Search result for Exploit development Online Courses & Certifications
Get Course Alerts by Email
Basi di dati
by Antonio Picariello , Vincenzo Moscato- 0.0
6 Weeks
Database Systems have become fundamental in information management systems, contributing to the development of an increasingly knowledge-based society. All modern IT applications now exploit a database for storing, processing and retrieving information....
$60
Mobile First Web Development
by Tsering Kalden- 3.6
6.5 hours on-demand video
Welcome to the Mobile first Web Development course. This is the perfect opportunity to explore and exploit this course....
$9.99
Web application Penetration testing & Security
by Atul Tiwari- 0.0
9 hours on-demand video
Combining the most advanced techniques used by offensive hackers to exploit and secure. development phase to security, then we hunt for application business...
$14.99
Practical Ethical Hacking - The Complete Course
by Heath Adams- 4.7
24.5 hours on-demand video
Here, you'll exploit your first machine! We'll learn how to use Metasploit to gain access to machines, how to perform manual exploitation using coding, perform brute force and password spraying attacks, and much more. Exploit Development. You will manually write your own code to exploit a vulnerable program and dive deep into registers to understand how overflows work....
$29.99
Python Concurrency Simplified
by Packt Publishing- 3.5
6 hours on-demand video
You will learn about the principal approaches to concurrency that Python has to offer, including libraries and tools needed to exploit the performance of your processor. Elliot has even worked at Barclays Investment Bank for a summer internship in London and has maintained a couple of software development websites for the last three years....
$12.99
Learn Ethical Hacking By Hacking Real Websites Legally
by Paul Chin- 4.7
4.5 hours on-demand video
Great way to learn Web Development & Information Technology (IT): So, I invite you to learn to hack and in the process, you will also learn web development and IT....
$19.99
Cryptography is more fun with R!
by Vladimir Zhbanko- 0.0
1.5 hours on-demand video
Learn and use Public Key Cryptography with R Statistical Software SUMMARY This course is providing to you unusual but powerful way to exploit "Public Key Cryptography" in R Statistical Software. Course is created by non-Programmer for non-Programmers! Join this course because by completing it you will be able to: * encrypting of folders, files, video, etc are out of scope of this course...
$12.99
Related searches
Cybersecurity: Attack & Defense Strategies (Red & Blue Team)
by Packt Publishing- 4.4
7 hours on-demand video
This course starts with setting up hacker’s development lab before moving to Red Team tactics, where you will learn the basic syntax for the Linux tools that are commonly used to perform the necessary operations....
$11.99
Hacking Web Applications and Penetration Testing: Fast Start
by Muharrem AYDIN- 4.2
4 hours on-demand video
You will not only learn how to find out the vulnerabilities, but also learn how to exploit and hack those weaknesses. You’ll learn how to find usernames and passwords using brute force attacks, how to fix a session, how to escalate a privilege, how to discover and exploit Cross Site Request Forgery (CSRF) and more....
$15.99
Creating and Developing a Tech Startup
by Romain Beaume , Etienne Krieger- 4.1
Approx. 11 hours to complete
Fostering the development of your concept 1 The challenges of intellectual property to exploit an innovation 1/3 2 The challenges of intellectual property to exploit an innovation 2/3 3 The challenges of intellectual property to exploit an innovation 3/3...