Metasploit: Penetration Testing Software Arabic
Offered By: YouTube
Course Description
Overview
Syllabus
01-Metasploit : Penetration Testing Software (Lecture 1) By Eng-Abdallah Elsokary | Arabic.
02-Metasploit: Penetration Testing Software (Lecture 2) By Eng-Abdallah Elsokary | Arabic.
03-Metasploit: Penetration Testing Software (Lecture 3) By Eng-Abdallah Elsokary | Arabic.
04-Metasploit: Penetration Testing Software (Lecture 4) By Eng-Abdallah Elsokary | Arabic.
05-Metasploit: Penetration Testing Software (Lecture 5) By Eng-Abdallah Elsokary | Arabic.
06-Metasploit: Penetration Testing Software (Lecture 6) By Eng-Abdallah Elsokary | Arabic.
07-Metasploit: Penetration Testing Software (Lecture 7) By Eng-Abdallah Elsokary | Arabic.
08-Metasploit: Penetration Testing Software (Lecture 8) By Eng-Abdallah Elsokary | Arabic.
09-Metasploit: Penetration Testing Software (Lecture 9) By Eng-Abdallah Elsokary | Arabic.
10-Metasploit: Penetration Testing Software (Lecture 10) By Eng-Abdallah Elsokary | Arabic.
11-Metasploit: Penetration Testing Software (Lecture 11) By Eng-Abdallah Elsokary | Arabic.
12-Metasploit: Penetration Testing Software (Lecture 12) By Eng-Abdallah Elsokary | Arabic.
13-Metasploit: Penetration Testing Software (Lecture 13) By Eng-Abdallah Elsokary | Arabic.
14-Metasploit: Penetration Testing Software (Lecture 14) By Eng-Abdallah Elsokary | Arabic.
15-Metasploit: Penetration Testing Software (Lecture 15) By Eng-Abdallah Elsokary | Arabic.
16-Metasploit: Penetration Testing Software (Lecture 16 ) By Eng-Abdallah Elsokary | Arabic.
17-Metasploit: Penetration Testing Software (Lecture 17) By Eng-Abdallah Elsokary | Arabic.
18-Metasploit: Penetration Testing Software (Lecture 18) By Eng-Abdallah Elsokary | Arabic.
Taught by
Free4arab and Information Technology
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network