Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

8 hours of advanced C projects Cyber Security

Rekomendowane odpowiedzi

f204a7d904ecf4f9b7494293104bcec7.jpeg
Free Download 8 hours of advanced C projects Cyber Security
Published 10/2024
Created by dr Jonas Birch, C programming ninja
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 13 Lectures ( 8h 0m ) | Size: 4.14 GB

Write Tor clients, encryption libraries and safestring libraries. You will also learn Linux filesystem Security in depth
What you'll learn
Learn to write your own Cyber Security tools
Learn to write tools which utilise network connections.
Improve your knowledge in advanced C concepts like pointers and structs etc.
Learn about encryption, the Tor network, to write unhackable code and so on.
Learn about Linux filesystem security
Requirements
This course is at intermediate-advanced level so you should have knowledge about the beginner stuff at least.
Description
8 hours of advanced C projects: Cyber SecurityThis is an 8 hour composite course (divided in 13 different 40min videos) containing my best content with regards to Cyber Security. You will get an in-depth knowledge in writing encryption tools, connecting to the Tor privacy network, and how to write safe, un-hackable C code by making a safe string library.When doing all of this practically, I will explain all the necessary theory while we're coding. So there are no dense sections of heavy theory but you will still learn everything you need in order to fully understand the things we are building. While on this journey, you will also improve your knowledge of some of the more advanced features of the C language. Like how dynamic memory works, how you deal with linked lists, everything about advanced pointers, operating system functions (syscalls) as well as some binary bitwise operations, etc.You will also learn the basics of Linux file system security and a whole lot more. And, as always, in 1080p resolution. Enjoy!Best regards,JBFree previewDo not miss out of the free preview. You can watch the entire first episode (40min!) for free. That contains the most part of one of my best C projects, the Toralizer. It is a command-line tool which lets you redirect any other Linux command through the Tor network.Example:bash--description--nbsp;toralize curlhttp://website-urlThis will connect to the Tor privacy network and access the website. This works with any Linux command and we will code this tool from scratch to the finish line, in this course.PrerequisitesThis is not a beginner course in the C language (I have courses like that too). This is for people who already knows the basics of C and wants to take the next step to intermediate-advanced level knowledge of the C language.This course is also for C coders who wish to know more about Cyber Security.The authordr. Jonas Birch has been programming the C language for more than 25 years and he's been teaching for the last 7-8 years. He has a background in the Cyber Security industry and he's a Senior network engineer. His videos are very popular (some are the highest rated courses on Udemy, in its category) and he's got a very soothing voice which is easy for the ears.Table of Contents00:00:00 Toralizer part 101:27:29 Xor encryption01:39:09 Coding a real encryption library04:05:41 How to install your own C library04:15:13 Learn Linux file system security04:44:51 Coding a file encryptor, part 105:37:21 Coding a file encryptor, part 206:05:00 Write unhackable code (safe string lib)07:19:47 Toralizer part 2
Who this course is for
C programmers interested in Cyber Security and who wants to do more advanced projects.
Homepage

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

Screenshot








Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 8 Views
    • 1 Posts
    • 20 Views
    • 1 Posts
    • 11 Views
    • 1 Posts
    • 14 Views
    • 1 Posts
    • 16 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.