Search result for M.ed. in educational technology Online Courses & Certifications
Get Course Alerts by Email
Hacking Web Applications and Penetration Testing: Fast Start
by Muharrem AYDIN- 4.2
4 hours on-demand video
In addition, you will learn how to use search engines to find out if there are known-vulnerabilities in the website. You’ll see the most famous and dangerous vulnerabilities including SQL injection and Cross Site Scripting (XSS) in this section. In addition, the methods to prevent hacking of these weaknesses will be taught....
$15.99
The Complete Social Engineering, Phishing, OSINT & Malware
by Muharrem AYDIN- 4.5
3.5 hours on-demand video
In this course, you will find the clean and pure information. This approach also can be seen in my previous course's reviews. I am interested in the security field and want to make my career in this domain, I really enjoy the learning. It’s no secret how technology is advancing at a rapid rate....
$17.99
Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
by Andrei Neagoie- 4.6
27 hours on-demand video
In this section, we are mainly targeting websites and their bugs/vulnerabilities. MAN IN THE MIDDLE - This is an attack that is used inside a network. Taking his experience in educational psychology and coding, Andrei's courses will take you on an understanding of complex subjects that you never thought would be possible....
$14.99
Ethical Hacking: Network Scan Nmap&Nessus | ethical hacking
by Muharrem AYDIN- 4.3
4.5 hours on-demand video
Become expert in Cyber Security | ethical hacking I can summarise all in two words. Having limited networking experience and absolutely no experience with hacking or ethical hacking, I've learned, practiced, and understood how to perform hacks in just a few days. Many depend on ethical hackers to identify weaknesses in their networks, endpoints, devices, or applications....
$23.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
The third stage is the attack phase, when possible vulnerabilities discovered in the last stage are attacked with various hacking methods. In the fourth stage of a penetration test, the tester attempts to maintain access to the system to steal any sensitive data or damaging systems. Post Modules of Metasploit Framework (MSF)Collecting Sensitive Data in Post-Exploitation PhasePassword Cracking...
$21.99