Available courses

Understand basic networking concepts, IP addressing, and how Linux handles networking through commands like ip
, netstat
, and ping
.
- Teacher: System Administrator

This course introduces Linux, its history, distributions, and core functionalities. Learn basic Linux commands for web security
- Teacher: System Administrator

Learn how to set up a virtual lab environment for testing web application vulnerabilities safely
- Teacher: System Administrator

Dive into the OWASP Top 10 vulnerabilities, learn their significance, and explore common attack methods and defenses.
- Teacher: System Administrator

Solve realistic security challenges in a simulated environment to demonstrate your skills.
- Teacher: System Administrator

This course focuses on vulnerabilities in web applications that allow OS command injection. It covers exploitation techniques for executing arbitrary commands on the server and teaches methods for securing applications against such attacks
- Teacher: System Administrator

Learn how path traversal vulnerabilities can allow attackers to access unauthorized files and directories on the server. This course explores exploitation techniques and preventive measures to secure file systems.
- Teacher: System Administrator

This course covers the vulnerabilities associated with improper file upload mechanisms in web applications, including the risks of arbitrary file execution and how to exploit them.
- Teacher: System Administrator

Explore weak authentication systems, session hijacking techniques, and best practices for strengthening authentication and session security.

Learn how insecure deserialization can be exploited to compromise web applications and how to protect against such attacks.
- Teacher: System Administrator

Study the mechanics of CSRF attacks and explore practical exploitation scenarios along with token-based prevention methods
- Teacher: System Administrator

Understand XSS vulnerabilities, types of attacks (Stored, Reflected, DOM-Based), and effective mitigation techniques.
- Teacher: System Administrator

Learn about injection attacks like SQL and command injection, their exploitation techniques, and how to prevent them.
- Teacher: System Administrator

Explore tools like Nikto, Dirb, Gobuster, and Wfuzz for web scanning, directory enumeration, and brute-forcing.
- Teacher: System Administrator

Get hands-on experience with Burp Suite for intercepting HTTP requests, vulnerability scanning, and manual testing.
- Teacher: System Administrator

Learn secure coding techniques, input validation methods, and strategies for writing web applications resistant to common vulnerabilities
- Teacher: System Administrator

This course provides hands-on training in Cyber Security and Ethical Hacking. It covers fundamental concepts such as network security, penetration testing, web security, digital forensics, and incident response. Students will use industry-standard tools and methodologies to identify vulnerabilities and secure systems against cyber threats. The course is structured with practical labs, real-world case studies, and interactive assessments to enhance learning
- Teacher: System Administrator
- Student: Yunusa Abubakar
- Student: Zakariyya Dahuru Musa
- Student: Mahmud Kani
- Student: Jecinta Ribomtop