- Duration: Flexible
Course details
Hacker and Cyber Security | Virus + Security |
HACKER :
============
1-
2- - cmd part1
3- - cmd part2
4- -
5- -
6- 10
7-
8-
9-
10 -
11-
12-
13 - -
14-
15 - 1
16 -
17 -
18 - 4
19 -
20- 10
21 -
CYBER SECURITY :
============
1-
2-
3-
4-
5-
6-
7-
====================================================
Hacker and Cyber Security | Virus + Security | Hacker against information security In this course we will represent the hacker's role in penetrating the network and the role of information security how to protect itself in detail
HACKER:
============
1- Hacker Against Information Security
2- The Hacker's Role - Knowing CMD Part1
3- The Hacker's Role - Knowing CMD Part2
4- The Hacker's Role - Making Virus Through The Code Editor
5- The hacker's role - creating a virus, disabling the mouse, disabling the keyboard, and shutting down the computer
6- The hacker's role in making 10 hellish pharos
7- The role of the hacker to manipulate the companys employees through their IP and display the passwords of the Lua
8- The hacker's role is to download a tool for weighing and pulling Wi-Fi passwords, emails and browsers
9 - The role of the hacker to create a virus in the Python script and execute the codes and work in a hidden way and delete itself
10 - The hacker's role is to encrypt the victim's files, lock them with a complete secret, delete the original files, and decrypt them
11- The role of the hacker to convert the Python file into an executable file to skip the code editor, the Python editor and Winf
12- The hacker's role in creating a virus and carrying out a complete wiretapping attack 13- The hacker's role creating a virus that records the victim's voice in the background - Espionage
14- The hacker's role is to create a script that takes a screenshot of the victim's computer
15 - The hacker's role to create a script to pull what the victim wrote on the keyboard, Part 1
16 - The hacker's role is to modify and coordinate the kilogram in a larger and expanded way
17 - The hacker's role to modify the kilogram and bypass the problems of the inter, distance and tab buttons
18 - The hacker's role is to solve the problem of the ruler and go to a new line and take 4 spaces in the keylogger tool
19 - The hacker session, developing a keylogger file and sending a report to any place we want, with a specific time
20- The hacker's role is to send a report of all that the victim has written to the e-mail every 10 seconds
21 - The role of the hacker is to create a script and a virus that opens a camera and takes a picture of the victim in an invisible way
CYBER SECURITY:
============
1- The role of information security is to check the computer for spyware and malware files and kill them, if any
2- The role of information security is to hide and lock files and prevent anyone from accessing them without programs
3- The role of information security is to protect files in an infernal manner and without programs
4- The role of information security is to create a script that monitors the file. If a change has occurred, a notification will be issued with a sound
5- Verifying whether it was hacked and its data was leaked or not
6- The role of information security: checking files, pictures, videos, programs and everything online
7 - Information security, the process hacker program, control the computer from malicious programs
================================================= ==
- Data Protection (GDPR) Practitioner Course LineUSD 24
USD 480Duration: Upto 7 Hours - Computer Networks Security Scratch to Advanced Course DriveUSD 24
USD 160Duration: Upto 8 Hours