The document lists various online courses related to topics like cybersecurity, ethical hacking, programming, and business/marketing. It provides the course name, estimated duration in hours or minutes, and percentage completed for each course. Many courses on cybersecurity, ethical hacking, and programming are partially or fully completed, while some business/marketing courses are around 50% completed, suggesting the learner is sampling a wide range of topics.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
175 views10 pages
Course List & Its Durations
The document lists various online courses related to topics like cybersecurity, ethical hacking, programming, and business/marketing. It provides the course name, estimated duration in hours or minutes, and percentage completed for each course. Many courses on cybersecurity, ethical hacking, and programming are partially or fully completed, while some business/marketing courses are around 50% completed, suggesting the learner is sampling a wide range of topics.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 10
Course Name Duration % of Complete
Practical Password 1 Hour Completed
Microsoft Office Sway - a PowerPoint replacement made easy 1 Hour Completed Password Hacking Software's 1 Hour Completed Complete Ethical Hacking Course: Zero to Hero 41 Min's Completed Complete Ethical Hacking Course: Learn From Scratch 43 Min's Completed Viral Marketing From Scratch. Learn all Marketing Strategies 1 Hour Completed Complete Machine Learning Course: Learn From Scratch 30 Min's Completed Creating A Bald cap - A Free Demonstration 35 Min's Completed Learn to Receive Free Products to review - USA 34 Min's Completed Understand SWOT Analysis in 30 Minutes 31 Min's Completed Blending Essential Oil's For Aromatherapy (Aromatic Use) 32 Min's Completed Learn To Make Body And Bath Products 1 Hour Completed Best essential Oils For Health And Wellness 1 Hour Completed Smelling Your Way To Mental Health - Essential Oils 37 Min's Completed Excel for Accountants: Mapping Tables 31 Min's Completed Unpacking thr internet Of Things (IOT) 36 Min's Completed Excel Afterburner Fundamentals 31 Min's Completed Excel 2015 to 2016 Edition 31 Min's Completed Simplicity PowerPoint Theme: Design & Animate First 5 Slides 38 Min's Completed Powerpoint Masterclass in 30+ Downloadable Pro Material 38 Min's Completed Powerpoint Presentation - Design Powerpoint Slides 1 Hour Completed New Business Markets in The Internet Of Things (IOT) 24 Min's Completed Introduction to Human Resourse Management 1 Hour Completed Herbalism: Essential Herbal Medicine Favorites 32 Min's Completed Free - Aromatherapy Using Essential Oils Introductory Course 1.5 Hours 80 Powerpoint Tutorial For Beginners: Easy Step By Step Guide 44 Min's 63 Lookup Functions, Advanced Chatts and Pivot Tables 59 Min's 59 Minimalism: Simplify Your Life 1 Hour 52 Learn Criminal Psycology Fundamentals 1 Hour 44 Microsoft Project 2013 Training 1 Hour 40 Arduin Workshop 2018 - A-Stp-By-StepArduino How-To-Guide 4 Hours 27 Deep Learning A-Z: Hands-On Artificial Neural Networks 22.5 Hours 6 Learn HTML By Crating Web Pages in 85 Minutes for Beginners 1.5 Hours 6 Learn The Basics Of HTML in a Hour 1 Hour 6 American Life Practical English Skills 6 Hours 5 Engineering Mechanics - Particle Dynamics 1.5 Hours 5 Social Brilliant 3 Hours 5 PowerPoint for Beginners - Program & Animation Basics FREE 2 Hours 4 8051 Microcontroller 1.5 Hours 4 LEE's Web Hacking (Cross Site Scripting , SQL Injection) 41 Min's Microsoft Project Introduction 3.5 Hours Password Hacking Softwares 32 Min's The Complete Cyber Security Course: Network Security 12.5 Hours The Complete Cyber Security Course: End Point Protection 16.5 Hours Ethical Hacking : SQL Injection Attack 1 Hour Complete Burp suit Hacking Course: Beginner to Advanced Removed Learn Ethical Hacking From Entry To Expertise 50 Hours Fundamentals Of Computer Hacking 2 Hours Hacking Academy : How to Monitor And Intercept Transmitted Data 1 Hour Intro To Ethical Hacking Certification 1 Hour Complete Ethical Hacking Course - Learn From Scratch 43 Min's Complete Certified Ethical Hacking Course Zero To Hero Removed Complete Ethical Hacking Course - Zero to Hero 41 Min's Complete Ethical Hacking Course Beginner To Advanced 5 Hours Start Kali Linux Ethical Hacking And Penetration Testing 4 Hours Protect Yourself Online, Advice From a Professional Hacker 1.5 Hours Complete Password Hacking Course: Beginner To Advanced Removed Cross Site Scripting (XSS) Hacking Course: Beginner to Advanced Removed Complete Ethical Hacking Course: Go From Zero to Hero Removed The Complete Cyber Security Course: Hackers Exposed 12 Hours 2 Complete SQL Injection Hacking Course: Beginner to Advanced Removed The Complete Ethical Hacking Course: Go From Zero to Hero 1 Hour The Complete Ethical Hacking Course: Go From Zero to Hero 3 Hours Complete Hacking Course: Beginner To Advanced Removed Making In House: Hacking & Pentesting Lab 1.5 Hours Android Ethical Hacking Course, C, C++, Python Programs 1.5 Hours Instagram Marketing: Quick Growth Hacks For Beginners 1 Hour Complete Netcat Ethical Hacking Course: Beginner To Advanced Removed Growth Hacking: Free Tools For Small Business Owners 1 Hour Complete Cryptography Hacking course: Beginner To Advanced Removed How Do Hackers Hack 1.5 Hours Startup Growth Hacking: 19 Actionabl And Advanced Tactics 1 Hour Growth Hacking Masterclass - Digital Marketing For 2019 2.5 Hours Complete Metasploit Hacking Course: Beginner to Advanced Removed Mobile App Marketing At No cost: Growth Hacking Approach 41 Min's Copywriting quick Start: Top Free Writing Tools & Hacks 36 Min's Ethical Hacking with Hardware Gadget 1 Hour Hacking B2B SaaS Fundraising 1.5 Hours The Growth Hacker Interviews 10 Hours Travel Hacking Basics: How To travel Longer and Better 42 Min's The Art of Hacking Humans intro to social engineering 2.5 Hours Game Hacking - Create a Game in 1 Hour 2.5 Hours Anti-Hacker Security - Step By Step Guide 44 Min's 6 Language Hacks To Learn Any Language Easier 42 Min's Write Quicker HTML5 & CSS3 Productivity Hacks With Emmet 1.5 Hours Discover Web Application Security Issues using Burp Proxy 1 Hour CEH V.10 Basic Versions Removed Own Your Future creative Editions 32 Min's Learn burp suit the Nr. 1 Web Hacking tool 2 Hours Stay Anonymous Online - Darknet, TOR, WHONIX, Tails and Kali 38 Min's The Ultimate Traffic Hack: How to get unlimited Free Traffic 2 Hours Dominate the hidden Job market of 2018: The Free Mini Course 1 Hour Build your Own Cyber Lab at home 1.5 Hours Learn Complete Wordpress Security 2.5 Hours Become computer Forensic Expert & Start Your Career 1.5 Hours Complete computer Forensic course: Beginner to Advanced Removed Internet Business Secrets. Shhhhh 1 Hour Protect Your Online Identity with Great Passwords 43 Min's Completed Complete Cyber Security Course - Learn From Scratch 3 Hours Solo Travel Mastery: Travel the world cheaply and confidently 1 Hour The Complete Cyber Security Course: Hackers Exposed 13.5 Hours Axiomatic Probability - Mathematics 25 Hours Fundamentals Of Deductive Reasoning - Mathematics 16.5 Hours Learn Programming With Python 12 Hours Python 101 13 Hours Exception Handling in Python 3 - try, except, else, finally 21.5 Hours UX Design Tutorial for Beginners (#1) 1 Hour Description
Not Much Worthy So I discontinue in this course
It's Very Basic Desription Details Only given Not Worthy Little bit Worth To Study Basics Worth to Study Worth to Study Worth to Study Course Name Duration - Hours Progress CompTIA Fundamentals 8.9 Intermediate Excel 8.6 Introduction to Evimetry: The Controller 0.6 Vmware Foundations 3 Cybersecurity Audit Overview 0.9 OSCP 14.7 Basic Evimetry Deadboot Forensic Acquisition: Wired And Local 0.6 AWS Terminology 0.2 Completed Computer Forensics File Formats: Why You Should Be Using AFF4 0.2 VPC Fundamentals 0.2 How to use casefile (BSWR) 0.1 Completed Threat Hunting with Windows Event Forwarding 1.4 AWS Certified Solutions Architect Associate 2.7 How to Use Doona (BSWR) 0.1 Completed Command Line Basics 5.2 Intro to Cyber Threat Intelligence 4 Mobile Malware Analysis Fundamentals 4 Fortinet FortiWeb Cloud WAF-as-a-Service 1 EC2 Fundamentals 0.2 Creating S3 Buckets 0.3 Evidence Handling: Do it the Right Way 0.8 Cisco Certification Update 2020 0.4 OSINT Fundamentals 0.9 How to Use MSFVenom Payload Creator (BSWR) 0.1 Completed OWASP ZAP Tool (BSWR) 0.2 How to Use PDFiD (BSWR) 0.1 Completed Building an InfoSec Lab 6.5 How to Use Sparta (BSWR) 0.1 Completed Privileged Access Management 1 Endpoint Security Fundamentals 2.2 How to Use HTTPTunnel (BSWR) 0.1 Completed How to Use OScanner (BSWR) 0.1 Completed How to Use Bulk Extractor (BSWR) 0.1 Completed Getting Started in Security Analytics with CyberEASY 0.8 How to Use Durandal's Backdoor (BSWR) 0.1 How to Use Ophcrack (BSWR) 0.1 Introduction to Java 4.1 Incident Handling Fundamentals 1 Secure Coding Fundamentals 1.5 Intro to Powershell Scripting 1.7 Physical Penetration Testing 6.6 APT Group Fundamentals 0.4 Web Defense Fundamentals 0.6 Cloud Fundamentals for Security Practitioners 0.8 Pentest Fundamentals: Scanning Networks 0.5 Wireless Network Fundamentals for Security Practitioners 0.5 Fundamental Cryptography: Data Protection 1 Monitoring Network Traffic with SIEM 0.3 Linux Fundamentals for Security Practitioners 1.6 Fundamental Windows Security Overview 0.6 Virtualization and Operating Systems Fundamentals 0.7 Analyzing Attacks for Incident Handlers 1.4 Attacks and Persistence for Incident Handlers 0.4 Incident Response Planning 0.9 Implementing an Incident Response Plan 1 Scanning and Enumeration with NMAP 0.5 Online Reconnaissance 0.9 Incident Response Recovery 0.9 Password Cracking Tool Fundamentals 0.7 Malware Fundamental 0.2 Pentest Fundamentals: Sniffing 0.5 Incident Response Steps 0.5 Fundamentals of Risk Policies and Security Controls 0.7 Data Protection Fundamentals 0.7 How to Use URLcrazy (BSWR) 0.1 Completed CCDA (Cisco Certified Design Associate) 11 RiskIQ: Mark of the Web 0.4 Intro to Data Science 3.4 Android Development Fundamentals 4.1 AWS Certified Cloud Practitioner 2.8 Cloud Architecture Foundations 7.5 End User Awareness 0.7 How to Use hping3 (BSWJ) 0.1 pfSense: Installing and Configuring the Firewall 1.3 Certified Cloud Security Professional (CCSP) 9.8 Executive RMF 1.8 HIPAA Training 2.1 IoT Security 5.8 Red Team Guide 3 Scanning, Enumeration, and Vulnerabilities 25.4 AZ-900 Microsoft Azure Fundamentals 4.1 Windows Forensics and Tools 4.2 Introduction to SQL 7.6 Intro to AWS 3.5 Launching Your Penetration Tester Career 0.8 Launching Your Cybersecurity Engineer Career 1 Introduction to IT & Cybersecurity 4.4 Azure ARM 1.3 AZ-300: Microsoft Azure Architect Technologies 8 AZ-103 Microsoft Azure Administrator 23.3 Cisco CCNA 87.8 Fundamentals of Terraform 2.8 Penetration Testing and Ethical Hacking 35.3 Advanced Cyber Threat Intelligence 4.2 CISSP 19 CCNA ICND1 34.3 CISM 12.4 Mastering Identity Access Management in AWS 0.5 AWS Infrastructure Security 0.6 CompTIA CASP+ 13.3 CompTIA A+ 220-1001 12.2 CompTIA A+ 220-1002 29.9 Malware Threats 3.8 AlienVault OSSIM 1.3 Splunk for Small to Medium Enterprises 1.5 Launching Your SOC Analyst Career 0.9 Preventing Data Breaches with A1Logic 0.9 Systems Security Certified Professional (SSCP) 7.6 MTA 98-366 Networking Fundamentals 4.5 Regex 1.6 Fundamentals of Vulnerability Management 1.4 Performing a Microsoft Windows 10 Installation 1.3 Zero Trust Networks 1.3 Guide to the Tor Browser 1.9 MTA 98-367 Security Fundamentals 1.9 Developing Ethical Hacking Tools with Python 1.2 Fundamentals of Cybersecurity Architecture 2.7 Sniffing 1.2 CISM 8.7 How to Do a Live Identity Hack 1.5 Session Hijacking 1.3 Hyper-V 5.1 CRISC 6.5 Introduction to SIEM Tools 1 Introduction to IT Security Policy 2.4 ITIL Foundations 3.8 Kali Linux Fundamentals 1.7 Footprinting and Reconnaissance 2.6 USB Drop Attack 2.4 Intro to Cyber Threat Intelligence 4.1 CompTIA Cloud+ 2.5 Incident Response and Advanced Forensics 7.6 Metasploit 5.6 MCSA (Microsoft) 5.3 Advanced Cyber Threat Intelligence 3 CompTIA Security+ 10.5 NMAP 6.5 ISC2 CISSP - Archive 12.7 Python for Security Professionals 10.2 OWASP 4.5 PCI/DSS 3.1 Network Fundamentals Using GNS3 1.3 Phishing 1.5 Social Engineering 1 Cisco CCNA 15.6 CCNA ICND1 14 Advanced Penetration Testing 14.4 CompTIA Network+ 31.5 Intro to Zeek Scripting with Bricata 1.4 CompTIA Linux+ 8.5 Penetration Testing and Ethical Hacking 13.5 Post Exploitation Hacking 7.8 Intro to Python 3 Incident Response & Advanced Forensics 8.1 Intermediate Cloud Security 1.1 TCP/IP 1.9 Network Fundamentals 6.4 Information Security Fundamentals 12.3 Become a Cyber Defense Incident Responder 185.3 Become a System Administrator 202.8 Become a Network Operations Specialist 173.1 Become a Cyber Defense Analyst 102.7 Become a SOC Analyst - Level 1 71.1 CompTIA Security+ 42.6 CompTIA Network+ 70 CISA Chief Information Security Officer (CISO) Launching Your Network Engineer Career Cloud Architecture Foundations
Kali Linux 2 Books in 1 The Complete Beginners Guide About Kali Linux For Beginners Hacking With Kali Linux, Full Of... (Learn Computer Hacking in Deep) (Z-Library)