MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Latest Online IT & Technology Training Courses, Course Reviews, Paid & Free Technology Courses and MOOCs in Information Technology domain. Share your e-Learning experience with IT community and submit your Online IT Course Reviews today.

Technology Courses for SQL injection
    All IT Courses and Reviews can be editable through Desktop/Tablet.
  • CEH (v9) - Certified Ethical Hacker Training

    CEH (v9) - Certified Ethical Hacker Training

    The course helps you master the advanced concepts on Ethical hacking such as corporate espionage, writing virus codes, exploit writing, and reverse engineering. You will understand advanced network packet analysis, securing IIS and Apache web servers, Windows system administration using PowerShell, Hacking SQL & Oracle database. Take this training if you are preparing for the EC-Council’s Ethical Hacker Examination (312-50)

  • Bug Bounty: Web Hacking

    Bug Bounty: Web Hacking

    Did you know you can make money identifying and fixing bugs on some of the biggest web apps on earth? Last year, Facebook paid $5 million to independent hackers while Google paid over $6 million as part of their bug bounty programs. And they're far from alone. In this course, you'll learn how to legally hack major companies like Facebook, Google, and PayPal and get paid to do it. Access 72 lectures & 5.5 hours of content 24/7 Learn how to get paid for hacking & disclosing bugs to major companies Get familiar w/ Burp Suite, browser plugins, & Kali Linux Explore types of vulnerability such as SQL, XSS, CSRF injection, & more Discover the methodology for performing bug bounty

  • The Super-Sized Ethical Hacking Bundle

    The Super-Sized Ethical Hacking Bundle

    Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In the first course of this four volume bundle, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge. Access 117 lectures & 11 hours of content 24/7 Explore the Darknet, malware, exploit kits, phishing, zero day vulnerabilities, & more Learn about global tracking & hacking infrastructures that nation states run Understand the foundations of operating system security & privacy functionality Get a crash course on encryption, how it can be bypassed, & what you can do to mitigate risks Discover defenses against phishing, SMShing, vishing, identity theft, & other cons

  • Integrating PHP with Databases

    Integrating PHP with Databases

    Building a PHP-driven page is the first step in mastering PHP. The true power of PHP shines when you connect it to a data source like an API or a Database. To introduce you to databases, we'll use an example project -- a Personal Media Library application. We'll refactor this project by replacing an associative array with a database to provide a more robust and scalable tool to store the data in the media library. In the process, you'll learn how to use PDO -- a PHP extension to communicate with a database. You'll also learn about relational databases including how to search for data across multiple tables, as well as how to add common web site features like search forms and pagination.

  • Understanding ASP.NET Core Security

    Understanding ASP.NET Core Security

    Security in ASP.NET Core shouldn't come as an afterthought when designing your application. In this course, you'll learn how to mitigate common attacks and implement encryption, authentication, and authorization.

  • Web App Hacking: Hacking Authentication

    Web App Hacking: Hacking Authentication

    This course helps to understand different types of vulnerabilities in an authentication mechanism. You'll learn how to test web applications for various authentication flaws and how to provide countermeasures for these problems.

Please login to view more courses
 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url