Jump to content
neox

Udemy

Recommended Posts

Python 101

The course covers the following topics:

  • Section1: installation Python and Eclipse IDE.
  • Section2: Basics of Python Objects like Strings, Numbers, Booleans, Operators, Code indentation explained.
  • Section3: Conditionals & Loops.
  • Section4: String Objects.
  • Section5: List Objects
  • Section6: Tuples, Sets and Dictionaries.
  • Section7: Functions, Iterators and Generators.
  • Section8: Using Modules.
  • Section9: Python Classes & Objects.
  • Section10: File Handling.
  • Section11: Exceptions.
  • Section12: Database Programming with Python.

https://www.udemy.com/kypython-101/?couponCode=FREEPYTHON101

Link to comment
Share on other sites

Link to comment
Share on other sites

Learn The Basics of Ethical Hacking in Easy Steps [udemy]

Here is a course of Ethical Hacking and Pentest.

How to Download File From Dogefile

Credit's to : Altair

Real Price: 499

5 Lesson Total.

Download:

Section 1

Section 2

Section 3

Section 4

Section 5

Section 6

Section 7

Section 8

Section 9

==========================================

SQL Injection Master Course [udemy]

-Real Price: $300

Credit's to : Altair

-43 Lecture Total

WrRVZ4.png

Download

Edited by Aerosol
Link to comment
Share on other sites

Better C# Web Development - Pro Techniques for success

Take your career to the next level and learn how pro developers make code clean, extensible, maintainable and re-usable.

Have you just started to learn software development in Microsoft c#? Have you learnt the basics but are now ready to see how Professional developers keep their code clean and maintainable? Are you hungry to learn the RIGHT way to build robust, stable software?

Do you want to take your career to the next level and earn the big money!?

This course will teach you how enterprise class developers create ' Best in Class' software, and how these principals will help you create software easier, faster and be less prone to bugs.

We will introduce the 7 SOLID Principals and modern day patterns that adhere to them such as Dependency Injection, MVC, Abstraction and Inheritance. We'll implement cleaner data access using the Repository Pattern with Entity Framework, which it turn makes keeping your code and database design in sync.

These are principals that scare some junior developers, but by using real world examples I'll show just how easy to master they are.

Over the lectures we will build the core functions of an ASP.NET MVC e-commerce site that grows to implement each technique, and once finished you will have the knowledge to create enterprise class applications of your own!

Price: 99$

Discount: 100%

---------------------------

The iPhone Office: Use iOS To Double Your Productivity

Use your iPhone or iPad to run a cloud-based mobile office from anywhere and get your work done faster and smarter.

The iPhone may be the greatest device ever invented for managing and optimizing your life. Since you always have it with you, why not make use of it to make yourself more productive and become just the person you want to be.

When used to its full potential, the iPhone is a terrific tool for organizing your life, for setting clear goals, for monitoring your daily progress and, in the process, for becoming a much more focused and high performing individual.

In this course, I'll show you how to use your iPhone to work from anywhere, to better manage your life and to ultimately thrive in this new hyper-connected (and distracting) digital environment.

With the right knowledge and tools, a cloud-based mobile office can give you the freedom and flexibility to run a paperless office that is accessible from anywhere on your iPhone.

Price: 49$

Discount: 100%

Edited by toofast
Link to comment
Share on other sites

Link to comment
Share on other sites

Udemy - Metasploit Extreme on Kali Linux

280_01395146571.jpg

  • English
  • .MP4
  • Audio: aac, 44100 Hz, stereo
  • Video: h264, yuv420p, 642x360, 30.00 fps®
  • 347 MB

The re-engineered Metasploit Framework on Kali linux for Hackers and Penetration testers

Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world's largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems.

Its a powerful tool used for penetration testing.

In clear and short words, If you interested in words like security, Hacking, exploits etc, then this is a must series for you.

Download

Pass:

onevatan.com

Link to comment
Share on other sites

https://www.udemy.com/website-hacking-in-practice/

WHAT YOU WILL LEARN in this Ethical Hacking Training:

Module 01. Introduction and environment configuration - you will learn how to configure and prepare your system for the further training. All you need is a Windows system.

Module 02. Deep data hiding.

Module 03. Brute-force and dictionary attacks - you will get to know how an attacker could perform a brute-force or a dictionar attack on your website or web application containing a password protected data.

Module 04. Account lockout attack.

Module 05. Web parameter tampering - you will learn how to tamper hidden data used by websites. You will use the presented technique in a real-life example. Very important lesson.

Module 06. Path and information disclosure.

Module 07. Forced browsing - you will see how an attacker could "sniff" a sensitive data from a website using a forced browsing.

Module 08. Path traversal - you will learn a path traversal method and use it in practice in your training environment.

Module 09. Unicode encoding - encoding related vulnerabilities.

Module 10. Parameter delimiter - you will learn how to take advantage of input filtering bugs. After this lesson you will be able to create an admin account - of course without having the administrator privileges.

Module 11. PHP injection - you will be demonstrated a PHP code injection practical attack. Very important lesson. You will see how a malicious data can be injected into a website, e.g. using a crafted image or text string.

Module 12. Direct static code injection - you will learn what a ststic code injection is and how it could be used by an attacker.

Module 13. SQL injection - one of the TOP3 techniques used by attackers nowadays. Step by step practical demonstration. You can hack the training website yourself (without harming anybody).

Module 14. XSS - Cross Site Scripting attack - you will see for yourself why XSS is considered the most popular hackers' target. By the end on this lesson you will intercept a user session.

Module 14B. XST - Cross Site Tracing attack.

Module 15. XSRF - Cross Site Request Forgery attack - you will learn how an attacker can force an unaware user to reset a password.

Module 16. Spying on data with a browser - no additional comment needed.

Module 17. Session hijacking - lesson on session hijacking and consequences.

Module 18. Session fixation.

Module 19. Phishing - one of the most popular attacks. You will learn some tips to protect against it.

Module 20. Automated security testing - you will be taught using automated security testing tools and learn what white, black and grey box testing is. Useful knowledge for web developers and IT security consultants.

Link: My Files

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...