welcome Message and instruction

Lesson 9/66 | Study Time: 15 Min

welcome Message and instruction

Hani Al Says

Hani Al Says

Product Designer

Class Sessions

1- What is Open Source? 2- welcome Message and instruction 3- welcome Message and instruction 4- welcome Message and instruction 5- welcome Message and instruction 6- welcome Message and instruction 7- welcome Message and instruction 8- welcome Message and instruction 9- Open Source Application and Scope 10- Open Source Bebefits 11- Open Source Resource 12- Importance of Data 13- AI, Machine Learning, and Deep Learning 14- Transformers and Large Language Models 15- Security of Artificial Intelegance 16- Cloud AI and Edge AI 17- Web development Section: Servers and Installation Environment [Open Source] 18- Web development Section: Front-End Programming Languages [Open Source] 19- Web development Section: Back-End Programming Languages [Open Source] 20- Windows Application Section: Instalation and Environment 21- Windows Application Section: Tools and Development [Open Source- ChatGPT] 22- Windows Application Section: Open Source Project 23- Windows Application Section: Open Source Excel Project 24- Python Section: Installation and Enviroment 25- Python Section: Tools Development [Open Source - ChatGPT] 26- Python Section: Open Source Development 27- Mobile Application Development: Installation and Enviroment 28- Mobile Application Development: Open Source Project 29- Firewall Introduction 30- Firewall Application 31- Firewall Types and Development 32- Web Firewall Solutions 33- pfSense Open Source Firewall 34- OPNsense Open Source Firewall 35- Open Source Firewalls 36- Scientific Research 37- Scientific Publishing 38- Statstics 39- Data Visualization 40- Conferences and Presnetations 41- Linux Distribution Usage and Installation: Kali, ParrotOS, CentOS, Debian, BlackArch 42- Network fundamental 43- Network and Web Vulnerability and Pentration Testing: NMAP, Metasploit, Aircrack-ng, hydra, Burp, Suite, SQLMap, JTR OWASAP ZAP, BeEF, Gobuster, Nikto, OpenVAS, Fluxion, Lynis 44- Anonymity and Privacy Tools: TOT, AnonSurf, OnionShare, I2P, Ricochet 45- Reverse Engineering and Analysis: Ghidra, Maltego, Exploit, Database 46- Social Engineering and Human Factor Exploitation: Social Engineering Toolkit 47- Network Monitoring and Traffic Analysis: Snort, EtherApe, Wireshark 48- Forensic and Cleanup Tools: Bleachnit, Crunch, CUPP 49- Wireless Network Tools: Macchanger 50- Miscellaneous Toola: Httrack, Skipfish, Kali Tool ad Publishing 51- Professional LnkedIn Profile 52- Social Media Optimization 53- Article Publishing 54- Resume Writing 55- Freelance Platforms 56- Open Source Libraries 57- Relationships Development 58- Open Source Graphics 59- Facebook Lead Generation 60- LinkedIn Lead Generation 61- WhatsApp Lead Generation 62- Emails Lead Generation 63- Maps Lead Generation 64- Business Directory Lead Generation 65- LinkedIn Job Application 66- Corporations Sharing Techniques