1 00:00:01,860 --> 00:00:02,910 A real hero. 2 00:00:02,940 --> 00:00:03,520 Thomas. 3 00:00:03,540 --> 00:00:06,040 Oh congratulations everybody. 4 00:00:06,100 --> 00:00:08,340 You made it successfully. 5 00:00:08,410 --> 00:00:11,170 We can coinage you to go to the next part. 6 00:00:11,190 --> 00:00:13,710 Or this had advanced into court hacking. 7 00:00:13,750 --> 00:00:18,180 So there you are going to ruin the most talked about cryptographic. 8 00:00:18,460 --> 00:00:25,450 You would learn one of the most used tools in penetration DST and learn about what is firewalls how 9 00:00:25,450 --> 00:00:31,770 to bypass firewall how to make your water hacking how to hack into mobile phones. 10 00:00:31,780 --> 00:00:34,830 The concept of cryptography What is it. 11 00:00:35,060 --> 00:00:38,140 Erica Amar is a different man. 12 00:00:38,180 --> 00:00:43,350 You know you would learn a lot of stuff from wireless the hackings and the most used tool. 13 00:00:43,560 --> 00:00:51,290 Then you're going to earn some high in a of a web application attacks like our existence attack how 14 00:00:51,300 --> 00:00:51,840 it would work. 15 00:00:51,850 --> 00:00:59,470 And then we would show you exactly step by step process to know how to make these things. 16 00:01:01,120 --> 00:01:05,590 Thank you and see you in the next Congress. 17 00:01:05,680 --> 00:01:06,220 Best.