, clearing logs - Hrishikesh sir
Available in days
days after you enroll
  Mobile platform hacking - part 2 - sourav sir
Available in days
days after you enroll
  Hacking wireless network - Sourav Sir
Available in days
days after you enroll
  Malwares - Trojan - Hrishikesh sir
Available in days
days after you enroll
  Malwares : virus and worms - hrishikesh sir - hrishikesh sir
Available in days
days after you enroll
  SQL Injection - Sourav sir
Available in days
days after you enroll
  Sniffing part 1- hrishikesh sir
Available in days
days after you enroll
  Bug bounty - Hrishikesh sir
Available in days
days after you enroll
  system hacking revision - sourav sir
Available in days
days after you enroll
  sniffing practicals - part 2 - Hrishikesh sir
Available in days
days after you enroll
  Sniffing practical and social engineering and phishing part 1 - Sourav sir
Available in days
days after you enroll
  Social engineering and phishing part 2 and DOS & DDOS part 1 - Sourav sir
Available in days
days after you enroll
  DOS and DDOS part 2 & SQL Injection
Available in days
days after you enroll
  Web server Hacking
Available in days
days after you enroll
  Data Tampering using Burp Suite
Available in days
days after you enroll
  web application part 4 and session hijacking
Available in days
days after you enroll
  IOT, cryptography and cloud computing
Available in days
days after you enroll
  Creating Security Policies
Available in days
days after you enroll

Select a pricing plan and sign up