8 hours of advanced C projects Cyber Security

dkmdkm

U P L O A D E R
f204a7d904ecf4f9b7494293104bcec7.jpg

Free Download 8 hours of advanced C projects Cyber Security
Published 10/2024
Created by dr Jonas Birch, C programming ninja
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 13 Lectures ( 8h 0m ) | Size: 4.14 GB

Write Tor clients, encryption libraries and safestring libraries. You will also learn Linux filesystem Security in depth
What you'll learn
Learn to write your own Cyber Security tools
Learn to write tools which utilise network connections.
Improve your knowledge in advanced C concepts like pointers and structs etc.
Learn about encryption, the Tor network, to write unhackable code and so on.
Learn about Linux filesystem security
Requirements
This course is at intermediate-advanced level so you should have knowledge about the beginner stuff at least.
Description
8 hours of advanced C projects: Cyber SecurityThis is an 8 hour composite course (divided in 13 different 40min videos) containing my best content with regards to Cyber Security. You will get an in-depth knowledge in writing encryption tools, connecting to the Tor privacy network, and how to write safe, un-hackable C code by making a safe string library.When doing all of this practically, I will explain all the necessary theory while we're coding. So there are no dense sections of heavy theory but you will still learn everything you need in order to fully understand the things we are building. While on this journey, you will also improve your knowledge of some of the more advanced features of the C language. Like how dynamic memory works, how you deal with linked lists, everything about advanced pointers, operating system functions (syscalls) as well as some binary bitwise operations, etc.You will also learn the basics of Linux file system security and a whole lot more. And, as always, in 1080p resolution. Enjoy!Best regards,JBFree previewDo not miss out of the free preview. You can watch the entire first episode (40min!) for free. That contains the most part of one of my best C projects, the Toralizer. It is a command-line tool which lets you redirect any other Linux command through the Tor network.Example:bash--description--nbsp;toralize curlhttp://website-urlThis will connect to the Tor privacy network and access the website. This works with any Linux command and we will code this tool from scratch to the finish line, in this course.PrerequisitesThis is not a beginner course in the C language (I have courses like that too). This is for people who already knows the basics of C and wants to take the next step to intermediate-advanced level knowledge of the C language.This course is also for C coders who wish to know more about Cyber Security.The authordr. Jonas Birch has been programming the C language for more than 25 years and he's been teaching for the last 7-8 years. He has a background in the Cyber Security industry and he's a Senior network engineer. His videos are very popular (some are the highest rated courses on Udemy, in its category) and he's got a very soothing voice which is easy for the ears.Table of Contents00:00:00 Toralizer part 101:27:29 Xor encryption01:39:09 Coding a real encryption library04:05:41 How to install your own C library04:15:13 Learn Linux file system security04:44:51 Coding a file encryptor, part 105:37:21 Coding a file encryptor, part 206:05:00 Write unhackable code (safe string lib)07:19:47 Toralizer part 2
Who this course is for
C programmers interested in Cyber Security and who wants to do more advanced projects.
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Screenshot







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar

aaf67cdfab7463de78e662c65836f2c9.jpg

8 Hours Of Advanced C Projects: Cyber Security
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.71 GB | Duration: 8h 1m​

Write Tor clients, encryption libraries and safestring libraries. You will also learn Linux filesystem Security in depth

What you'll learn

Learn to write your own Cyber Security tools

Learn to write tools which utilise network connections.

Improve your knowledge in advanced C concepts like pointers and structs etc.

Learn about encryption, the Tor network, to write unhackable code and so on.

Learn about Linux filesystem security

Requirements

This course is at intermediate-advanced level so you should have knowledge about the beginner stuff at least.

Description

8 hours of advanced C projects: Cyber SecurityThis is an 8 hour composite course (divided in 13 different 40min videos) containing my best content with regards to Cyber Security. You will get an in-depth knowledge in writing encryption tools, connecting to the Tor privacy network, and how to write safe, un-hackable C code by making a safe string library.When doing all of this practically, I will explain all the necessary theory while we're coding. So there are no dense sections of heavy theory but you will still learn everything you need in order to fully understand the things we are building. While on this journey, you will also improve your knowledge of some of the more advanced features of the C language. Like how dynamic memory works, how you deal with linked lists, everything about advanced pointers, operating system functions (syscalls) as well as some binary bitwise operations, etc.You will also learn the basics of Linux file system security and a whole lot more. And, as always, in 1080p resolution. Enjoy!Best regards,JBFree previewDo not miss out of the free preview. You can watch the entire first episode (40min!) for free. That contains the most part of one of my best C projects, the Toralizer. It is a command-line tool which lets you redirect any other Linux command through the Tor network.Example:bash$ toralize curl
Bitte Anmelden oder Registrieren um Links zu sehen.
will connect to the Tor privacy network and access the website. This works with any Linux command and we will code this tool from scratch to the finish line, in this course.PrerequisitesThis is not a beginner course in the C language (I have courses like that too). This is for people who already knows the basics of C and wants to take the next step to intermediate-advanced level knowledge of the C language.This course is also for C coders who wish to know more about Cyber Security.The authordr. Jonas Birch has been programming the C language for more than 25 years and he's been teaching for the last 7-8 years. He has a background in the Cyber Security industry and he's a Senior network engineer. His videos are very popular (some are the highest rated courses on Udemy, in its category) and he's got a very soothing voice which is easy for the ears.Table of Contents00:00:00 Toralizer part 101:27:29 Xor encryption01:39:09 Coding a real encryption library04:05:41 How to install your own C library04:15:13 Learn Linux file system security04:44:51 Coding a file encryptor, part 105:37:21 Coding a file encryptor, part 206:05:00 Write unhackable code (safe string lib)07:19:47 Toralizer part 2

Overview

Section 1: Cyber Security

Lecture 1 Ep 01 - Writing your own Toralizer, part 1.

Lecture 2 Ep 02 - .Part two

Lecture 3 Ep 03 - Xor encryption

Lecture 4 Ep 04 - Coding a real encryption library, part 1.

Lecture 5 Ep 05 - .Part two

Lecture 6 Ep 06 - .Part three

Lecture 7 Ep 07 - Linux filesystem security

Lecture 8 Ep 08 - Coding a file encryptor, part 1.

Lecture 9 Ep 09 - Part two

Lecture 10 Ep 10 - Write unhackable code (safe string library), part 1.

Lecture 11 Ep 11 - .Part two

Lecture 12 Ep 12 - Toralizer: Finishing the project, part 1.

Lecture 13 Ep 13 - .Part two

C programmers interested in Cyber Security and who wants to do more advanced projects.

7h16bweN_o.jpg


FileAxa
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
FileStore
FileFactory
TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

dcaa9e868158067d6b529e83d8ffac6e.jpg

8 Hours Of Advanced C Projects: Cyber Security
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.71 GB | Duration: 8h 1m​

Write Tor clients, encryption libraries and safestring libraries. You will also learn Linux filesystem Security in depth

What you'll learn

Learn to write your own Cyber Security tools

Learn to write tools which utilise network connections.

Improve your knowledge in advanced C concepts like pointers and structs etc.

Learn about encryption, the Tor network, to write unhackable code and so on.

Learn about Linux filesystem security

Requirements

This course is at intermediate-advanced level so you should have knowledge about the beginner stuff at least.

Description

8 hours of advanced C projects: Cyber SecurityThis is an 8 hour composite course (divided in 13 different 40min videos) containing my best content with regards to Cyber Security. You will get an in-depth knowledge in writing encryption tools, connecting to the Tor privacy network, and how to write safe, un-hackable C code by making a safe string library.When doing all of this practically, I will explain all the necessary theory while we're coding. So there are no dense sections of heavy theory but you will still learn everything you need in order to fully understand the things we are building. While on this journey, you will also improve your knowledge of some of the more advanced features of the C language. Like how dynamic memory works, how you deal with linked lists, everything about advanced pointers, operating system functions (syscalls) as well as some binary bitwise operations, etc.You will also learn the basics of Linux file system security and a whole lot more. And, as always, in 1080p resolution. Enjoy!Best regards,JBFree previewDo not miss out of the free preview. You can watch the entire first episode (40min!) for free. That contains the most part of one of my best C projects, the Toralizer. It is a command-line tool which lets you redirect any other Linux command through the Tor network.Example:bash$ toralize curl
Bitte Anmelden oder Registrieren um Links zu sehen.
will connect to the Tor privacy network and access the website. This works with any Linux command and we will code this tool from scratch to the finish line, in this course.PrerequisitesThis is not a beginner course in the C language (I have courses like that too). This is for people who already knows the basics of C and wants to take the next step to intermediate-advanced level knowledge of the C language.This course is also for C coders who wish to know more about Cyber Security.The authordr. Jonas Birch has been programming the C language for more than 25 years and he's been teaching for the last 7-8 years. He has a background in the Cyber Security industry and he's a Senior network engineer. His videos are very popular (some are the highest rated courses on Udemy, in its category) and he's got a very soothing voice which is easy for the ears.Table of Contents00:00:00 Toralizer part 101:27:29 Xor encryption01:39:09 Coding a real encryption library04:05:41 How to install your own C library04:15:13 Learn Linux file system security04:44:51 Coding a file encryptor, part 105:37:21 Coding a file encryptor, part 206:05:00 Write unhackable code (safe string lib)07:19:47 Toralizer part 2

Overview

Section 1: Cyber Security

Lecture 1 Ep 01 - Writing your own Toralizer, part 1.

Lecture 2 Ep 02 - .Part two

Lecture 3 Ep 03 - Xor encryption

Lecture 4 Ep 04 - Coding a real encryption library, part 1.

Lecture 5 Ep 05 - .Part two

Lecture 6 Ep 06 - .Part three

Lecture 7 Ep 07 - Linux filesystem security

Lecture 8 Ep 08 - Coding a file encryptor, part 1.

Lecture 9 Ep 09 - Part two

Lecture 10 Ep 10 - Write unhackable code (safe string library), part 1.

Lecture 11 Ep 11 - .Part two

Lecture 12 Ep 12 - Toralizer: Finishing the project, part 1.

Lecture 13 Ep 13 - .Part two

C programmers interested in Cyber Security and who wants to do more advanced projects.

CDlLePOq_o.jpg



TurboBit
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
AlfaFile
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
FileFactory
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten