Nilesh Kumar Jadav
Our main goal is to improvise Science and Technology with better motivation, this can be achieved by developing something better and life saver application.
This Channel contain low level programming on C#, Asp.Net, SQL Server apart from that it also deals with CyberSecurity and its major domain, Linux Stuff and also Advance Computer Networking. The channel outcome is specifically for the people who are working majorly with developing software and websites furthermore for people who are constantly diving deep in the cybersecurity domain.
Vulnerability Scanning using Nessus | Ethical hacking from Scratch
Vulnerability Scanning using Nmap Security Engine | Ethical hacking from Scratch
Introduction to Vulnerability Scanning | Ethical Hacking from Scratch
Simple Network Management Protocol (SNMP) Enumeration | Ethical hacking from Scratch
NTP Enumeration | Ethical Hacking from Scratch
NetBIOS Enumeration | Ethical hacking from Scratch
LDAP Enumeration | Ethical hacking from Scratch
DNS Enumeration | Ethical hacking from Scratch
DNS Reconnaissance using nslookup | Ethical hacking from Scratch
Whois and Netcraft Tool | Ethical hacking from Scratch
Port Scanning 2 | Ethical hacking from Scratch
Port Scanning 1 | Ethical hacking from Scratch
Introduction to Port Numbers | Ethical hacking from Scratch
Information Gathering using OSINT and Recon-ng | Ethical hacking from Scratch
Information Gathering using Maltego | Ethical hacking from Scratch
Google Dork | Ethical hacking from Scratch
Gathering Information through Search Engines and Social Media | Ethical hacking from Scratch
Kali Linux Directory Structure | Ethical Hacking from Scratch
Linux Command 3 | Ethical Hacking from Scratch
Linux Command 2 | Ethical Hacking from Scratch
Linux Commands | Ethical hacking from Scratch
Configuring Kali Machine | Ethical Hacking from Scratch
Introduction to Virtual Machine
Installing Kali Machine in VMWare
What is Integrity and Availability
What is Confidentiality
Attack, ZeroDay, Bots and Daisy Chaining
Hack Value Vulnerabilities, Exploite and Payload
Course Overview - Ethical Hacking from Scratch
Ado.Net Console Application in C# | Using C# | ADO.NET | SQL Server - Part 2