Understanding basics of programming with C/C++
What you'll learn
- Learn the basics of C/C++
- Develop simple C/C++ programs
Requirements
- A computer with internet connection
Description
Most low-level software are written in C/C++. Most cars, IoT devices or embedded devices have their software written in this kind of developing language.
For developers just getting started, think of this as the primer to help kickstart your career.
C++ is a general-purpose object-oriented programming (OOP) language, developed by Bjarne Stroustrup, and is an extension of the C language. It is therefore possible to code C++ in a "C style" or "object-oriented style." In certain scenarios, it can be coded in either way and is thus an effective example of a hybrid language.
C++ is considered to be an intermediate-level language, as it encapsulates both high- and low-level language features. Initially, the language was called "C with classes" as it had all the properties of the C language with an additional concept of "classes." However, it was renamed C++ in 1983.
Who this course is for:
- beginners in programming
- students who want to learn c/c++
- Junior Developers
Instructors
We are a team of experience and passionate instructors and IT professionals.
We own the following certifications:
ISO 27001 Lead Auditor
CREST CRT (CREST Registered Penetration Tester)
CREST Practioner Security Analyst
OSCP – Offensive Security Certified Professional
Certified EC-Council Instructor (CEI) | EC-Council
Certified Hacking Forensics Investigator (CHFI) | EC-Council
CEH – Certified Ethical Hacker
ECSA – EC-Council Certified Security Analyst
CCNA – Cisco Certified Network Associate
CCNA Security
CCAI – Cisco Certified Academy Instructor
CCNA Professional – Routing
CCNA Professional – Switching
VMWare vSphere Install, Configure, Manage
Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure
Advanced Linux & INFOSEC
We have over 10 years experience, both theoretical and practical.
We provide a vast portfolio of courses, created by our professionals or by well recognized companies in IT world.
We have already accomplished over 50 audit and penetration testing projects world wide.
We are focused on ethical hacking and IT Audit – deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). We make recommendations on security weaknesses and report on activities and findings.
We perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated). Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment.
Instructors:
- Mihai Beuca
- Gabriel Avramescu
Senior Information Security Consultant
- I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
- Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
- Make recommendations on security weaknesses and report on activities and findings.
- Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated)
- Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
- Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
- Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures
- Assist with the development of remediation services for identified findings
- Customize, operate, audit, and maintain security related tools and applications
IT Trainer
- CEH, ECSA, CHFI from EC-Council
- Cisco CCNA, CCNA Security, Linux Essentials
Certifications
- OSWE (Offensive Security Web Expert)
- CREST Registered Penetration Tester (CRT)
- ECIH
- OSCE
- OSWP
- OSCP
- CHFI (Computer Hacking Forensic Investigator)
- ISO 270001 Lead Auditor
- ECSA (EC-Council Security Analyst)
- CEH (Certified Ethical Hacker)
- CCNA and CCNA Security
- CCNP Routing and CCNP Switching
- Advanced Linux&InfoSEC
- VMWare vSphere Install, Configure, Manage
- Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.