If you wish to know more, please contact us on +971 58 290 0771

Designed for students who have completed the Introduction to Coding in C# course.

The first level covers the basics of internet security and hacking, including concepts such as “pentesting”, hacking, scripts, and hacking programs. Students will learn about various types of attacks and how to protect themselves from them.

  • 14 Lessons (Once or twice per week)

  • 2 x 45 min (Lesson)

  • Maximum number of students (10)


Per Installment 512.00 AED

or

one time payment (discount 189AED) 2,883.00 AED


Do you have any questions?

Intro

In addition to hacking, the course covers modern website-building techniques with HTML, CSS, JavaScript, and content management systems. Students will create and publish their own website, complete with interactive elements. Our online classes are personalized and interactive, providing direct access to the teacher's screen for real-time feedback and support. This is not just another webinar or YouTube course. Each student has the opportunity to ask questions by voice and receive prompt answers. Join us and discover the exciting world of internet security and website development!

Plan of the course

Introduction and basic concepts related to hacking. Cmd - basic commands. Batch files bat. Virus overload memory (aplication floader).
Social Enginering attack. Zip Bomb virus. Wiping.
Starting the virus in Invisible Mode. Viruses Folder Floading and File Floading.
DOS and DDOS attacks (carried out using cmd).
Creating so called Phishing attack - desktop application pretending to be another application (on the example of Tibia game). Quiz.
Creating websites: HTML.
Creating websites: JavaScript, CSS.
Creating so-called Phishing attack - a website application pretending to be a Facebook login page.
Anonymity in Internet, Deep Web, Proxy, VPN, Tor.
Cryptography and Cryptanalysis. Ciphers and hashes. Security of passwords and ways of breaking them. Quiz.
Virtual Box. Installation of Kali Linux and getting to know the Linux commands, Information Gathering - getting to know the tools used to perform reconnaissance.
Kali Linux - Password Cracking - tools for password cracking.
Kali Linux - DDOS attacks carried out with the help of tools provided by Kali Linux (Ettercap, Slowloris).
Creating Keylogger. Quiz.