Login
Categories
Machine Learning
Machine Learning
Artificial Intelligence
Big Data Analytics & Cloud Computing
Software Development
Web Application Development
Java Development
Python
Cyber Security
Cyber Security
Soft Skills
Soft Skills Development
IT Project Management
Web Application Development
Web Application Development
Big Data Analytics / Data Science
Bid Data Analytics / Data Science
Kosovo Young ICT Skilled Profiles
Login
Become An Instructor
×
Offensive Cyber Security
Offensive Cyber Security
75 Students enrolled
Created by:
Last Updated: 18th September 2021
Shqip (Albanian)
Requirements
Offensive Cyber Security
Description
Offensive Cyber Security
Content
Introduction
Introduction to Ethical Hacking
1.0 Information Security Fundamentals
1.1 Information Security Cube
1.2 Hackers, Ethics and Challanges
1.3 Access Controls
1.4 Llojet e Sulmeve Kibernetike
1.4 Cyber Attacks types
1.5 Malware Applications
1.5 Malware App- Part 2
1.5 Malware-Ransomware Demo
1.5 Msfvenom and TheFatRat Malware creation
1.6 Infrastruktura Kritike
1.7 SOC(Qendra Operacionale per Siguri)
1.7.1 Insalling and Creating TheFatRat Malwares
1.9 Installing and Configuring the Lab Environment
1.9 Installing Metasploitable 3
1.9 Installing Windows Metasploitable 3
1.9 Hack Day - HacktheBOX
1.8 Cryptography and Blockchain
1.8 Blockchain
1.10 Testi i Penetrimit
1.10 Hack Day - CVE at Content Management Systems
1.10 Penetration Testing continue
1.11 MBLEDHJA E INFORMACIONIT
1.11 Mbledhja e Informacionit II
1.12 HACK DAY - XSS
1.12 GOOGLE HACKING
2.3 Passive Infogather tools
2.4 Active Information Gathering
2.5 Demo Presentations- InfoGathering WeGlobal
2.5 Demo Presentations- InfoGathering WeGlobal
2.6 Nmap tool
2.7 Nessus, RUMBLER, GOBBY
3.0 Metasploitable 3 - Linux
3.1 M3 - ProFTPd mod_copy - PHPmyadmin
3.2 Chain Attacks - Metasploitable 3
3.3 Pivoting - Metasploitable 3
3.4 Privilage Escalation ROOT - Metasploitable 3
3.5 Windows Metasploitable 3
3.6 Post Exploitation_Port Forwarding - Metasploitable Windows
4.0 HTTP Methods, Codes and Request- OWASP TOP 10
4.1 Burpsuite, FoxyProxy and DVWA
4.2 Brute Force
4.3 Command Injection
4.4 CSRF Token
4.5 Local/Remote File Inclution
4.6 File Upload Vulnerability
4.7 Reverse vs Bind Shell
4.8 File Upload HIGH
4.9 Insecure Captcha
4.10 SQL Injection
4.11 Blind SQL Injection
4.12 XSS DOM
4.13 XSS Reflected
4.14 Punimi Seminarik
4.15 Punim Seminarik II
5.0 Wireless Security & Attacks
5.1 Pivoting and Portfwd
5.2 EXAM
Recent Modules
Cybersecurity Professional
Last Updated 25th February 2025
29
Machine Learning
Last Updated 24th February 2025
52
Artificial Intelligence
Last Updated 24th February 2025
50
Python Programming
Last Updated 24th February 2025
142
Big Data Analytics / Cloud Computin...
Last Updated 24th February 2025
101
Meet your instructor
Report
Become An Instructor
×