Login
Categories
Machine Learning
Machine Learning
Artificial Intelligence
Big Data Analytics & Cloud Computing
Software Development
Web Application Development
Java Development
Python
Cyber Security
Cyber Security
Soft Skills
Soft Skills Development
IT Project Management
Web Application Development
Web Application Development
Big Data Analytics / Data Science
Bid Data Analytics / Data Science
Kosovo Young ICT Skilled Profiles
Login
Become An Instructor
×
S2 Cyber Security Online (Group 3)
Cyber Security Online (Group 3)
478 Students enrolled
Created by:
Last Updated: 16th March 2021
Shqip (Albanian)
Requirements
Cyber Security Online (Group 3)
Description
Cyber Security Online (Group 3)
Content
Hyrje në Siguri Kibernetike
KAP 1.1 - RUBIKONI I SIGURISË KIBERNETIKE
Kundermasat/Qëndrimi i Sigurisë/NIST
Hakerët dhe Sulmet Kibernetike
KAP 1.4 SULMET KIBERNETIKE & PRAKTIKË KALI/PARROT OS
KAP 1.3 KONTROLLI QASJES
KAP 1.2 HAKERET, ETIKA dhe SFIDAT
INTRODUCTION TO COURSE - ENTRY TESTS
KAP 1.5 APLIKACIONET KEQDASHËSE-MALWARE
KAP 1.6 INFRASTRUKTURA KRITIKE
KAP 1.7 QENDRA OPERACIONE PER SIGURI (SOC)
KAP 1.8 KRIPTOGRAFIA DHE BLOCKCHAIN
KAP 1.9 INSTALIMI DHE KONFIGURIMI I LAB AMBIENTIT
Mbledhja e Informatave/Information Gathering
KAP 2.0 Penetration Testing
KAP 2.1 Footprint and Reconnaissance
KAP 2.2 HAKIMI ME GOOGLE
KAP. 2.2 HAKIMI ME GOOGLE - VAZHDIM
KAP 2.3 Mbledhja Pasive e Informatave
KAP 2.4 Mbledhja Aktive e Informatave
KAP 2.5 Service Enumeration
2.6 Vegla NMAP
2.7 NESSUS Vulnerability Assesment
2.8 VLERESIMI DOBËSIVE
Ekstraktimi/Enumeration
4. 1 KAP - Metasploitable 3 - Enumeration
Skanimi/Scanning
Shfrytëzimi/Exploitation
3.1 Metasploitable 3 Linux
3.2 Metasploitable 3 -Windows
3.3 SSH Brute Force/Metasploitable 3
3.4 Pivoting - Metasploitable Linux
3.5 Chain Attacks - Metasploitable 3
4.0 Web Penetration Testing
4.1 WEB PENETRATION & DVWA install
4.2 Web Pentesting setup | Burpsuite
4.3 Brute-Force attacks
4.4 Command Injection
4.5 CSRF Attack
4.6 FILE INCLUSION | FILE UPLOAD
4.7 FILE UPLOAD
4.8 INSECURE CAPTCHA
4.9 SQL Injection
4.10 XSS | Javascript
4.11 Blind SQL Injection
4.12 Weak Session | CSP | JS
4.13 DOM | Reflected | Storen XSS
4.14 Web Vulnerability Recap
Pas shfrytëzimit/Post-Exploitation
5.0 Metasploitable 3 - Post exploitation
6.0 Mbrotja e Punimit
7.0 EXIT TEST - FINAL EXAM CYBERSECURITY3 ONLINE
Mbulimi Gjurmëve/Covering the tracks
Recent Modules
Web Development Practitioner
Last Updated 16th September 2024
0
Machine Learning
Last Updated 16th September 2024
47
Artificial Intelligence
Last Updated 16th September 2024
47
Python Programming
Last Updated 17th September 2024
198
Big Data Analytics / Cloud Computin...
Last Updated 16th September 2024
153
Meet your instructor
Report
Become An Instructor
×