8 Hours Of Advanced C Projects: Cyber Security
8 Hours Of Advanced C Projects: Cyber Security
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.71 GB | Duration: 8h 1m
Write Tor clients, encryption libraries and safestring libraries. You will also learn Linux filesystem Security in depth
What you'll learn
Learn to write your own Cyber Security tools
Learn to write tools which utilise network connections.
Improve your knowledge in advanced C concepts like pointers and structs etc.
Learn about encryption, the Tor network, to write unhackable code and so on.
Learn about Linux filesystem security
Requirements
This course is at intermediate-advanced level so you should have knowledge about the beginner stuff at least.
Description
8 hours of advanced C projects: Cyber SecurityThis is an 8 hour composite course (divided in 13 different 40min videos) containing my best content with regards to Cyber Security. You will get an in-depth knowledge in writing encryption tools, connecting to the Tor privacy network, and how to write safe, un-hackable C code by making a safe string library.When doing all of this practically, I will explain all the necessary theory while we're coding. So there are no dense sections of heavy theory but you will still learn everything you need in order to fully understand the things we are building. While on this journey, you will also improve your knowledge of some of the more advanced features of the C language. Like how dynamic memory works, how you deal with linked lists, everything about advanced pointers, operating system functions (syscalls) as well as some binary bitwise operations, etc.You will also learn the basics of Linux file system security and a whole lot more. And, as always, in 1080p resolution. Enjoy!Best regards,JBFree previewDo not miss out of the free preview. You can watch the entire first episode (40min!) for free. That contains the most part of one of my best C projects, the Toralizer. It is a command-line tool which lets you redirect any other Linux command through the Tor network.Example:bash$ toralize curl http://website-urlThis will connect to the Tor privacy network and access the website. This works with any Linux command and we will code this tool from scratch to the finish line, in this course.PrerequisitesThis is not a beginner course in the C language (I have courses like that too). This is for people who already knows the basics of C and wants to take the next step to intermediate-advanced level knowledge of the C language.This course is also for C coders who wish to know more about Cyber Security.The authordr. Jonas Birch has been programming the C language for more than 25 years and he's been teaching for the last 7-8 years. He has a background in the Cyber Security industry and he's a Senior network engineer. His videos are very popular (some are the highest rated courses on Udemy, in its category) and he's got a very soothing voice which is easy for the ears.Table of Contents00:00:00 Toralizer part 101:27:29 Xor encryption01:39:09 Coding a real encryption library04:05:41 How to install your own C library04:15:13 Learn Linux file system security04:44:51 Coding a file encryptor, part 105:37:21 Coding a file encryptor, part 206:05:00 Write unhackable code (safe string lib)07:19:47 Toralizer part 2
Overview
Section 1: Cyber Security
Lecture 1 Ep 01 - Writing your own Toralizer, part 1.
Lecture 2 Ep 02 - .Part two
Lecture 3 Ep 03 - Xor encryption
Lecture 4 Ep 04 - Coding a real encryption library, part 1.
Lecture 5 Ep 05 - .Part two
Lecture 6 Ep 06 - .Part three
Lecture 7 Ep 07 - Linux filesystem security
Lecture 8 Ep 08 - Coding a file encryptor, part 1.
Lecture 9 Ep 09 - Part two
Lecture 10 Ep 10 - Write unhackable code (safe string library), part 1.
Lecture 11 Ep 11 - .Part two
Lecture 12 Ep 12 - Toralizer: Finishing the project, part 1.
Lecture 13 Ep 13 - .Part two
C programmers interested in Cyber Security and who wants to do more advanced projects.
FileAxa
https://fileaxa.com/t11e8agwfjmp/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part1.rar
https://fileaxa.com/cvihkzgcuoe0/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part2.rar
https://fileaxa.com/ai646f69hpmb/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part3.rar
RapidGator
https://rapidgator.net/file/7358692625f15c411b828fb4798dec75/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part1.rar
https://rapidgator.net/file/17dfe30c378449a72557f3e45fdba3c2/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part2.rar
https://rapidgator.net/file/7e12624e02bcb26cf432b5d9a1cf9c28/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part3.rar
FileStore
FileFactory
TurboBit
https://turbobit.net/wj1e2l1sahte/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part1.rar.html
https://turbobit.net/ywv0umw0ryml/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part2.rar.html
https://turbobit.net/jdl3351cg9lb/Udemy_8_hours_of_advanced_C_projects_Cyber_Security_.part3.rar.html