Example Curriculum
Available in
days
days
after you enroll
- 1.1 Basics of Ethical Hacking - 28 Oct'20 (78:52)
- 1. Notes for Basics of Ethical Hacking
- 2. Notes for Basics of Ethical Hacking
- 3. Notes for Basics of Ethical Hacking
- 1.2 Basics of ethical hacking - part 1 - 29 oct'20 (57:40)
- 1.3 Basics of Networking - part 1 - 29 oct'20 (32:55)
- 4. Notes for Basics of Networking
- 1.4 Basics of networking - part 2 - 31 oct'20 (130:29)
- 1.5 Basics of Networking - part 3 - 1 Nov'20 (127:24)
- 5. Assignment for modules 1-3
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 4.1 Scanning, Vulnerability Assessment and Penetration Testing - 28 Nov (146:01)
- 1. Notes for Scanning
- 2. Notes for Scanning
- 3. Linux command cheat sheet
- 4. nmap command cheat sheet
- 5. scanning assignment
- 6. Notes for Vulnerability assessment
- 7. Assignment for Vulnerability assessment
- 8. Notes for Penetration testing
- 9. Assignment for penetration testing
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Example Featured Products
Showcase other available courses and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific course.
EXAMPLE