26 datasets found
  1. a

    Udemy - Learn Ethical Hacking From Scratch

    • academictorrents.com
    bittorrent
    Updated Aug 24, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    None (2023). Udemy - Learn Ethical Hacking From Scratch [Dataset]. https://academictorrents.com/details/dd0942e4a1782c0a662e9c16682ab977da156670
    Explore at:
    bittorrentAvailable download formats
    Dataset updated
    Aug 24, 2023
    Authors
    None
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    A BitTorrent file to download data with the title 'Udemy - Learn Ethical Hacking From Scratch'

  2. Ethical Hacking Methodology

    • paper.erudition.co.in
    html
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Ethical Hacking Methodology [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3/cyber-security-and-ethical-hacking
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Question Paper Solutions of chapter Ethical Hacking Methodology of Cyber security and ethical hacking, 3rd Semester , Bachelor of Computer Application

  3. Ethical hacking course online

    • kaggle.com
    zip
    Updated Dec 27, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cysecon (2021). Ethical hacking course online [Dataset]. https://www.kaggle.com/datasets/cysecon/ethical-hacking-course-online
    Explore at:
    zip(448387 bytes)Available download formats
    Dataset updated
    Dec 27, 2021
    Authors
    Cysecon
    Description

    Dataset

    This dataset was created by Cysecon

    Contents

  4. m

    Ethical Hacking Certification Market

    • marketresearchintellect.com
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Research Intellect (2024). Ethical Hacking Certification Market [Dataset]. https://www.marketresearchintellect.com/product/ethical-hacking-certification-market/
    Explore at:
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Market Research Intellect
    License

    https://www.marketresearchintellect.com/privacy-policyhttps://www.marketresearchintellect.com/privacy-policy

    Area covered
    Global
    Description

    Ethical Hacking Certification Market size is expected to develop revenue and exponential market growth at a remarkable CAGR during the forecast period from 2024–2032.

  5. w

    Gray hat hacking : the ethical hacker's handbook

    • workwithdata.com
    Updated Apr 27, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Work With Data (2024). Gray hat hacking : the ethical hacker's handbook [Dataset]. https://www.workwithdata.com/object/gray-hat-hacking-ethical-hacker-handbook-book-by-daniel-regalado-0000
    Explore at:
    Dataset updated
    Apr 27, 2024
    Dataset authored and provided by
    Work With Data
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Explore Gray hat hacking : the ethical hacker's handbook through unique data from multiples sources: key facts, real-time news, interactive charts, detailed maps & open datasets

  6. m

    Ethical Hacking Tool Market

    • marketresearchintellect.com
    Updated Jun 25, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Research Intellect (2024). Ethical Hacking Tool Market [Dataset]. https://www.marketresearchintellect.com/product/ethical-hacking-tool-market/
    Explore at:
    Dataset updated
    Jun 25, 2024
    Dataset authored and provided by
    Market Research Intellect
    License

    https://www.marketresearchintellect.com/privacy-policyhttps://www.marketresearchintellect.com/privacy-policy

    Area covered
    Global
    Description

    Ethical Hacking Tool Market size is expected to develop revenue and exponential market growth at a remarkable CAGR during the forecast period from 2024–2032.

  7. g

    GetData.IO - Metasploit Unleashed - Free Online Ethical Hacking Course

    • getdata.io
    csv, html, json
    Updated Jun 21, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2021). GetData.IO - Metasploit Unleashed - Free Online Ethical Hacking Course [Dataset]. https://getdata.io/data-sources/93436-metasploit-unleashed-free-online-ethical-hacking-course
    Explore at:
    json, csv, htmlAvailable download formats
    Dataset updated
    Jun 21, 2021
    Time period covered
    Jun 21, 2021
    Description

    GetData.IO -

  8. Cyber security and ethical hacking (TIU-UCA-T215), 3rd Semester, Bachelor of...

    • paper.erudition.co.in
    html
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Cyber security and ethical hacking (TIU-UCA-T215), 3rd Semester, Bachelor of Computer Application, TIU | Erudition Paper [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3/cyber-security-and-ethical-hacking
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Question Paper Solutions of Cyber security and ethical hacking (TIU-UCA-T215),3rd Semester,Bachelor of Computer Application,Techno India University

  9. Tools and Methods Used in Cyber line

    • paper.erudition.co.in
    html
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Tools and Methods Used in Cyber line [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3/cyber-security-and-ethical-hacking
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Question Paper Solutions of chapter Tools and Methods Used in Cyber line of Cyber security and ethical hacking, 3rd Semester , Bachelor of Computer Application

  10. Mobile Device Forensics

    • paper.erudition.co.in
    html
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Mobile Device Forensics [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3/cyber-security-and-ethical-hacking
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Question Paper Solutions of chapter Mobile Device Forensics of Cyber security and ethical hacking, 3rd Semester , Bachelor of Computer Application

  11. m

    IoT Vulnerability Dataset

    • data.mendeley.com
    Updated May 31, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Manasa Koppula (2024). IoT Vulnerability Dataset [Dataset]. http://doi.org/10.17632/7m58kxs742.1
    Explore at:
    Dataset updated
    May 31, 2024
    Authors
    Manasa Koppula
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The dataset uploaded here is generated in a realistic manner with IoT devices connected to the internet through router. By using well known ethical hacking tool Kali Linux is used for hacking the devices to generate network traffic of various attack network traffic. Wireshark software was used for capturing the data. All the PCAP files generated and their corresponding csv files have been uploaded here for the researchers in the field of IoT security.

  12. Introduction to Cybercrime

    • paper.erudition.co.in
    html
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Introduction to Cybercrime [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3/cyber-security-and-ethical-hacking
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Question Paper Solutions of chapter Introduction to Cybercrime of Cyber security and ethical hacking, 3rd Semester , Bachelor of Computer Application

  13. Cyber Offenses & Cybercrime

    • paper.erudition.co.in
    html
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Cyber Offenses & Cybercrime [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3/cyber-security-and-ethical-hacking
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Question Paper Solutions of chapter Cyber Offenses & Cybercrime of Cyber security and ethical hacking, 3rd Semester , Bachelor of Computer Application

  14. g

    GetData.IO - Ethical Hacking Jobs, 159 Ethical Hacking Openings - Naukri.com...

    • getdata.io
    csv, html, json
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    GetData.IO - Ethical Hacking Jobs, 159 Ethical Hacking Openings - Naukri.com [Dataset]. https://getdata.io/data-sources/100816-ethical-hacking-jobs-159-ethical-hacking-openings-naukri-com
    Explore at:
    csv, html, jsonAvailable download formats
    Time period covered
    Jan 5, 2022
    Description

    GetData.IO -

  15. Computer Forensics

    • paper.erudition.co.in
    html
    Updated Jun 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Computer Forensics [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3/cyber-security-and-ethical-hacking
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 23, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Question Paper Solutions of chapter Computer Forensics of Cyber security and ethical hacking, 3rd Semester , Bachelor of Computer Application

  16. R

    Break Captcha Life Dataset

    • universe.roboflow.com
    zip
    Updated Oct 30, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Navid (2021). Break Captcha Life Dataset [Dataset]. https://universe.roboflow.com/navid-p4wgh/break-captcha-life
    Explore at:
    zipAvailable download formats
    Dataset updated
    Oct 30, 2021
    Dataset authored and provided by
    Navid
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Variables measured
    Captcha Bounding Boxes
    Description

    Here are a few use cases for this project:

    1. Automated Accessibility: Improve accessibility for visually impaired or disabled users who struggle with solving Captchas by providing alternative methods for user verification, such as audio or text-based questions.

    2. CAPTCHA Improvement Research: Study the effectiveness of the current Captcha classes and develop more secure and user-friendly Captcha systems to prevent malicious automated bots from bypassing the security.

    3. Educational Tool: Teach machine learning and computer vision students and enthusiasts how to train and test models in recognizing and classifying Captcha characters, with the emphasis on proper use and ethical considerations.

    4. Data Entry Quality Assurance: Incorporate the "Break Captcha Life" model into data entry platforms to automatically verify Captcha solutions entered by human users, ensuring they have correctly solved the Captcha before submitting the form.

    5. Security Stress Testing: Test the robustness of various online platforms' Captcha systems by using the "Break Captcha Life" model to evaluate their susceptibility to automated attacks while adhering to responsible disclosure and ethical hacking practices.

  17. f

    Table_2_A Systematic Review of the Criminogenic Potential of Synthetic...

    • frontiersin.figshare.com
    docx
    Updated Jun 5, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Mariam Elgabry; Darren Nesbeth; Shane D. Johnson (2023). Table_2_A Systematic Review of the Criminogenic Potential of Synthetic Biology and Routes to Future Crime Prevention.docx [Dataset]. http://doi.org/10.3389/fbioe.2020.571672.s002
    Explore at:
    docxAvailable download formats
    Dataset updated
    Jun 5, 2023
    Dataset provided by
    Frontiers
    Authors
    Mariam Elgabry; Darren Nesbeth; Shane D. Johnson
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Synthetic biology has the potential to positively transform society in many application areas, including medicine. In common with all revolutionary new technologies, synthetic biology can also enable crime. Like cybercrime, that emerged following the advent of the internet, biocrime can have a significant effect on society, but may also impact on peoples' health. For example, the scale of harm caused by the SARS-CoV-2 pandemic illustrates the potential impact of future biocrime and highlights the need for prevention strategies. Systematic evidence quantifying the crime opportunities posed by synthetic biology has to date been very limited. Here, we systematically reviewed forms of crime that could be facilitated by synthetic biology with a view to informing their prevention. A total of 794 articles from four databases were extracted and a three-step screening phase resulted in 15 studies that met our threshold criterion for thematic synthesis. Within those studies, 13 exploits were identified. Of these, 46% were dependent on technologies characteristic of synthetic biology. Eight potential crime types emerged from the studies: bio-discrimination, cyber-biocrime, bio-malware, biohacking, at-home drug manufacturing, illegal gene editing, genetic blackmail, and neuro-hacking. 14 offender types were identified. For the most commonly identified offenders (>3 mentions) 40% were outsider threats. These observations suggest that synthetic biology presents substantial new offending opportunities. Moreover, that more effective engagement, such as ethical hacking, is needed now to prevent a crime harvest from developing in the future. A framework to address the synthetic biology crime landscape is proposed.

  18. Data from: Cyber security and ethical hacking

    • paper.erudition.co.in
    html
    Updated Jun 24, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Einetic (2024). Cyber security and ethical hacking [Dataset]. https://paper.erudition.co.in/techno-india-university/bachelor-of-computer-application/3
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jun 24, 2024
    Dataset authored and provided by
    Einetic
    License

    https://paper.erudition.co.in/termshttps://paper.erudition.co.in/terms

    Description

    Get Exam Question Paper Solutions of Cyber security and ethical hacking and many more.

  19. Penetration Testing Market: Global Industry Analysis, Size, Share, Growth,...

    • zionmarketresearch.com
    pdf
    Updated Jun 17, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zion Market Research (2024). Penetration Testing Market: Global Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2020-2026 [Dataset]. https://www.zionmarketresearch.com/report/penetration-testing-market
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jun 17, 2024
    Dataset authored and provided by
    Zion Market Research
    License

    https://www.zionmarketresearch.com/privacy-policyhttps://www.zionmarketresearch.com/privacy-policy

    Time period covered
    2022 - 2030
    Area covered
    Global
    Description

    Penetration testing is also called ethical hacking or pen testing. It is a basic framework to check the computer, network, and associated web applications.

  20. w

    ethicalhacking.com - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, ethicalhacking.com - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/index.php/domain/ethicalhacking.com/
    Explore at:
    csvAvailable download formats
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/index.php/terms-of-use/https://whoisdatacenter.com/index.php/terms-of-use/

    Time period covered
    Mar 15, 1985 - Jul 1, 2024
    Description

    Explore the historical Whois records related to ethicalhacking.com (Domain). Get insights into ownership history and changes over time.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
None (2023). Udemy - Learn Ethical Hacking From Scratch [Dataset]. https://academictorrents.com/details/dd0942e4a1782c0a662e9c16682ab977da156670

Udemy - Learn Ethical Hacking From Scratch

Explore at:
bittorrentAvailable download formats
Dataset updated
Aug 24, 2023
Authors
None
License

https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

Description

A BitTorrent file to download data with the title 'Udemy - Learn Ethical Hacking From Scratch'

Search
Clear search
Close search
Google apps
Main menu