Do you want to know more? Call us: +65 9120 7550

Our partners

Classes for students who have completed the first semester of the Hacking and Web Creation course.

Advanced secrets of hacking, Internet security and computer threats. The classes also have a panel of websites, where participants create and secure websites.

  • 14 meetings (once a week)

  • 2 x 45 min (every meeting)


monthly payment 227 S$

or

one time payment (discount 40 S$) 870 S$


Do you have any questions?

Intro

In this course, the student learns the secrets of hacking (keyloggers, attacks, password capture) in order to know how to protect themselves from it. He also learns techniques for building modern websites and creating interactive elements (HTML, CSS, JavaScript). He also shows CMS content management systems. Students create and publish their own website. Our online classes are NOT a webinar or a course like on Youtube! During our online classes each student will see the teacher's screen, hear what he or she is saying, and the teacher will have an insight into what the student is doing and saying (he or she will see each student's screen). Each student will be able to ask a question by voice, the teacher will be able to answer every question and indicate exactly where the error is and how to fix it.

Plan of the course

During the lesson we will discuss the technical aspects of hiding applications in other applications, how it works in general and how such software is written. During the lesson we will write an application that will be hidden e.g. in a popular PDF reader.
The purpose of this lesson is to discuss the purpose of code obfuscation and how to implement it. At first glance, the topic seems very complicated. It is one of the methods of optimization and acceleration of code written by programmers, but also unfortunately used by criminals to make it difficult to analyze the virus code and make it unreadable (obfuscated) for antivirus software.
Ransomware is one of the most dangerous threats in IT security. In the lesson we will present why it is so dangerous and try to write a mechanism that is hidden in every ransomeware.
The Internet is the largest computer network ever created and is constantly growing. During the course, you will learn how it happens that after entering the website www.giganciprogramowania.edu.pl you find the appropriate page. You will learn all the way your request to display a page takes and how it happens that criminals try to modify and attack various elements of this process.
This website uses cookies ... In this lesson we will discuss why almost every website informs us that it uses cookies, why we receive such a message and whether cookies are actually so dangerous. Ps. Cookies are safe ... unless someone knows how to steal them and knows what to do with them. This will be shown during the lesson.
"Very vulnerable web application" - Presentation of an application for practicing (safe!) attacks on web applications. Applying knowledge to practice and discussing various vulnerabilities that can be detected in websites and web applications.
Every programmer makes mistakes sometimes, some are costly, such as XSS. The student will exploit a bug in the software.
Advanced websites use databases to store content and programmers make mistakes. These mistakes allow access to the database directly and thus to things that should remain hidden from the ordinary user.
In web applications, the above vulnerability is 10 out of 10 on the "problematic" scale. Remote code execution is the worst error that can be found in the application - students will practice how it works and why.
Can you come up with a secure password that is easy to remember? Which password is safer - DifficultPasswordToRemember or maybe P@ssw0rd1! @ #? In this lesson you will learn and understand how passwords are broken by various methods and thus how to safely use and manage passwords.
The aim of the lesson is to learn the method of DNS Spoofing hacking attack
Wireless is an interesting example of the development of technology and the method of Internet delivery. It also gives opportunities for attacks and eavesdropping. During the course, the methods of securing the network will be discussed in detail. We will also learn how to make the unauthorized access difficult. We will present a bug in the implementation of a certain function that allows you to access the network in maximum 10 minutes.