Cd.nseh كورس حماية الشبكات
صفحة 1 من اصل 1
Cd.nseh كورس حماية الشبكات
السلام عليكم ورحمة الله وبركاته
اقدم اليوم لكم كورس حماية الشبكات
الكورس طبعا بالانجليزي
ولاكن هو سهل جدااا تعلمه
يعني اي حد يقدر يتعلم حتي لو مبيعرفش انجليزي
الكورس مقسم الي 3 اسطوانات
الكورس مميز جداً وأتمني أن تستفيدوا منه
محتويات الكورس السي دي 1
Introduction to Information Security & Ethical Hacking
Basics of Networking (Tutorial for beginners) (Introduction Only*)
Introduction
Hacker Vs Cracker
Ethical Hacking
Precautions
Current Cyber Threats
Desktop and Server Security
Windows Security
Hacking into Windows XP, NT
SAM (Security Accounts Manager)
Registries
Counter Measures
Linux Security
Hacking into Linux
Keyloggers - Hardware & Software
Anti Keyloggers
Trojans or Remote Administration Tools
Spywares
Viruses and Worms Introduction
Classification of Viruses and Worms
Examples of Viruses and Worms
Countermeasures
Anti Virus
LAN Security
Threats to LAN
Countermeasures
Network and File Sharing
Firewalls
Anti Virus
Anti Spywares
Network Scanners
Introduction to Firewalls
Working of a Firewall
Types of Firewalls
Packet Filters
Proxy Gateways
Network Address Translation
Intrusion Detection
Logging
Network Tools and Commands (Tutorial)
TCP/IP Commands
ARP Command
Trace route Command
Netstat Command
Finger Command
Ping Command
Nbtstat Command
Ipconfig Command
Telnet Command
==========================================
كورس حماية الشبكات الجزء الثاني
محتويات الكورس :
Internet Security
IP Addresses
Finding an IP Address
Through Instant Messaging Software
Through Internet Relay Chat
Through Website
Through Email Headers
Through Message Board Postings
Proxies Servers
Transparent Proxies
Anonymous Proxies
Distorting Proxies
Elite Proxies
Free Proxy Servers
Analysis of Email Headers
Yahoo Email
Google Email
SSL (Secure Sockets Layer)
IP Spoofing
Information Gathering for a Remote System
Daemon Grabbing
Port Scanning
ICMP Messages
Banner Grabbing
Sockets
Detection of TCP Port Scan TCP SYN Scanning
Detection of SYN Scans
SYN/ACK Scanning
Detection of SYN/ACK Port Scan
TCP FIN Scanning
TCP XMAS tree scanning
ACK Scanning
UDP Ports
Utility
Fingerprinting
OS Fingerprinting
Remote OS Fingerprinting
Attacking the System
Nontechnical Attacks
Network Infrastructure Attacks
Operating System Attacks
Technical Attacks
Denial of Services attacks (DOS Attacks)
Threat from Sniffing and Key Logging
Trojan Attacks
HTTP Request Smuggling g
IP Spoofing
Cross site ******ing (XSS)
Buffer Overflows
Format Bugs
SQL Injection s
Input Validation
Viruses & Worms
Spy Ware Software
Password Cracking
All other types of Attacks
Password Cracking
Password Guessing
Dictionary Based Attacks
Brute-Force Attacks
Default Passwords
Attacks on LOG files
Sniffer Attacks
Wireless & Bluetooth Security (Tutorial only) (Introduction Only*)
Penetration Testing
Definition
Methodology
Basic Approaches
Google Hacking
Terminologies
Basic Search Techniques
Basic Keyword searching
Phrase search
+ Operator search
- Operator search
Range search
Advanced Search Techniques Site
Intitle, allintitle
Inurl, allinurl
Link .
Phonebook
Rphonebook
Bphonebook
Daterange
Cache
Filetype .
Robots.txt
======================================
كورس حماية الشبكات الجزء الثالث والأخير:
محتويات الكورس :
Encryption & Cryptography (Introduction Only*)
Introduction to Cryptography
Private Key Encryption
Public Key Encryption
DES Algorithm
RSA Algorithm
Hash Functions
MD5 HASH algorithm
Digital Signatures
Encyptorsetup
Computer Forensics (Introduction Only*)
Introduction to Forensics
Digital Evidence
Requirements for Forensics
Steps taken in Forensics investigation
Acquisition
Identification
Evaluation
Presentation
Forensic Toolkit
Steganography and Data Hiding
Introduction
Digital Watermarking
Types of Steganography
In band Data Insertion
Data Algorithmic
Overt based grammar
Out-band Data Insertion
Overwriting Data Insertion
Steganography Tools & Applications
Catching Criminals
Cyber Terrorism
Forms of Cyber Terrorism
Factors & Reasons
Countermeasures
Challenges
Honey Pots
Definition
Research Honey Pots
Production Honey Pots
Low Involved Honey Pots
High Involved Honey Pots
Pros & Cons
Famous Honey Pots
Cyber Laws & IT Act India (Introduction Only*)
IT Act 2000
Domain Name Disputes
Definitions and Laws
Cyber Crimes & penalties
Security Auditing (Introduction Only*)
Audit Objectives
Risk Analysis
Auditing Steps
Previous Check
Planning & Organisation
Network Control - Policies / Stds
Network Control - Hardware / Software
Network Data Standards and Data Access
Hardware and Software Backup and Recovery
Software Communications
Access to Network Operating Systems Software and Facilities
Data Encryption and Filtering
Internet Applications
Password Protection
روابط التحميل
حمل من ملف وصلات التحميل
ملف وصلات التحميل
من هنا
اقدم اليوم لكم كورس حماية الشبكات
الكورس طبعا بالانجليزي
ولاكن هو سهل جدااا تعلمه
يعني اي حد يقدر يتعلم حتي لو مبيعرفش انجليزي
الكورس مقسم الي 3 اسطوانات
الكورس مميز جداً وأتمني أن تستفيدوا منه
محتويات الكورس السي دي 1
Introduction to Information Security & Ethical Hacking
Basics of Networking (Tutorial for beginners) (Introduction Only*)
Introduction
Hacker Vs Cracker
Ethical Hacking
Precautions
Current Cyber Threats
Desktop and Server Security
Windows Security
Hacking into Windows XP, NT
SAM (Security Accounts Manager)
Registries
Counter Measures
Linux Security
Hacking into Linux
Keyloggers - Hardware & Software
Anti Keyloggers
Trojans or Remote Administration Tools
Spywares
Viruses and Worms Introduction
Classification of Viruses and Worms
Examples of Viruses and Worms
Countermeasures
Anti Virus
LAN Security
Threats to LAN
Countermeasures
Network and File Sharing
Firewalls
Anti Virus
Anti Spywares
Network Scanners
Introduction to Firewalls
Working of a Firewall
Types of Firewalls
Packet Filters
Proxy Gateways
Network Address Translation
Intrusion Detection
Logging
Network Tools and Commands (Tutorial)
TCP/IP Commands
ARP Command
Trace route Command
Netstat Command
Finger Command
Ping Command
Nbtstat Command
Ipconfig Command
Telnet Command
==========================================
كورس حماية الشبكات الجزء الثاني
محتويات الكورس :
Internet Security
IP Addresses
Finding an IP Address
Through Instant Messaging Software
Through Internet Relay Chat
Through Website
Through Email Headers
Through Message Board Postings
Proxies Servers
Transparent Proxies
Anonymous Proxies
Distorting Proxies
Elite Proxies
Free Proxy Servers
Analysis of Email Headers
Yahoo Email
Google Email
SSL (Secure Sockets Layer)
IP Spoofing
Information Gathering for a Remote System
Daemon Grabbing
Port Scanning
ICMP Messages
Banner Grabbing
Sockets
Detection of TCP Port Scan TCP SYN Scanning
Detection of SYN Scans
SYN/ACK Scanning
Detection of SYN/ACK Port Scan
TCP FIN Scanning
TCP XMAS tree scanning
ACK Scanning
UDP Ports
Utility
Fingerprinting
OS Fingerprinting
Remote OS Fingerprinting
Attacking the System
Nontechnical Attacks
Network Infrastructure Attacks
Operating System Attacks
Technical Attacks
Denial of Services attacks (DOS Attacks)
Threat from Sniffing and Key Logging
Trojan Attacks
HTTP Request Smuggling g
IP Spoofing
Cross site ******ing (XSS)
Buffer Overflows
Format Bugs
SQL Injection s
Input Validation
Viruses & Worms
Spy Ware Software
Password Cracking
All other types of Attacks
Password Cracking
Password Guessing
Dictionary Based Attacks
Brute-Force Attacks
Default Passwords
Attacks on LOG files
Sniffer Attacks
Wireless & Bluetooth Security (Tutorial only) (Introduction Only*)
Penetration Testing
Definition
Methodology
Basic Approaches
Google Hacking
Terminologies
Basic Search Techniques
Basic Keyword searching
Phrase search
+ Operator search
- Operator search
Range search
Advanced Search Techniques Site
Intitle, allintitle
Inurl, allinurl
Link .
Phonebook
Rphonebook
Bphonebook
Daterange
Cache
Filetype .
Robots.txt
======================================
كورس حماية الشبكات الجزء الثالث والأخير:
محتويات الكورس :
Encryption & Cryptography (Introduction Only*)
Introduction to Cryptography
Private Key Encryption
Public Key Encryption
DES Algorithm
RSA Algorithm
Hash Functions
MD5 HASH algorithm
Digital Signatures
Encyptorsetup
Computer Forensics (Introduction Only*)
Introduction to Forensics
Digital Evidence
Requirements for Forensics
Steps taken in Forensics investigation
Acquisition
Identification
Evaluation
Presentation
Forensic Toolkit
Steganography and Data Hiding
Introduction
Digital Watermarking
Types of Steganography
In band Data Insertion
Data Algorithmic
Overt based grammar
Out-band Data Insertion
Overwriting Data Insertion
Steganography Tools & Applications
Catching Criminals
Cyber Terrorism
Forms of Cyber Terrorism
Factors & Reasons
Countermeasures
Challenges
Honey Pots
Definition
Research Honey Pots
Production Honey Pots
Low Involved Honey Pots
High Involved Honey Pots
Pros & Cons
Famous Honey Pots
Cyber Laws & IT Act India (Introduction Only*)
IT Act 2000
Domain Name Disputes
Definitions and Laws
Cyber Crimes & penalties
Security Auditing (Introduction Only*)
Audit Objectives
Risk Analysis
Auditing Steps
Previous Check
Planning & Organisation
Network Control - Policies / Stds
Network Control - Hardware / Software
Network Data Standards and Data Access
Hardware and Software Backup and Recovery
Software Communications
Access to Network Operating Systems Software and Facilities
Data Encryption and Filtering
Internet Applications
Password Protection
روابط التحميل
حمل من ملف وصلات التحميل
ملف وصلات التحميل
من هنا
صفحة 1 من اصل 1
صلاحيات هذا المنتدى:
لاتستطيع الرد على المواضيع في هذا المنتدى