Your cart is empty
Empty notifications
Login
Register
Categories
Open Source Technology
Open Source Development
Cyber Security
VAPT
Artificial Intelligence
Prompt Engineering
Scientific Research
Fonte Hub
Educational Program
Home
Courses
Instructors
Store
Forums
Meet Our Team
Meet Our Team
Your cart is empty
Empty notifications
welcome Message and instruction
Lesson 9/66
|
Study Time: 15 Min
Course:
Fonte Aperta Program
welcome Message and instruction
Previous Lesson
Next Lesson
Hani Al Says
Product Designer
Profile
Book a Meeting
Class Sessions
1- What is Open Source?
2- welcome Message and instruction
3- welcome Message and instruction
4- welcome Message and instruction
5- welcome Message and instruction
6- welcome Message and instruction
7- welcome Message and instruction
8- welcome Message and instruction
9- Open Source Application and Scope
10- Open Source Bebefits
11- Open Source Resource
12- Importance of Data
13- AI, Machine Learning, and Deep Learning
14- Transformers and Large Language Models
15- Security of Artificial Intelegance
16- Cloud AI and Edge AI
17- Web development Section: Servers and Installation Environment [Open Source]
18- Web development Section: Front-End Programming Languages [Open Source]
19- Web development Section: Back-End Programming Languages [Open Source]
20- Windows Application Section: Instalation and Environment
21- Windows Application Section: Tools and Development [Open Source- ChatGPT]
22- Windows Application Section: Open Source Project
23- Windows Application Section: Open Source Excel Project
24- Python Section: Installation and Enviroment
25- Python Section: Tools Development [Open Source - ChatGPT]
26- Python Section: Open Source Development
27- Mobile Application Development: Installation and Enviroment
28- Mobile Application Development: Open Source Project
29- Firewall Introduction
30- Firewall Application
31- Firewall Types and Development
32- Web Firewall Solutions
33- pfSense Open Source Firewall
34- OPNsense Open Source Firewall
35- Open Source Firewalls
36- Scientific Research
37- Scientific Publishing
38- Statstics
39- Data Visualization
40- Conferences and Presnetations
41- Linux Distribution Usage and Installation: Kali, ParrotOS, CentOS, Debian, BlackArch
42- Network fundamental
43- Network and Web Vulnerability and Pentration Testing: NMAP, Metasploit, Aircrack-ng, hydra, Burp, Suite, SQLMap, JTR OWASAP ZAP, BeEF, Gobuster, Nikto, OpenVAS, Fluxion, Lynis
44- Anonymity and Privacy Tools: TOT, AnonSurf, OnionShare, I2P, Ricochet
45- Reverse Engineering and Analysis: Ghidra, Maltego, Exploit, Database
46- Social Engineering and Human Factor Exploitation: Social Engineering Toolkit
47- Network Monitoring and Traffic Analysis: Snort, EtherApe, Wireshark
48- Forensic and Cleanup Tools: Bleachnit, Crunch, CUPP
49- Wireless Network Tools: Macchanger
50- Miscellaneous Toola: Httrack, Skipfish, Kali Tool ad Publishing
51- Professional LnkedIn Profile
52- Social Media Optimization
53- Article Publishing
54- Resume Writing
55- Freelance Platforms
56- Open Source Libraries
57- Relationships Development
58- Open Source Graphics
59- Facebook Lead Generation
60- LinkedIn Lead Generation
61- WhatsApp Lead Generation
62- Emails Lead Generation
63- Maps Lead Generation
64- Business Directory Lead Generation
65- LinkedIn Job Application
66- Corporations Sharing Techniques