هكر ضد امن معلومات مواجهة حماسية عملي (اختراق وحماية) Udemy
Price: USD 200
  • Duration: Flexible

Course details

Hacker and Cyber Security | Virus + Security |

HACKER :

============
1-
2- - cmd part1
3- - cmd part2
4- -

5- -

6- 10

7-

8-

9-

10 -

11-

12-
13 - -

14-

15 - 1

16 -

17 -

18 - 4

19 -

20- 10

21 -

CYBER SECURITY :

============

1-

2-

3-

4-

5-

6-

7-

====================================================

Hacker and Cyber Security | Virus + Security | Hacker against information security In this course we will represent the hacker's role in penetrating the network and the role of information security how to protect itself in detail

HACKER:

============

1- Hacker Against Information Security

2- The Hacker's Role - Knowing CMD Part1

3- The Hacker's Role - Knowing CMD Part2

4- The Hacker's Role - Making Virus Through The Code Editor

5- The hacker's role - creating a virus, disabling the mouse, disabling the keyboard, and shutting down the computer

6- The hacker's role in making 10 hellish pharos

7- The role of the hacker to manipulate the companys employees through their IP and display the passwords of the Lua

8- The hacker's role is to download a tool for weighing and pulling Wi-Fi passwords, emails and browsers

9 - The role of the hacker to create a virus in the Python script and execute the codes and work in a hidden way and delete itself

10 - The hacker's role is to encrypt the victim's files, lock them with a complete secret, delete the original files, and decrypt them

11- The role of the hacker to convert the Python file into an executable file to skip the code editor, the Python editor and Winf

12- The hacker's role in creating a virus and carrying out a complete wiretapping attack 13- The hacker's role creating a virus that records the victim's voice in the background - Espionage

14- The hacker's role is to create a script that takes a screenshot of the victim's computer

15 - The hacker's role to create a script to pull what the victim wrote on the keyboard, Part 1

16 - The hacker's role is to modify and coordinate the kilogram in a larger and expanded way

17 - The hacker's role to modify the kilogram and bypass the problems of the inter, distance and tab buttons

18 - The hacker's role is to solve the problem of the ruler and go to a new line and take 4 spaces in the keylogger tool

19 - The hacker session, developing a keylogger file and sending a report to any place we want, with a specific time

20- The hacker's role is to send a report of all that the victim has written to the e-mail every 10 seconds

21 - The role of the hacker is to create a script and a virus that opens a camera and takes a picture of the victim in an invisible way


CYBER SECURITY:

============

1- The role of information security is to check the computer for spyware and malware files and kill them, if any

2- The role of information security is to hide and lock files and prevent anyone from accessing them without programs

3- The role of information security is to protect files in an infernal manner and without programs

4- The role of information security is to create a script that monitors the file. If a change has occurred, a notification will be issued with a sound

5- Verifying whether it was hacked and its data was leaked or not

6- The role of information security: checking files, pictures, videos, programs and everything online

7 - Information security, the process hacker program, control the computer from malicious programs

================================================= ==


Updated on 02 May, 2023
Courses you can instantly connect with... Do an online course on Cybersecurity starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or