Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- Getting Acquainted with Kali Linux Easy Way (9:08)
- Getting Acquainted with Terminal Commands (7:52)
- Installing Kali Linux on Virtual Machine (6:19)
- Installing Metasploitable 2 on Virtual Machine (7:39)
- The Course Overview (6:41)
- Tune Up Python (3:57)
- What is Kali Linux and Why We Should Use it (3:29)
- Advance-Level Hacking - Scanning Hosts with Python Script (6:17)
- Creating Reverse Shell with Metasploit (9:29)
- Hidden Scanning Ports with Nmap (8:52)
- Intercepting Traffic with Wireshark (5:29)
- Leaving a Backdoor in the Target Machine (4:37)
- Network Attack Vectors (2:59)
- Scanning the Network with OpenVas (7:39)
- Taking Control Over Target Browser with BeEf (11:08)
- Types of man-in-the-middle Attack (5:19)
- Breaking Database with SQL Injection (3:01)
- Executing a Session Hijacking (6:04)
- Executing Reflected XSS (4:26)
- Executing SQL Injection with SQLmap (5:19)
- Exploring Target with Browser (6:07)
- Infecting Website with Stored XSS (6:12)
- Manual Testing for SQL Injection (8:10)
- Proxy Attack with Burp Suite (8:08)
- Scanning Web-Application with OWASP ZAP (5:30)
- Using Python Script to Find Vulnerabilities (4:54)
- Creating a Malicious File with SET (5:12)
- Creating and Delivering Malicious USB Card (3:53)
- Gathering Emails and Phone Numbers with Maltego (6:31)
- How to Hack Without Getting in Touch with a Target (7:21)
- Learning Spear-Phishing Methods for VIP (5:38)
- Looking for Secrets in Social Media with Online Tools (6:16)
- Making a Phishing Email with SET (6:11)
- Playing on Human Emotions and Weaknesses to Get the Information (5:46)
- Social Engineering Techniques (3:37)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.