
- Instructor: Rosy Janner
- Lectures: 11
- Quizzes: 3
- Duration: 10 weeks
certification is primarily designed for professionals who want to specialize in penetration testing. However, any excellent defender needs to know what exactly they’re defending against. This certification will teach you how to identify attacks and perform those attacks yourself. While this certification is intended for intermediate-level professionals with several years of information security experience, you can study for this certification and get it today.
Curriculum
- 4 Sections
- 11 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- OverviewIn this section we'll show you how this course has been structured and how to get the most out of it. We'll also show you how to solve the exercises and submit quizzes.2
- BasicsIn this section you'll learn some basic concepts of programming languages and how to use them. You'll also learn how to write clean code using different code editors and tools.7
- 2.1Working with Strings – Part 840 Minutes
- 2.2Working with Numbers – Part 835 Minutes
- 2.3Tuples, Sets, and Booleans – Part 820 Minutes
- 2.4Regular Expressions – Part 820 Minutes
- 2.5Version Control – Part 830 Minutes
- 2.6Function Exercises – Part 810 Minutes3 Questions
- 2.7Model Forms Exercise – Part 810 Minutes3 Questions
- AdvancedIn this section you'll learn some core concepts of Object Oriented Programming. You'll also learn how to structure the data, debug and handling exceptions.4
- ConclusionLorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type.1