Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CyberSecurity 2

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

==========================================================

AFTER THAT... KEEP MOVING AND DON'T STOP...

1 - CEH => https://www.youtube.com/watch?


v=eNlHwyYBt0Y&list=PLCIJjtzQPZJ9iJ3NS1xXJKyCOyD90dHuH +
https://www.youtube.com/playlist?list=PLKMMmxh_kxS1J6T87GkWBvFt37JBzXxWy

2 - Metasploit Framework =>


https://www.youtube.com/channel/UCCL_vo2ZoeDleibXikT9efQ/playlists

2 - Network Penetration Testing =>


https://drive.google.com/drive/folders/0B9h6Z88xmpyKbjcwcmVOdWl6S1k

3 - Web Penetration Testing =>


https://drive.google.com/drive/folders/0B9h6Z88xmpyKcnlJb05DcHB5WUk +
https://www.youtube.com/watch?v=BjfCWSFmIFI&list=PLv7cogHXoVhXvHPzIl1dWtBiYUAL8baHj
[still not completed!!]

4 - Reverse Engineering => [search here:


https://drive.google.com/drive/folders/0B9h6Z88xmpyKOFYwd2RWWHViZXc]

5 - Exploit Development => [search here:


https://drive.google.com/drive/folders/0B9h6Z88xmpyKOFYwd2RWWHViZXc]

6 - Python Security [Recommended from BOOKS NOT VIDEOS!!] =>


https://drive.google.com/drive/folders/0B9h6Z88xmpyKQ01fa3VyM1lmSjQ

[Remember KEEP MOVING...]

You might also like