Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Gaining Access Introduction (4:14)
- 2.WEP Cracking - Theory Behind Cracking WEP Encryption (5:47)
- 3.WEP Cracking - Basic Case (6:17)
- 4.WEP Cracking - Fake Authentication (6:45)
- 5.WEP Cracking - ARP Request Replay Attack (6:09)
- 6.WPA-WPA2 Cracking - Introduction (3:42)
- 7.WPA-WPA2 Cracking - Exploiting WPS Feature (9:50)
- 8. WPA-WPA2 Cracking - How To Capture The Handshake (6:49)
- 9.WPA-WPA2 Cracking - Creating a Wordlist (7:33)
- 10. How to Configure Wireless Security Settings To Secure Your Network (6:25)
- 1.Installing Windows As a Virtual Machine (3:32)
- 2.Information Gathering - Discovering Connected Clients using netdiscover (8:39)
- 3.Gathering More Information Using Zenmap (6:45)
- 4.Gathering Even More Information Using Zenmap (8:08)
- 5.MITM - ARP Poisoning Theory (9:04)
- 6.MITM - ARP Spoofing Using MITMf (5:17)
- 7.MITM - Bypassing HTTPS (4:59)
- 8.MITM - DNS Spoofing (4:53)
- 9.MITM - Injecting Javascript & HTML Code (6:56)
- 10. MITM - Using MITMf Against Real Networks (9:09)
- 11.Wireshark - Basic Overview_How To Use It With MITM Attacks (9:09)
- 12.Wireshark - Capturing Passwords_Cookies Entered By Any Device (5:34)
- 13. Creating a Fake Access Point_Honeypot - Theory (8:45)
- 14.Creating a Fake Access Point Honeypot - Practical (10:48)
- 1.Installing Metasploitable As a Virtual Machine (6:21)
- 2.Introduction gaining access (4:05)
- 3.Basic Information Gathering_Exploitation (10:05)
- 4. Using a Basic Metasploit Exploit (10:05)
- 5.Exploiting a Code Execution Vulnerability (10:03)
- 6. MSFC - Installing MSFC_Metasploit Community (5:46)
- 7.MSFC - Analysing Scan results _ Exploiting Target System (9:42)
- 8.Nexpose - Installing Nexpose (11:11)
- 9.Nexpose - How To Configure_Launch a Scan (9:16)
- 10.Nexpose - Analysing Scan Results & Generating Reports (7:56)
- 1.Introduction - Gaining access (2:19)
- 2.Installing Veil 3.1 (6:08)
- 3.Veil Overview _ Payloads Basics (7:20)
- 4.Generating An Undetectable Backdoor Using Veil 3 (9:44)
- 5.Backdoor Delivery Method 2 - Backdooring Downloads on The Fly (8:23)
- 6.Using A Basic Delivery Method To Test The Backdoor _ Hack Windows 10 (9:50)
- 7.How to Protect Yourself From The Discussed Delivery Methods (3:51)
- 1.Introduction (2:10)
- 2.Maltego Basics (2:06)
- 3.Discovering Websites_ Links _ Social Networking Accounts Associated With Target (7:32)
- 4.Discovering Twitter Friends _ Associated Accounts (4:57)
- 5.Discovering Emails Of The Target_s Friends (3:48)
- 6.Analysing The Gathered Info _ Building An Attack Strategy (3:48)
- 7. Backdooring Any File Type _images_ pdf_s ...etc (4:41)
- 8.Compiling _ Changing Trojan_s Icon (6:16)
- 9.Spoofing .exe Extension To Any Extension _jpg_ pdf ...etc (8:29)
- 10.Spoofing Emails - Setting Up am SMTP Server (7:33)
- 11.BeEF Overview & Basic Hook Method (6:39)
- 12.BeEF - hooking targets using MITMf (3:11)
- 13.BeEF - Running Basic Commands On Target (4:24)
- 14. BeEF - Stealing Credentials Passwords Using A Fake Login Prompt (2:17)
- 15.BeEF - Gaining Full Control Over Windows Target (3:39)
- 16.Detecting Trojans Manually (5:32)
- 17.Detecing Trojans using a Sandbox (3:16)
- 1.Introduction - post exploitation (2:02)
- 2.Meterpreter Basics (6:22)
- 3.File System Commands (5:09)
- 4.Maintaining Access - Basic Methods (5:07)
- 5.Maintaining Access - Using a Reliable_Undetectable Method (6:53)
- 6.Spying - Capturing Key Strikes_Taking Screen Shots (6:53)
- 7.Pivoting (7:07)
- 8.Pivoting - Exploiting Devices on The Same Network As The Target Computer (8:11)
- 1.Gathering Basic Information Using Whois Lookup (5:36)
- 2.Discovering Technologies Used On The Website (6:03)
- 3.Gathering Comprehensive DNS Information (5:57)
- 4.Discovering Websites On The Same Server (3:43)
- 5.Discovering Subdomains (5:05)
- 6.Discovering Sensitive Files (7:25)
- 7.Analyzing Discovered Files (4:17)
- 1.Discovering_Exploiting File Upload Vulnerabilities (6:43)
- 2.Discovering_Exploiting Code Execution Vulnerabilities (7:25)
- 3.Course Introduction _ Overview (2:53)
- 4.Discovering_Exploiting Local File Inclusion Vulnerabilities (5:16)
- 5.Remote File Inclusion Vulnerabilities - Configuring PHP Settings (3:45)
- 6.Remote File Inclusion Vulnerabilities - Discovering_Exploiting (5:44)
- 7.Preventing The Above Vulnerabilities (7:19)
- 1.Dangers of SQL Injection Vulnerabilities (2:53)
- 2.Discovering SQL injections in GET (7:01)
- 3.Discovering SQL injections In POST (7:56)
- 4.Bypassing Logins Using SQL injection Vulnerability (4:48)
- 5.Reading Database Information (5:38)
- 6.Reading_Writing Files On The Server Using SQL Injection Vulnerability (5:57)
- 7.Discovering SQL Injections_Extracting Data Using SQLmap (6:47)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.