Example Image with Text


Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.

Example Text


Use this Text block to tell your course or coaching’s story.

Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling. 

This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.

Example Title

Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Title

Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Title

Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Curriculum

  1.INTRODUCTION
Available in days
days after you enroll
  2.SETTING UP THE LAB
Available in days
days after you enroll
  3.LINUX BASICS
Available in days
days after you enroll
  4.NETWORK HACKING
Available in days
days after you enroll
  5.NETWORK HACKING - PRE CONNECTION ATTACKS
Available in days
days after you enroll
  6.NETWORK HACKING - GAINING ACCESS (WEPWPAWPA2 CRACKING)
Available in days
days after you enroll
  7.NETWORK HACKING - POST CONNECTION ATTACKS
Available in days
days after you enroll
  8.NETWORK HACKING - DETECTION & SECURITY
Available in days
days after you enroll
  9.GAINING ACCESS TO COMPUTER DEVICES
Available in days
days after you enroll
  10.GAINING ACCESS - SERVER SIDE ATTACKS
Available in days
days after you enroll
  11.GAINING ACCESS - CLIENT SIDE ATTACKS
Available in days
days after you enroll
  12.GAINING ACCESS - CLIENT SIDE ATTACKS - SOCIAL ENGINEERING
Available in days
days after you enroll
  13.GAINING ACCESS - USING THE ABOVE ATTACKS OUTSIDE THE LOCAL NETWORK
Available in days
days after you enroll
  14.POST EXPLOITATION
Available in days
days after you enroll
  15.WEBSITE HACKING
Available in days
days after you enroll
  16.WEBSITE HACKING - INFORMATION GATHERING
Available in days
days after you enroll
  17.WEBSITE HACKING - FILE UPLOAD, CODE EXECUTION & FILE INCLUSION VULNS
Available in days
days after you enroll
  18.WEBSITE HACKING - SQL INJECTION VULNERABILITIES
Available in days
days after you enroll
  19.WEBSITE HACKING - CROSS SITE SCRIPTING VULNERABILITIES
Available in days
days after you enroll
  20.WEBSITE HACKING - DISCOVERING VULNERABILITIES AUTOMATICALLY USING OWASP ZAP
Available in days
days after you enroll

This course is closed for enrollment.

Example Image with Text


Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.