Short CourseVulnerability Assessment and Pentesting
Short Course

Ethical Hacking with Ruby for Beginners

Ethical Hacking with Ruby for Beginners

Vulnerability Assessment and Pentesting

iconAdvanced

icon5( 52 Reviews )

icon 5 hrs 25 mins

Vulnerability Assessment and Pentesting

iconAdvanced
icon5(52 Reviews)
icon5 hrs 25 mins Hrs
Exploit real-life vulnerabilities and train your ethical hacking skills with offensive Ruby programming.

Exploit real-life vulnerabilities and train your ethical hacking skills with offensive Ruby programming.

icon15 Premium Lessons
icon2 Quizzes & Assessments
iconCertificate of Completion

Create Your Free Account

Get immediate access to 25+ free cybersecurity and IT courses!

OR

Reviews

5

52 reviews

Average Course Rating

5 stars

73%

4 stars

10%

3 stars

12%

2 stars

2%

1 stars

4%

Related Courses

Short Course

CCNA - Understanding Routers and Switches

CCNA - Understanding Routers and Switches

Security Architecture and Operations

A comprehensive guide to understanding the in-depth functioning of routers and switches for the preparation of CCNA Exam.

iconIntermediate
icon2 hr
icon4.4

Short Course

SOC Lab: Threat Hunting com Wazuh + Grafana - Portuguese

SOC Lab: Threat Hunting com Wazuh + Grafana - Portuguese

Vulnerability Assessment and Pentesting

Threat Hunting Mastery: Integrando Wazuh e Fortalecendo a Segurança em Windows e Linux

iconIntermediate
icon14 hrs
icon4.5

Short Course

CISSP Certification Domains 5, 6, 7, and 8 Video Training

CISSP Certification Domains 5, 6, 7, and 8 Video Training

Cybersecurity

This course is ideal for individuals who desire to pass the Information Systems Security Professional CISSP Certification Exam and want to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective.

iconIntermediate
icon7 hrs
icon4.5

Short Course

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish

Cybersecurity

Domina Metasploit y técnicas de hacking ético: vulnerabilidades, explotación y creacion de malware ¡Desde 0 a experto!

iconAdvanced
icon16 hrs
icon3.8