Experiences

Shaqjohari

Shaqjohari

Saturday, 23 March 2019 21:58

Penetration Testing with PowerShell Empire

Penetration Testing with PowerShell Empire teaches you how to harness the awesome power of Windows PowerShell to conduct modern enterprise computer attacks against high security networks. In this course, you will learn how to leverage all of PowerShell Empire's features and capabilities so that you can conduct realistic, high-value penetration tests in high security networks. If you're a pentester and you're not using Empire...you're doing it wrong! 

Saturday, 23 March 2019 21:16

What is Penetration Testing?

What is Penetration Testing?

Penetration testing is a type of security testing that is used to test the insecurity of an application. It is conducted to find the security risk which might be present in the system. If a system is not secured, then any attacker can disrupt or take authorized access to that system. Security risk is normally an accidental error that occurs while developing and implementing the software. For example, configuration errors, design errors, and software bugs, etc.

 

Why is Penetration Testing Required?


Penetration testing normally evaluates a system’s ability to protect its networks, applications, endpoints and users from external or internal threats. It also attempts to protect the security controls and ensures only authorized access.

Penetration testing is essential because −

Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you.

You certainly will always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay on top of your account security. You can always head to www.haveibeenpwned.com to check if you're at risk but simply thinking your password is secure enough to not be hacked into, is a bad mindset to have.

So, to help you understand just how hackers get your passwords – secure or otherwise – we've put together a list of the top ten password-cracking techniques used by hackers. Some of the below methods are certainly outdated, but that doesn't mean they aren't still being used. Read carefully and learn what to mitigate against.

About this course

Learn Ethical Hacking from scratch with Metasploit , exploit vulnerabilities and become a white hat hacker

Sunday, 25 November 2018 11:23

Adobe Photoshop with in-depth

This certificate above verifies that Shaqis Aldi successfully completed the course Photoshop In-Depth: Master all of Photoshop's Tools Easily on 11/25/2018 as taught by Chad Neuman, Ph.D. on Udemy. The certificate indicates the entire course was completed as validated by the student.

Saturday, 24 November 2018 12:34

Design a Simple Flayers

Design a simple flayers for Mualamalat Bank to promo online banking.

Friday, 23 November 2018 21:15

Drupal 8 Site Building

Description : Summary about the course

Learn how to build powerful and flexible websites using Drupal 8

Drupal is a powerful CMS and can be used to create all sorts of websites. What makes it unique is how it’s built and customized.

When building websites using other CMSs, if you need some specific functionality, let’s say a business directory portal, you’ll often find a plugin which implements the functionality end-to-end. But if you want to modify something often these plugins, in other CMSs, they are difficult to customize.

Friday, 09 November 2018 14:46

Kali Linux Web App Pentesting Labs course

Kali Linux Web App Pentesting Labs course! This course will be 100% hands-on, focusing specifically on exploitation of vulnerable web applications. We’ll be building a lab environment consisting of Kali Linux, and several intentionally vulnerable web applications including Beebox, SQL injection labs, OWASP Juice Shop, and WebGoat.

Thursday, 08 November 2018 23:50

Penetration Testing Labs

Looking for Powerpoint slides and lectures that will put you to sleep? Keep moving, because this course is not for you.

This course consists of 100% hands-on technical labs, utilizing industry standard open source technology to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included within this course (VMware Player, Kali Linux, Kioptrix, etc.). To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.

Thursday, 08 November 2018 21:18

Laravel 5 CRUD

Very simple and basic introduction to Laravel 5 by creating a simple application. The application will allow you to add tasks to the database, read them on website, update to completed or not completed and delete them.

You will learn simple database operations in Laravel framework - create, read, update and delete called CRUD.

Page 1 of 3