Computer Networking 1
Lorem ipsum dolor sit amet
See More
Software Design
Lorem ipsum dolor sit amet
See More
Computer Hardware Architecture and Operating Systems
Lorem ipsum dolor sit amet
See More
Introduction to Security
Password Hashing Investigation
See More
Programming with C++
Lorem ipsum dolor sit amet
See More
Data Structures and Algorithms 1
"Boyer Moore against Rabin Karp"
See More
Data Structures and Algorithms 2
"Mandlebrot Function"
See More
Digital Forensics
"Defective Cowboys"
See More
Dynamic Web Development
"Intro to Web Development"
See More
Ethical Hacking 1
"System Penetration Test"
See More
Computer Networking 2
"Mapping and Evaluating a
Network"
See More
Ethical Hacking 2
"Web Application Testing"
See More
Ethical Hacking 3 Unit 1
"Coolplayer Buffer Overflow Tutorial"
See More
Ethical Hacking 3 Unit 2
"A Comparative Evaluation of
the effectiveness of modern-day password policies"
See More
Software Development for Mobile Devices
Secure-Walk - The safety app for walking alone
See More
Advanced Digital Forensics Part 1
Lorem ipsum dolor sit amet
See More
Advanced Digital Forensics Part 2
Lorem ipsum dolor sit amet
See More
IoT and Cloud Secure Development
Lorem ipsum dolor sit amet
See More
Engineering Resilient Systems
Lorem ipsum dolor sit amet
See More