Important Timestamps
1:00 - The video is started with me explaining how it's overwhelming to start a course from 0% sometimes
1:25 - I explain the details of this project
2:24 - Timelapse of me starting the project
2:49 - I talk about bypassing HTTPS
4:01 - Explaining how the basic keylogger program works - a program we write in this course
5:48 - Wrapping the course with my overall thoughts
7:18 - Explain a basic Trojan program covered within the course
The Complete Python for Hacking and Cyber Security Bundle:
Zaid's website:
Personal Notes this Level:
Link to Github profile with Python Programs: Coming Soon
For more information and extra help, visit:
Join the Email List for More Information and Exclusive Updates!
Sign up:
Follow Me:
Twitter:
Instagram:
Join the Discord Server:
Have questions, concerns, comments?:
Email me: grant@cyberinternacademy.com
Gear:
Laptop (Lenovo X1 Carbon Ultrabook):
Monitors (Dell D Series 31.5” D3218HN):
Keyboard (Velocifire VM01):
Headphones (Audio Technica ATH-M40x):
Songs:
JHC BEATS - MALIANTEO TYPE BEAT No Copyright Trap
Lofi Hip Hop Music (No Copyright)
DAYZVIBES - 'MERCURY' HARD TYPE BEAT_ No Copyright
0 Comments