Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1.Installing Kali Linux (2:58)
- 2.Dual boot Kali Linux with Windows (5:42)
- 3.Live Boot of Kali Linux (2:42)
- 4.Setting up Kali Linux in virtual box (8:55)
- 5.History of Wi-Fi and its vulnerbility (5:46)
- 6.Setting up environment for penetration testing (4:09)
- 7.Basic Linux commands (11:30)
- 8.Special command related to hacking (4:02)
- 1.Getting a Handshake and Data Capture (5:55)
- 2. WEP hacking (6:38)
- 3.Reaver(WPA) (6:16)
- 4. WPA2 Password Crack - Gerix Wifi Cracker (3:43)
- 5. Cracking WPAWPA2 with hashcat (2:37)
- 6.Counter measure for reaver (1:54)
- 7.Built-in Kali word list rockyou.txt (1:35)
- 8.Using Aircrack and a Dictionary to crack a WPA Data Capture (2:59)
- 9.Using Hydra to gaining access to admin login of a router (5:38)
- 10.key logger Wi-Fi (3:17)
- 11.Keylogger Wi-Fi counter measure (1:11)
- 12.Bypassing Mac address filtering (4:05)
- 13.Increasing wireless transmit power (2:31)
- 14.Remove Device from Wi - Fi (2:23)
- 15.WiFi Jammer using Websploit (2:45)
- 16.WiFijammer (1:52)
- 17.WiFi password hack using WiFi phisher (3:18)
- 18. Man-In-The-Middle Attack (driftnet) using Hakku Framework tool (3:01)
- 19.wifi password crack using FLUXION (2:55)
- 20.Wifi Hacking With Kali Last lecturer (4:23)
- 21.Breaking a WPS PIN to Get the Password with Bully (5:48)
- 22.Cracking Wifi WPAWPA2 passwords using pyrit cowpatty (2:43)
- 23.Hostapd-wpe (2:47)
- 24.Kick all users off your network except you (1:21)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.