elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
097 - The real hacking begins now!.en.vtt 2.9K
143 - What will you learn in this section.en.vtt 2.9K
143 - What will you learn in this section.en.srt 3.2K
097 - The real hacking begins now!.en.srt 3.2K
054 - Enabling monitor mode.en.vtt 5.3K
001 - Introduction to the course.en.vtt 5.3K
NA - Try and except rule.en.vtt 5.3K
008 - Changing IP address and wireless adapter setup.en.vtt 5.7K
039 - Injection attacks.en.vtt 5.8K
001 - Introduction to the course.en.srt 5.8K
054 - Enabling monitor mode.en.srt 5.8K
NA - Try and except rule.en.srt 5.9K
062 - Rainbow tables part 2.en.vtt 6.2K
009 - Creating a bootable Kali USB drive.en.vtt 6.2K
039 - Injection attacks.en.srt 6.3K
008 - Changing IP address and wireless adapter setup.en.srt 6.3K
048 - Installing XCAT and preventing injection attacks.en.vtt 6.6K
017 - Email harvesting.en.vtt 6.8K
062 - Rainbow tables part 2.en.srt 6.8K
009 - Creating a bootable Kali USB drive.en.srt 6.8K
013 - Changing our MAC address with macchanger.en.vtt 7.0K
101 - For loops.en.vtt 7.1K
118 - Creating persistence part 1.en.vtt 7.1K
048 - Installing XCAT and preventing injection attacks.en.srt 7.2K
082 - PHP code injection.en.srt 7.3K
082 - PHP code injection.en.vtt 7.3K
051 - Changing HTML code with XSS.en.vtt 7.4K
017 - Email harvesting.en.srt 7.4K
016 - Whois tool.en.vtt 7.5K
090 - Preventing privilege escalation.en.srt 7.5K
090 - Preventing privilege escalation.en.vtt 7.6K
123 - Starting programs using our backdoor.en.vtt 7.6K
013 - Changing our MAC address with macchanger.en.srt 7.6K
109 - Theory behind reverse shells.en.vtt 7.7K
070 - Problems while installing MITMf.en.vtt 7.7K
063 - Installing Fluxion.en.vtt 7.7K
134 - Adding the keylogger to our reverse shell part 2.en.vtt 7.8K
101 - For loops.en.srt 7.8K
118 - Creating persistence part 1.en.srt 7.8K
060 - Creating password lists with Cupp.en.vtt 7.9K
106 - Importing libraries.en.vtt 7.9K
019 - Zone transfer with Dig.en.vtt 7.9K
068 - Installing MITMf.en.vtt 7.9K
020 - Installing Metasploitable.en.vtt 8.0K
111 - Connection with reverse shell.en.vtt 8.0K
067 - Man in the middle attack theory.en.vtt 8.0K
051 - Changing HTML code with XSS.en.srt 8.1K
076 - Ettercap basics.en.vtt 8.2K
016 - Whois tool.en.srt 8.2K
041 - Exploiting command injection vulnerability.en.vtt 8.3K
109 - Theory behind reverse shells.en.srt 8.3K
123 - Starting programs using our backdoor.en.srt 8.3K
063 - Installing Fluxion.en.srt 8.5K
070 - Problems while installing MITMf.en.srt 8.5K
134 - Adding the keylogger to our reverse shell part 2.en.srt 8.5K
128 - Adding help option.en.vtt 8.5K
024 - Zenmap.en.vtt 8.5K
029 - Installing OWASP.en.vtt 8.5K
102 - While loops.en.vtt 8.6K
019 - Zone transfer with Dig.en.srt 8.6K
060 - Creating password lists with Cupp.en.srt 8.7K
106 - Importing libraries.en.srt 8.7K
068 - Installing MITMf.en.srt 8.7K
067 - Man in the middle attack theory.en.srt 8.7K
020 - Installing Metasploitable.en.srt 8.7K
083 - 2 Metasploitable exploits.en.srt 8.8K
083 - 2 Metasploitable exploits.en.vtt 8.8K
111 - Connection with reverse shell.en.srt 8.8K
065 - Preventing wireless attacks.en.vtt 8.9K
076 - Ettercap basics.en.srt 9.0K
041 - Exploiting command injection vulnerability.en.srt 9.1K
138 - Starting threads for bruteforce.en.vtt 9.2K
103 - Python lists.en.vtt 9.2K
037 - Hydra login bruteforce.en.vtt 9.3K
113 - Sending messages with while true loop.en.vtt 9.3K
029 - Installing OWASP.en.srt 9.3K
024 - Zenmap.en.srt 9.4K
128 - Adding help option.en.srt 9.4K
126 - Embedding backdoor in an image part 2.en.vtt 9.4K
102 - While loops.en.srt 9.5K
012 - Additional Kali tools to install.en.vtt 9.7K
027 - Nmap scripts part 1.en.vtt 9.7K
065 - Preventing wireless attacks.en.srt 9.8K
064 - Finding and cracking hidden networks.en.vtt 10K
071 - HTTP traffic sniffing.en.vtt 10K
138 - Starting threads for bruteforce.en.srt 10K
075 - Cloning any webpage.en.vtt 10K
114 - Executing commands on target system.en.vtt 10K
103 - Python lists.en.srt 10K
037 - Hydra login bruteforce.en.srt 10K
113 - Sending messages with while true loop.en.srt 10K
030 - HTTP request.en.vtt 10K
005 - Basic commands part 1.en.vtt 10K
140 - Bruteforcing router login.en.vtt 10K
130 - Simple keylogger.en.vtt 10K
034 - Whatweb and Dirb.en.vtt 10K
126 - Embedding backdoor in an image part 2.en.srt 10K
043 - SQL basics.en.vtt 10K
080 - Attacking Tomcat with Metasploit.en.srt 10K
080 - Attacking Tomcat with Metasploit.en.vtt 10K
027 - Nmap scripts part 1.en.srt 11K
012 - Additional Kali tools to install.en.srt 11K
100 - If-else statements.en.vtt 11K
031 - HTTP response.en.vtt 11K
064 - Finding and cracking hidden networks.en.srt 11K
071 - HTTP traffic sniffing.en.srt 11K
010 - Essential networking terms.en.vtt 11K
114 - Executing commands on target system.en.srt 11K
049 - Reflected XSS.en.vtt 11K
075 - Cloning any webpage.en.srt 11K
131 - Adding report function.en.vtt 11K
030 - HTTP request.en.srt 11K
005 - Basic commands part 1.en.srt 11K
140 - Bruteforcing router login.en.srt 11K
130 - Simple keylogger.en.srt 11K
043 - SQL basics.en.srt 11K
066 - ARP protocol basics.en.vtt 11K
034 - Whatweb and Dirb.en.srt 12K
085 - Creating Windows payloads with Msfvenom.en.vtt 12K
085 - Creating Windows payloads with Msfvenom.en.srt 12K
018 - Shodan.en.vtt 12K
105 - Classes.en.vtt 12K
040 - Simple command injection.en.vtt 12K
036 - Burpsuite login bruteforce.en.vtt 12K
129 - Importing Pynput.en.vtt 12K
092 - Getting Meterpreter over Internet with port forwarding.en.srt 12K
092 - Getting Meterpreter over Internet with port forwarding.en.vtt 12K
015 - Nikto basics.en.vtt 12K
095 - Hacking over the internet with Ngrok.en.srt 12K
095 - Hacking over the internet with Ngrok.en.vtt 12K
031 - HTTP response.en.srt 12K
100 - If-else statements.en.srt 12K
010 - Essential networking terms.en.srt 12K
112 - Sending and receiving messages.en.vtt 12K
137 - Adding available options.en.vtt 12K
139 - Writing function to run the attack.en.vtt 12K
049 - Reflected XSS.en.srt 12K
131 - Adding report function.en.srt 12K
053 - Wireless attacking theory.en.vtt 12K
099 - Raw input.en.vtt 12K
074 - Screenshotting targets browser.en.vtt 12K
050 - Stored XSS.en.vtt 12K
022 - Nmap part 2.en.vtt 12K
066 - ARP protocol basics.en.srt 13K
096 - Android device attack with Venom.en.vtt 13K
096 - Android device attack with Venom.en.srt 13K
129 - Importing Pynput.en.srt 13K
105 - Classes.en.srt 13K
036 - Burpsuite login bruteforce.en.srt 13K
018 - Shodan.en.srt 13K
040 - Simple command injection.en.srt 13K
023 - Nmap part 3.en.vtt 13K
136 - Printing banner.en.vtt 13K
120 - Changing directory.en.vtt 13K
148 - How to price your work.en.vtt 13K
127 - Checking for administrator privileges.en.vtt 13K
015 - Nikto basics.en.srt 13K
137 - Adding available options.en.srt 13K
044 - Manual SQL injection part 1.en.vtt 13K
107 - Files in Python.en.vtt 13K
112 - Sending and receiving messages.en.srt 13K
139 - Writing function to run the attack.en.srt 13K
053 - Wireless attacking theory.en.srt 13K
014 - Google hacking.en.vtt 14K
099 - Raw input.en.srt 14K
125 - Embedding backdoor in an image part 1.en.vtt 14K
110 - Simple server code.en.vtt 14K
074 - Screenshotting targets browser.en.srt 14K
033 - Editing packets in Burpsuite.en.vtt 14K
094 - Persistence module.en.vtt 14K
094 - Persistence module.en.srt 14K
022 - Nmap part 2.en.srt 14K
056 - RockYou.txt.en.vtt 14K
050 - Stored XSS.en.srt 14K
132 - Writing keystrokes to a file.en.vtt 14K
117 - Trying to connect every 20 seconds.en.vtt 14K
007 - Basic commands part 3.en.vtt 14K
084 - Wine installation.en.vtt 14K
032 - Burpsuite configuration.en.vtt 14K
084 - Wine installation.en.srt 14K
023 - Nmap part 3.en.srt 14K
120 - Changing directory.en.srt 14K
148 - How to price your work.en.srt 14K
052 - XSSer and XSSsniper.en.vtt 14K
038 - Session fixation.en.vtt 14K
136 - Printing banner.en.srt 14K
028 - Nmap scripts part 2.en.vtt 14K
127 - Checking for administrator privileges.en.srt 14K
044 - Manual SQL injection part 1.en.srt 15K
141 - Bypassing antivirus with your future programs.en.vtt 15K
078 - Metasploit modules explained.en.vtt 15K
078 - Metasploit modules explained.en.srt 15K
042 - Finding blind command injection.en.vtt 15K
107 - Files in Python.en.srt 15K
110 - Simple server code.en.srt 15K
014 - Google hacking.en.srt 15K
098 - Variables.en.vtt 15K
089 - Windows 10 privilege escalation.en.vtt 15K
125 - Embedding backdoor in an image part 1.en.srt 15K
089 - Windows 10 privilege escalation.en.srt 15K
033 - Editing packets in Burpsuite.en.srt 15K
087 - Windows 10 Meterpreter shell.en.vtt 15K
056 - RockYou.txt.en.srt 15K
087 - Windows 10 Meterpreter shell.en.srt 15K
088 - Meterpreter environment.en.vtt 15K
088 - Meterpreter environment.en.srt 15K
007 - Basic commands part 3.en.srt 15K
055 - Capturing handshake with airodump.en.vtt 15K
047 - XML injection.en.vtt 15K
117 - Trying to connect every 20 seconds.en.srt 15K
057 - Cracking with Aircrack.en.vtt 16K
058 - Cracking with Hashcat.en.vtt 16K
132 - Writing keystrokes to a file.en.srt 16K
135 - Final project test.en.vtt 16K
025 - TCP scans.en.vtt 16K
003 - Kali Linux installation.en.vtt 16K
032 - Burpsuite configuration.en.srt 16K
038 - Session fixation.en.srt 16K
069 - Manual ARP spoofing.en.vtt 16K
028 - Nmap scripts part 2.en.srt 16K
035 - Password recovery attack.en.vtt 16K
052 - XSSer and XSSsniper.en.srt 16K
104 - Functions.en.vtt 16K
021 - Nmap part 1.en.vtt 16K
141 - Bypassing antivirus with your future programs.en.srt 16K
042 - Finding blind command injection.en.srt 16K
098 - Variables.en.srt 17K
091 - Post exploitation modules.en.vtt 17K
091 - Post exploitation modules.en.srt 17K
055 - Capturing handshake with airodump.en.srt 17K
026 - Nmap bypassing defenses.en.vtt 17K
142 - Sending malware with spoofed email.en.vtt 17K
047 - XML injection.en.srt 17K
147 - How I started my career as an ethical hacker.en.vtt 17K
057 - Cracking with Aircrack.en.srt 17K
025 - TCP scans.en.srt 17K
135 - Final project test.en.srt 17K
003 - Kali Linux installation.en.srt 17K
069 - Manual ARP spoofing.en.srt 17K
058 - Cracking with Hashcat.en.srt 17K
046 - SQLmap basics.en.vtt 17K
061 - Rainbow tables part 1.en.vtt 18K
035 - Password recovery attack.en.srt 18K
073 - Hooking browsers with BEEF.en.vtt 18K
104 - Functions.en.srt 18K
021 - Nmap part 1.en.srt 18K
002 - VirtualBox installation.en.vtt 18K
119 - Creating persistence part 2.en.vtt 18K
079 - Bruteforcing SSH with Metasploit.en.vtt 18K
079 - Bruteforcing SSH with Metasploit.en.srt 19K
026 - Nmap bypassing defenses.en.srt 19K
147 - How I started my career as an ethical hacker.en.srt 19K
004 - Enabling full-screen.en.vtt 19K
124 - Capturing screenshot on the target PC.en.vtt 19K
142 - Sending malware with spoofed email.en.srt 19K
145 - What is the best ethical hacking certification.en.vtt 19K
011 - Essential hacking terms.en.vtt 19K
046 - SQLmap basics.en.srt 19K
061 - Rainbow tables part 1.en.srt 19K
073 - Hooking browsers with BEEF.en.srt 20K
059 - Creating password lists with Crunch.en.vtt 20K
002 - VirtualBox installation.en.srt 20K
077 - MSFconsole environment.en.vtt 20K
077 - MSFconsole environment.en.srt 20K
119 - Creating persistence part 2.en.srt 20K
004 - Enabling full-screen.en.srt 21K
045 - Manual SQL injection part 2.en.vtt 21K
124 - Capturing screenshot on the target PC.en.srt 21K
011 - Essential hacking terms.en.srt 21K
145 - What is the best ethical hacking certification.en.srt 21K
059 - Creating password lists with Crunch.en.srt 22K
116 - First test using our backdoor.en.vtt 22K
093 - Eternalblue exploit.en.vtt 22K
115 - Fixing backdoor bugs and adding functions.en.vtt 22K
133 - Adding the keylogger to our reverse shell part 1.en.vtt 22K
086 - Encoders and Hex editor.en.vtt 22K
086 - Encoders and Hex editor.en.srt 22K
146 - Tips for getting your first job as an ethical hacker.en.vtt 23K
006 - Basic commands part 2.en.vtt 23K
093 - Eternalblue exploit.en.srt 23K
045 - Manual SQL injection part 2.en.srt 23K
121 - Uploading and downloading files.en.vtt 24K
116 - First test using our backdoor.en.srt 24K
122 - Downloading files from the internet.en.vtt 25K
115 - Fixing backdoor bugs and adding functions.en.srt 25K
133 - Adding the keylogger to our reverse shell part 1.en.srt 25K
146 - Tips for getting your first job as an ethical hacker.en.srt 25K
006 - Basic commands part 2.en.srt 25K
072 - DNS spoofing and HTTPS password sniffing.en.vtt 26K
121 - Uploading and downloading files.en.srt 26K
144 - Why is ethical hacking a valuable skill.en.vtt 27K
122 - Downloading files from the internet.en.srt 27K
072 - DNS spoofing and HTTPS password sniffing.en.srt 29K
081 - Getting Meterpreter with command injection.en.vtt 29K
081 - Getting Meterpreter with command injection.en.srt 29K
144 - Why is ethical hacking a valuable skill.en.srt 29K
143 - What will you learn in this section.mp4 6.4M
101 - For loops.mp4 27M
067 - Man in the middle attack theory.mp4 31M
043 - SQL basics.mp4 33M
148 - How to price your work.mp4 33M
109 - Theory behind reverse shells.mp4 34M
103 - Python lists.mp4 34M
NA - Try and except rule.mp4 34M
102 - While loops.mp4 37M
019 - Zone transfer with Dig.mp4 37M
106 - Importing libraries.mp4 41M
011 - Essential hacking terms.mp4 43M
100 - If-else statements.mp4 44M
039 - Injection attacks.mp4 44M
099 - Raw input.mp4 44M
051 - Changing HTML code with XSS.mp4 47M
105 - Classes.mp4 48M
076 - Ettercap basics.mp4 49M
138 - Starting threads for bruteforce.mp4 52M
017 - Email harvesting.mp4 52M
053 - Wireless attacking theory.mp4 52M
129 - Importing Pynput.mp4 53M
111 - Connection with reverse shell.mp4 55M
144 - Why is ethical hacking a valuable skill.mp4 57M
001 - Introduction to the course.mp4 59M
130 - Simple keylogger.mp4 59M
140 - Bruteforcing router login.mp4 61M
123 - Starting programs using our backdoor.mp4 61M
107 - Files in Python.mp4 61M
060 - Creating password lists with Cupp.mp4 63M
134 - Adding the keylogger to our reverse shell part 2.mp4 63M
016 - Whois tool.mp4 64M
063 - Installing Fluxion.mp4 65M
131 - Adding report function.mp4 67M
049 - Reflected XSS.mp4 67M
113 - Sending messages with while true loop.mp4 68M
065 - Preventing wireless attacks.mp4 68M
008 - Changing IP address and wireless adapter setup.mp4 69M
097 - The real hacking begins now!.mp4 70M
137 - Adding available options.mp4 70M
062 - Rainbow tables part 2.mp4 72M
110 - Simple server code.mp4 72M
083 - 2 Metasploitable exploits.mp4 73M
104 - Functions.mp4 75M
128 - Adding help option.mp4 76M
136 - Printing banner.mp4 77M
118 - Creating persistence part 1.mp4 77M
082 - PHP code injection.mp4 78M
139 - Writing function to run the attack.mp4 80M
114 - Executing commands on target system.mp4 80M
048 - Installing XCAT and preventing injection attacks.mp4 80M
041 - Exploiting command injection vulnerability.mp4 82M
098 - Variables.mp4 82M
037 - Hydra login bruteforce.mp4 83M
112 - Sending and receiving messages.mp4 83M
044 - Manual SQL injection part 1.mp4 84M
066 - ARP protocol basics.mp4 86M
009 - Creating a bootable Kali USB drive.mp4 86M
018 - Shodan.mp4 86M
127 - Checking for administrator privileges.mp4 86M
013 - Changing our MAC address with macchanger.mp4 86M
070 - Problems while installing MITMf.mp4 92M
050 - Stored XSS.mp4 92M
132 - Writing keystrokes to a file.mp4 93M
078 - Metasploit modules explained.mp4 93M
030 - HTTP request.mp4 97M
022 - Nmap part 2.mp4 98M
020 - Installing Metasploitable.mp4 100M
075 - Cloning any webpage.mp4 100M
004 - Enabling full-screen.mp4 101M
142 - Sending malware with spoofed email.mp4 102M
090 - Preventing privilege escalation.mp4 104M
015 - Nikto basics.mp4 105M
120 - Changing directory.mp4 106M
095 - Hacking over the internet with Ngrok.mp4 106M
054 - Enabling monitor mode.mp4 108M
071 - HTTP traffic sniffing.mp4 110M
014 - Google hacking.mp4 111M
012 - Additional Kali tools to install.mp4 112M
040 - Simple command injection.mp4 112M
080 - Attacking Tomcat with Metasploit.mp4 113M
085 - Creating Windows payloads with Msfvenom.mp4 114M
057 - Cracking with Aircrack.mp4 115M
117 - Trying to connect every 20 seconds.mp4 119M
125 - Embedding backdoor in an image part 1.mp4 119M
126 - Embedding backdoor in an image part 2.mp4 122M
089 - Windows 10 privilege escalation.mp4 123M
092 - Getting Meterpreter over Internet with port forwarding.mp4 126M
023 - Nmap part 3.mp4 127M
091 - Post exploitation modules.mp4 127M
024 - Zenmap.mp4 129M
031 - HTTP response.mp4 131M
032 - Burpsuite configuration.mp4 133M
047 - XML injection.mp4 133M
084 - Wine installation.mp4 134M
005 - Basic commands part 1.mp4 135M
034 - Whatweb and Dirb.mp4 136M
141 - Bypassing antivirus with your future programs.mp4 136M
068 - Installing MITMf.mp4 142M
061 - Rainbow tables part 1.mp4 144M
087 - Windows 10 Meterpreter shell.mp4 148M
052 - XSSer and XSSsniper.mp4 149M
056 - RockYou.txt.mp4 149M
029 - Installing OWASP.mp4 149M
027 - Nmap scripts part 1.mp4 150M
077 - MSFconsole environment.mp4 151M
010 - Essential networking terms.mp4 152M
036 - Burpsuite login bruteforce.mp4 157M
074 - Screenshotting targets browser.mp4 157M
033 - Editing packets in Burpsuite.mp4 159M
046 - SQLmap basics.mp4 161M
069 - Manual ARP spoofing.mp4 162M
119 - Creating persistence part 2.mp4 165M
088 - Meterpreter environment.mp4 165M
059 - Creating password lists with Crunch.mp4 166M
007 - Basic commands part 3.mp4 167M
094 - Persistence module.mp4 170M
073 - Hooking browsers with BEEF.mp4 172M
064 - Finding and cracking hidden networks.mp4 174M
116 - First test using our backdoor.mp4 174M
096 - Android device attack with Venom.mp4 174M
115 - Fixing backdoor bugs and adding functions.mp4 176M
135 - Final project test.mp4 177M
042 - Finding blind command injection.mp4 181M
086 - Encoders and Hex editor.mp4 182M
146 - Tips for getting your first job as an ethical hacker.mp4 186M
058 - Cracking with Hashcat.mp4 188M
124 - Capturing screenshot on the target PC.mp4 191M
147 - How I started my career as an ethical hacker.mp4 191M
021 - Nmap part 1.mp4 197M
045 - Manual SQL injection part 2.mp4 197M
122 - Downloading files from the internet.mp4 202M
038 - Session fixation.mp4 202M
133 - Adding the keylogger to our reverse shell part 1.mp4 203M
028 - Nmap scripts part 2.mp4 208M
079 - Bruteforcing SSH with Metasploit.mp4 211M
003 - Kali Linux installation.mp4 214M
026 - Nmap bypassing defenses.mp4 215M
145 - What is the best ethical hacking certification.mp4 222M
035 - Password recovery attack.mp4 228M
002 - VirtualBox installation.mp4 228M
025 - TCP scans.mp4 232M
093 - Eternalblue exploit.mp4 232M
121 - Uploading and downloading files.mp4 267M
081 - Getting Meterpreter with command injection.mp4 274M
006 - Basic commands part 2.mp4 275M
055 - Capturing handshake with airodump.mp4 322M
072 - DNS spoofing and HTTPS password sniffing.mp4 335M
Recent Courses
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql