Courses

We found 5 courses available for you
See
-80%

Basic Kali Linux Video Course

31 Lessons
40 hours
Intermediate

Latest Student Reviews Google Review(1120)  5/5 Name Testimonial Review …

What you'll learn
Exploits and Client-Side Attack.
How to use Vulnerability Assessment Tools for System.
Data Collection, Evidence Management, and Reporting.
-29%

Python With Data Science

8 Lessons
40 hours
Intermediate

Requirements No Linux, programming knowledge required. Knowledge of Information Security. …

What you'll learn
About Python /Python History
Conditional Statement
learn how to Interacting with Networks
Multithreading
How to debug python programs
Common Gateway Interface
How statistical modeling relates to machine learning and how to compare them
Loop and string
Control Statement
Input / Output
Functions and Module
Unsupervised learning algorithms, including Clustering and Dimensionality Reduction
Two main types of machine learning methods: supervised and unsupervised and how they are different
-25%

Android Programming App Development

40 hours
Intermediate

Student Ratings & Reviews Google Review(1120)  5/5 Name Testimonial …

What you'll learn
Introduction to Android.
Basic UI/UX design.
JAVA Concepts
SQL.
Android Debug Bridge (ADB) tool.
Free

Ethical Hacking Test

40 hours
Intermediate

Students Also Bought Related Courses Online Python Programming Course  …

What you'll learn
Introduction to Basics of Cyber Security
In-depth Network Scanning
System Hacking Password Cracking & Bypassing
Mobile Hacking
Web Session Hijacking
Viruses and Worms, Trojan and Back door, SQL Injection Manual Testing
Hacking Webservers Server Rooting, Hacking Wireless Network, Penetration Testing: Basics
Internet of Things (IoT) Hacking, Cloud Security, and many more.
-19%

Forensic Toolkit FTK Training Certification

40 hours
Intermediate

Forensic Toolkit Our Course Advisor Computer Forensics: FTK Forensic Toolkit …

What you'll learn
Defining digital evidence and their types
Different processes for different devices
How to set up Computer forensics laboratory
Enroll Now!













Craw Cyber Security Private Limited