You need to pay for the course only once in order to get full access. We guarantee you will have access to all course content for at least 1 year from purchase date, in most cases you will have access indefinitely.
You can access course materials from a Laptop, iPhone, iPad, Android, Windows Phone and virtually any device with modern Internet browser. Live tutoring is limited to PC, Mac and Linux only at the moment.
If you purchased the course and for some reasons are not satisfied with it, please contact us at email@example.com and we will resolve the problem.
Price is a subject for European Value Added Tax (VAT). If you live outside of EU, you won't have to pay VAT. If you do live in EU, we will automatically calculate correct amount of VAT based on your billing country.
Lecture # 1 –Introduction to Cyber Security & Ethical Hacking
Lecture # 2 - Introduction to Hacking, IP Addresses, IP Enumeration, Finding out IP Addresses, Image Tracking, File Tracking, Tracing an IP Address and Tracing a Mobile Phone
Lecture # 3 -NAT, Internal VS External IP Addresses, IP Address Hiding, Perfect Cyber Crime, Proxy Server, Unblocking Websites, People Hacking, VPN and HTTP Tunneling
Lecture # 4 -Network Reconnaissance & Information Gathering Part 1
Lecture # 5 -Network Reconnaissance & Information Gathering Part 2
Lecture # 6 -Network Reconnaissance & Information Gathering Part 3
Lecture # 7 - Trojans, Keyloggers and Spyware Attacks
Lecture # 8 -Password Cracking Attacks Part 1
Lecture # 9 -Password Cracking Attacks Part 2
Lecture # 10 -DOS Attacks, Distributed DOS Attacks, Data Encryption, Data Hiding and Steganography - Part 1
Lecture # 11 -Steganography -Part 2, Phishing Attacks, Link Manipulation Attacks & Open Redirection Attacks
Lecture # 12 -Cross Site Scripting Attacks, Cookie Stealing and Session Hijacking
Lecture # 13 - 25 Attacks with Backtrack
Lecture # 14 -Wi-Fi Hacking - Part 1
Lecture # 15 -Wi-Fi Hacking - Part 2
Lecture # 16 - Reverse & Bind Shell Attacks
Lecture # 17- Social Engineering Toolkit Attacks
Lecture # 18- Kali and POS Hacking
Lecture # 19- Honeypots & Computer Forensics
Lecture # 20- ARP Poisoning
Lecture # 21- SQL Injection and Q& A Session Hands on workshop & Q&A-LIVE