0% found this document useful (0 votes)
175 views10 pages

Course List & Its Durations

The document lists various online courses related to topics like cybersecurity, ethical hacking, programming, and business/marketing. It provides the course name, estimated duration in hours or minutes, and percentage completed for each course. Many courses on cybersecurity, ethical hacking, and programming are partially or fully completed, while some business/marketing courses are around 50% completed, suggesting the learner is sampling a wide range of topics.

Uploaded by

empty yeman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views10 pages

Course List & Its Durations

The document lists various online courses related to topics like cybersecurity, ethical hacking, programming, and business/marketing. It provides the course name, estimated duration in hours or minutes, and percentage completed for each course. Many courses on cybersecurity, ethical hacking, and programming are partially or fully completed, while some business/marketing courses are around 50% completed, suggesting the learner is sampling a wide range of topics.

Uploaded by

empty yeman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Course Name Duration % of Complete

Practical Password 1 Hour Completed


Microsoft Office Sway - a PowerPoint replacement made easy 1 Hour Completed
Password Hacking Software's 1 Hour Completed
Complete Ethical Hacking Course: Zero to Hero 41 Min's Completed
Complete Ethical Hacking Course: Learn From Scratch 43 Min's Completed
Viral Marketing From Scratch. Learn all Marketing Strategies 1 Hour Completed
Complete Machine Learning Course: Learn From Scratch 30 Min's Completed
Creating A Bald cap - A Free Demonstration 35 Min's Completed
Learn to Receive Free Products to review - USA 34 Min's Completed
Understand SWOT Analysis in 30 Minutes 31 Min's Completed
Blending Essential Oil's For Aromatherapy (Aromatic Use) 32 Min's Completed
Learn To Make Body And Bath Products 1 Hour Completed
Best essential Oils For Health And Wellness 1 Hour Completed
Smelling Your Way To Mental Health - Essential Oils 37 Min's Completed
Excel for Accountants: Mapping Tables 31 Min's Completed
Unpacking thr internet Of Things (IOT) 36 Min's Completed
Excel Afterburner Fundamentals 31 Min's Completed
Excel 2015 to 2016 Edition 31 Min's Completed
Simplicity PowerPoint Theme: Design & Animate First 5 Slides 38 Min's Completed
Powerpoint Masterclass in 30+ Downloadable Pro Material 38 Min's Completed
Powerpoint Presentation - Design Powerpoint Slides 1 Hour Completed
New Business Markets in The Internet Of Things (IOT) 24 Min's Completed
Introduction to Human Resourse Management 1 Hour Completed
Herbalism: Essential Herbal Medicine Favorites 32 Min's Completed
Free - Aromatherapy Using Essential Oils Introductory Course 1.5 Hours 80
Powerpoint Tutorial For Beginners: Easy Step By Step Guide 44 Min's 63
Lookup Functions, Advanced Chatts and Pivot Tables 59 Min's 59
Minimalism: Simplify Your Life 1 Hour 52
Learn Criminal Psycology Fundamentals 1 Hour 44
Microsoft Project 2013 Training 1 Hour 40
Arduin Workshop 2018 - A-Stp-By-StepArduino How-To-Guide 4 Hours 27
Deep Learning A-Z: Hands-On Artificial Neural Networks 22.5 Hours 6
Learn HTML By Crating Web Pages in 85 Minutes for Beginners 1.5 Hours 6
Learn The Basics Of HTML in a Hour 1 Hour 6
American Life Practical English Skills 6 Hours 5
Engineering Mechanics - Particle Dynamics 1.5 Hours 5
Social Brilliant 3 Hours 5
PowerPoint for Beginners - Program & Animation Basics FREE 2 Hours 4
8051 Microcontroller 1.5 Hours 4
LEE's Web Hacking (Cross Site Scripting , SQL Injection) 41 Min's
Microsoft Project Introduction 3.5 Hours
Password Hacking Softwares 32 Min's
The Complete Cyber Security Course: Network Security 12.5 Hours
The Complete Cyber Security Course: End Point Protection 16.5 Hours
Ethical Hacking : SQL Injection Attack 1 Hour
Complete Burp suit Hacking Course: Beginner to Advanced Removed
Learn Ethical Hacking From Entry To Expertise 50 Hours
Fundamentals Of Computer Hacking 2 Hours
Hacking Academy : How to Monitor And Intercept Transmitted Data 1 Hour
Intro To Ethical Hacking Certification 1 Hour
Complete Ethical Hacking Course - Learn From Scratch 43 Min's
Complete Certified Ethical Hacking Course Zero To Hero Removed
Complete Ethical Hacking Course - Zero to Hero 41 Min's
Complete Ethical Hacking Course Beginner To Advanced 5 Hours
Start Kali Linux Ethical Hacking And Penetration Testing 4 Hours
Protect Yourself Online, Advice From a Professional Hacker 1.5 Hours
Complete Password Hacking Course: Beginner To Advanced Removed
Cross Site Scripting (XSS) Hacking Course: Beginner to Advanced Removed
Complete Ethical Hacking Course: Go From Zero to Hero Removed
The Complete Cyber Security Course: Hackers Exposed 12 Hours 2
Complete SQL Injection Hacking Course: Beginner to Advanced Removed
The Complete Ethical Hacking Course: Go From Zero to Hero 1 Hour
The Complete Ethical Hacking Course: Go From Zero to Hero 3 Hours
Complete Hacking Course: Beginner To Advanced Removed
Making In House: Hacking & Pentesting Lab 1.5 Hours
Android Ethical Hacking Course, C, C++, Python Programs 1.5 Hours
Instagram Marketing: Quick Growth Hacks For Beginners 1 Hour
Complete Netcat Ethical Hacking Course: Beginner To Advanced Removed
Growth Hacking: Free Tools For Small Business Owners 1 Hour
Complete Cryptography Hacking course: Beginner To Advanced Removed
How Do Hackers Hack 1.5 Hours
Startup Growth Hacking: 19 Actionabl And Advanced Tactics 1 Hour
Growth Hacking Masterclass - Digital Marketing For 2019 2.5 Hours
Complete Metasploit Hacking Course: Beginner to Advanced Removed
Mobile App Marketing At No cost: Growth Hacking Approach 41 Min's
Copywriting quick Start: Top Free Writing Tools & Hacks 36 Min's
Ethical Hacking with Hardware Gadget 1 Hour
Hacking B2B SaaS Fundraising 1.5 Hours
The Growth Hacker Interviews 10 Hours
Travel Hacking Basics: How To travel Longer and Better 42 Min's
The Art of Hacking Humans intro to social engineering 2.5 Hours
Game Hacking - Create a Game in 1 Hour 2.5 Hours
Anti-Hacker Security - Step By Step Guide 44 Min's
6 Language Hacks To Learn Any Language Easier 42 Min's
Write Quicker HTML5 & CSS3 Productivity Hacks With Emmet 1.5 Hours
Discover Web Application Security Issues using Burp Proxy 1 Hour
CEH V.10 Basic Versions Removed
Own Your Future creative Editions 32 Min's
Learn burp suit the Nr. 1 Web Hacking tool 2 Hours
Stay Anonymous Online - Darknet, TOR, WHONIX, Tails and Kali 38 Min's
The Ultimate Traffic Hack: How to get unlimited Free Traffic 2 Hours
Dominate the hidden Job market of 2018: The Free Mini Course 1 Hour
Build your Own Cyber Lab at home 1.5 Hours
Learn Complete Wordpress Security 2.5 Hours
Become computer Forensic Expert & Start Your Career 1.5 Hours
Complete computer Forensic course: Beginner to Advanced Removed
Internet Business Secrets. Shhhhh 1 Hour
Protect Your Online Identity with Great Passwords 43 Min's Completed
Complete Cyber Security Course - Learn From Scratch 3 Hours
Solo Travel Mastery: Travel the world cheaply and confidently 1 Hour
The Complete Cyber Security Course: Hackers Exposed 13.5 Hours
Axiomatic Probability - Mathematics 25 Hours
Fundamentals Of Deductive Reasoning - Mathematics 16.5 Hours
Learn Programming With Python 12 Hours
Python 101 13 Hours
Exception Handling in Python 3 - try, except, else, finally 21.5 Hours
UX Design Tutorial for Beginners (#1) 1 Hour
Description

Not Much Worthy So I discontinue in this course


It's Very Basic Desription Details Only given
Not Worthy
Little bit Worth To Study Basics
Worth to Study
Worth to Study
Worth to Study
Course Name Duration - Hours Progress
CompTIA Fundamentals 8.9
Intermediate Excel 8.6
Introduction to Evimetry: The Controller 0.6
Vmware Foundations 3
Cybersecurity Audit Overview 0.9
OSCP 14.7
Basic Evimetry Deadboot Forensic Acquisition: Wired And Local 0.6
AWS Terminology 0.2 Completed
Computer Forensics File Formats: Why You Should Be Using AFF4 0.2
VPC Fundamentals 0.2
How to use casefile (BSWR) 0.1 Completed
Threat Hunting with Windows Event Forwarding 1.4
AWS Certified Solutions Architect Associate 2.7
How to Use Doona (BSWR) 0.1 Completed
Command Line Basics 5.2
Intro to Cyber Threat Intelligence 4
Mobile Malware Analysis Fundamentals 4
Fortinet FortiWeb Cloud WAF-as-a-Service 1
EC2 Fundamentals 0.2
Creating S3 Buckets 0.3
Evidence Handling: Do it the Right Way 0.8
Cisco Certification Update 2020 0.4
OSINT Fundamentals 0.9
How to Use MSFVenom Payload Creator (BSWR) 0.1 Completed
OWASP ZAP Tool (BSWR) 0.2
How to Use PDFiD (BSWR) 0.1 Completed
Building an InfoSec Lab 6.5
How to Use Sparta (BSWR) 0.1 Completed
Privileged Access Management 1
Endpoint Security Fundamentals 2.2
How to Use HTTPTunnel (BSWR) 0.1 Completed
How to Use OScanner (BSWR) 0.1 Completed
How to Use Bulk Extractor (BSWR) 0.1 Completed
Getting Started in Security Analytics with CyberEASY 0.8
How to Use Durandal's Backdoor (BSWR) 0.1
How to Use Ophcrack (BSWR) 0.1
Introduction to Java 4.1
Incident Handling Fundamentals 1
Secure Coding Fundamentals 1.5
Intro to Powershell Scripting 1.7
Physical Penetration Testing 6.6
APT Group Fundamentals 0.4
Web Defense Fundamentals 0.6
Cloud Fundamentals for Security Practitioners 0.8
Pentest Fundamentals: Scanning Networks 0.5
Wireless Network Fundamentals for Security Practitioners 0.5
Fundamental Cryptography: Data Protection 1
Monitoring Network Traffic with SIEM 0.3
Linux Fundamentals for Security Practitioners 1.6
Fundamental Windows Security Overview 0.6
Virtualization and Operating Systems Fundamentals 0.7
Analyzing Attacks for Incident Handlers 1.4
Attacks and Persistence for Incident Handlers 0.4
Incident Response Planning 0.9
Implementing an Incident Response Plan 1
Scanning and Enumeration with NMAP 0.5
Online Reconnaissance 0.9
Incident Response Recovery 0.9
Password Cracking Tool Fundamentals 0.7
Malware Fundamental 0.2
Pentest Fundamentals: Sniffing 0.5
Incident Response Steps 0.5
Fundamentals of Risk Policies and Security Controls 0.7
Data Protection Fundamentals 0.7
How to Use URLcrazy (BSWR) 0.1 Completed
CCDA (Cisco Certified Design Associate) 11
RiskIQ: Mark of the Web 0.4
Intro to Data Science 3.4
Android Development Fundamentals 4.1
AWS Certified Cloud Practitioner 2.8
Cloud Architecture Foundations 7.5
End User Awareness 0.7
How to Use hping3 (BSWJ) 0.1
pfSense: Installing and Configuring the Firewall 1.3
Certified Cloud Security Professional (CCSP) 9.8
Executive RMF 1.8
HIPAA Training 2.1
IoT Security 5.8
Red Team Guide 3
Scanning, Enumeration, and Vulnerabilities 25.4
AZ-900 Microsoft Azure Fundamentals 4.1
Windows Forensics and Tools 4.2
Introduction to SQL 7.6
Intro to AWS 3.5
Launching Your Penetration Tester Career 0.8
Launching Your Cybersecurity Engineer Career 1
Introduction to IT & Cybersecurity 4.4
Azure ARM 1.3
AZ-300: Microsoft Azure Architect Technologies 8
AZ-103 Microsoft Azure Administrator 23.3
Cisco CCNA 87.8
Fundamentals of Terraform 2.8
Penetration Testing and Ethical Hacking 35.3
Advanced Cyber Threat Intelligence 4.2
CISSP 19
CCNA ICND1 34.3
CISM 12.4
Mastering Identity Access Management in AWS 0.5
AWS Infrastructure Security 0.6
CompTIA CASP+ 13.3
CompTIA A+ 220-1001 12.2
CompTIA A+ 220-1002 29.9
Malware Threats 3.8
AlienVault OSSIM 1.3
Splunk for Small to Medium Enterprises 1.5
Launching Your SOC Analyst Career 0.9
Preventing Data Breaches with A1Logic 0.9
Systems Security Certified Professional (SSCP) 7.6
MTA 98-366 Networking Fundamentals 4.5
Regex 1.6
Fundamentals of Vulnerability Management 1.4
Performing a Microsoft Windows 10 Installation 1.3
Zero Trust Networks 1.3
Guide to the Tor Browser 1.9
MTA 98-367 Security Fundamentals 1.9
Developing Ethical Hacking Tools with Python 1.2
Fundamentals of Cybersecurity Architecture 2.7
Sniffing 1.2
CISM 8.7
How to Do a Live Identity Hack 1.5
Session Hijacking 1.3
Hyper-V 5.1
CRISC 6.5
Introduction to SIEM Tools 1
Introduction to IT Security Policy 2.4
ITIL Foundations 3.8
Kali Linux Fundamentals 1.7
Footprinting and Reconnaissance 2.6
USB Drop Attack 2.4
Intro to Cyber Threat Intelligence 4.1
CompTIA Cloud+ 2.5
Incident Response and Advanced Forensics 7.6
Metasploit 5.6
MCSA (Microsoft) 5.3
Advanced Cyber Threat Intelligence 3
CompTIA Security+ 10.5
NMAP 6.5
ISC2 CISSP - Archive 12.7
Python for Security Professionals 10.2
OWASP 4.5
PCI/DSS 3.1
Network Fundamentals Using GNS3 1.3
Phishing 1.5
Social Engineering 1
Cisco CCNA 15.6
CCNA ICND1 14
Advanced Penetration Testing 14.4
CompTIA Network+ 31.5
Intro to Zeek Scripting with Bricata 1.4
CompTIA Linux+ 8.5
Penetration Testing and Ethical Hacking 13.5
Post Exploitation Hacking 7.8
Intro to Python 3
Incident Response & Advanced Forensics 8.1
Intermediate Cloud Security 1.1
TCP/IP 1.9
Network Fundamentals 6.4
Information Security Fundamentals 12.3
Become a Cyber Defense Incident Responder 185.3
Become a System Administrator 202.8
Become a Network Operations Specialist 173.1
Become a Cyber Defense Analyst 102.7
Become a SOC Analyst - Level 1 71.1
CompTIA Security+ 42.6
CompTIA Network+ 70
CISA
Chief Information Security Officer (CISO)
Launching Your Network Engineer Career
Cloud Architecture Foundations

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy