Videos

Published on December 28th, 2019 📆 | 2490 Views ⚑

0

Be part of My Closed Circle


iSpeech.org



Introducing memberships to my channel.

Python Basics course (coupon applied): http://bit.ly/37cmhlx
Join my SQUAD for free (for more discounts): http://bit.ly/2xhSvM2
Learn hands-on pentesting (free trial): http://bit.ly/2LzKrPJ
Hacker Wearables: http://bit.ly/2IDAQEo

Join me and other cyber-geeks in our Discord community (free): http://bit.ly/2KH6aST

My laptop for pentesting video: https://www.youtube.com/watch?v=G4XG7mRceSs

Hire me as a penetration tester: https://dgtsec.com/penetration-testing-services/
101 Pentesting Training: https://dgtsec.com/cybersec-pentesting-training/
101 Cybersecurity Consulting: https://dgtsec.com/cybersec-pentesting-training/
Paperspace credit: https://paperspace.io/&R=FMXH1BN
DigitalOcean credit: https://m.do.co/c/efe4365e60bd

Connect with me:

Linkedin: https://www.linkedin.com/in/cristivlad/
Twitter: https://twitter.com/CristiVlad25
Facebook page: https://www.facebook.com/CristiVladZ/
Facebook group: https://www.facebook.com/groups/cybersecpros/
Hackthebox: https://www.hackthebox.eu/profile/27034
Tryhackme: https://tryhackme.com/p/cristi
Peerlyst: https://www.peerlyst.com/users/cristi-vlad
Discord: https://disboard.org/server/608756357801443343





Books I recommend for Penetration Testing and Ethical Hacking:

1. TJ O'Connor - Violent Python: https://amzn.to/31vH2GB
2. Dafydd Stuttard - Web App Hacker' s Handbook (2nd Ed): https://amzn.to/2MRcjk3
3. Peter Yaworski - Web Hacking 101: https://amzn.to/2KTvJSy
4. Jon Erickson - Hacking: The Art of Exploitation (2nd Ed):
https://amzn.to/2WHr3BD
5. Peter Kim - The Hacker Playbook 3 (2018): https://amzn.to/2MQiTXK

My free Developing Ethical Hacking Tools with Python course on Cybrary: http://bit.ly/2J5USbC

It helps me tremendously if you support these educational videos:

https://www.patreon.com/cristivlad
If you're a Youtuber, how can you survive without TubeBuddy?: http://bit.ly/37dgFYr
__________

Whatever type of tests you're doing, only perform them in safe and legal environments and with the appropriate permissions.

source

Tagged with:



0 Responses to Be part of My Closed Circle