ملفات ودورات لتعلم الحاسوب والشبكات وامن المعلومات 50 جيجا

hmd-it
0

ملفات وكورسات دورات متنوعة باللغة الانجليزية لتعلم الحاسوب والشبكات وامن المعلومات 50 جيجا

ملفات وكورسات متنوعة باللغة الانجليزية لتعلم الحاسوب والشبكات وامن المعلومات 50 جيجا
اسم الملف :
Hax 1
الحجم الإجمالي للمف:
49.94 جيجابايت
يحتوي على:

216 مجلدات وملفات 1920
محتويات المجلد كالتالي:

  • Hax 1

    • Arduino

      • 1. Introduction to Arduino
      • 2. Programming Arduino
      • 3. Arduino Hardware
      • 4. Working with sensors and shields

    • Assembly

      • Code Samples
        • functions
        • if
        • loops
        • structs

    • Bitcoin and Cryptocurrency Technologies [Princeton University]

      • assignments
        • assignment_1
        • assignment_2
        • assignment_3
        • assignment_4

    • CHFI

      • CHFI Module 1 Introduction
      • CHFI Module 2 Forensics Investigation Process
      • CHFI Module 3 Searching & Seizing
      • CHFI Module 4 Digital Evidence
      • CHFI Module 5 Responder Procedures
      • CHFI Module 6 Forensic Lab
      • CHFI Module 7 Hard Disks & File Systems
      • CHFI Module 8 Windows Forensics
      • CHFI Module 9 Data Acquisition and Duplication
      • CHFI Module 10 Recovering Deleted Files and Partitions
      • CHFI Module 11 Using Access Data FTK
      • CHFI Module 12 Using EnCase
      • CHFI Module 13 Steganography
      • CHFI Module 14 Password Crackers
      • CHFI Module 15 Log Correlation
      • CHFI Module 16 Network Forensics
      • CHFI Module 17 Wireless Attacks
      • CHFI Module 18 Web Attacks
      • CHFI Module 19 Email Crimes
      • CHFI Module 20 Mobile Investigation
      • CHFI Module 21 Investigative Reports
      • CHFI Module 22 Expert Witness

    • CISA

      • CISA - Lesson 1
      • CISA - Lesson 2
      • CISA - Lesson 3
      • CISA - Lesson 4
      • CISA - Lesson 5
      • CISA - Lesson 6
      • CISA - Lesson 7

    • CISM

      • CISM - Domain 1 Information Security Governance
      • CISM - Domain 2 Risk Management
      • CISM - Domain 3 Information Security Program
      • CISM - Domain 4 Information Security Program Implementation
      • CISM - Domain 5 Information Security Program Management
      • CISM - Domain 6 Incident Management and Response

    • CISSP

      • CISSP Module 1 Security and Risk Management
      • CISSP Module 2 Asset Security
      • CISSP Module 3 Security Engineering
      • CISSP Module 4 Communication and Network Security
      • CISSP Module 5 Identity and Access Management
      • CISSP Module 6 Security Assessment Testing
      • CISSP Module 7 Security Operations
      • CISSP Module 8 Software Development Security
      • Raspberry for Devs

    • Clean Code; Writing Code for Humans

      • 1. Introduction
      • 2. Principles
      • 3. Naming
      • 4. Conditionals
      • 5. Functions
      • 6. Classes
      • 7. Comments
      • 8. Demo
      • 9. Stay clean

    • Hacking wireless networks

      • 1. Insights into wireless
      • 2. Encryption in wireless
      • 3. Threats from wireless
      • 4. The methodology of hacking wireless
      • 5. Hacking bluetooth
      • 6. Countermeasures

    • Hardware Security

      • Week 1
      • Week 2
      • Week 3
      • Week 4
      • Week 5
      • Week 6

    • Introduction to Firewalls

      • Introduction to Firewalls

    • Introduction to Penetration Testing Using Metasploit

      • 1. Course overview
      • 2. Introducing metasploit for pentesting
      • 3. Installing and configuring metasploit
      • 4. Scanning the network
      • 5. Gaining access to systems
      • 6. Maintaining and expanding metasploit

    • Introduction to Pentesting

      • 1. Understanding Pentesting
      • 2. Recon-Footprint
      • 3. Scanning
      • 4. Enumerating
      • 5. Hacking
      • 6. Sniffing
      • 7. Social Engineering
      • 8. DoS
      • 9. Session Hijacking
      • 10. Web Servers
      • 11. Web Apps
      • 12. WiFi
      • 13. Mobile Devices
      • 14. Firewall & IDS
      • 15. Cloud
      • 16. Bring it all together

    • Metasploit Basics

      • Metasploit Basics for Protecting SharePoint

    • Perl

      • Perl Underground [Ezines]

    • Python – Beyond the Basics

      • 1. Prerequisites
      • 2. Organizing Larger Programs
      • 3. Beyond Basic Functions
      • 4. Closures and Decorators
      • 5. Properties and Class methods
      • 6. Strings and Representations
      • 7. Numeric and Scalar Types
      • 8. Iterables and Iteration
      • 9. Inheritance and subtype polymorphism
      • 10. Implementing Collections
      • 11. Exceptions and Errors
      • 12. Defining Context Managers
      • 13. Instrospection

    • Python Fundamentals

      • 1. Introduction to course
      • 2. Getting started with Python 3
      • 3. Strings and Collections
      • 4. Modularity
      • 5. Objects
      • 6. Collections
      • 7. Handling exceptions
      • 8. Iterables
      • 9. Classes
      • 10. Files and Resource Management
      • 11. Shipping Working and Maintainable Code

    • red hat

    • Reverse Engineering

      • Reverse Engineering

    • Social Engineering

      • 1. Humans; The soft center withing the hard shell
      • 2. A walkthrough of a social engineering attack
      • 3. Reconnaisance and OSINT
      • 4. Phishing attacks
      • 5. Identity theft and impersonation
      • 6. Social Engineering Countermeasures

    • SQL Injection

      • 1. Why SQL Injection Matters
      • 2. Understanding SQL Queries
      • 3. The mechanics of SQL Injection Attacks
      • 4. Discovering Schema and Extracting Data
      • 5. Blind SQL Injection
      • 6. Advanced SQL Injection Concepts
      • 7. Defending against attacks
      • 8. Evasion Techniques
      • 9. Automating Attacks

    • System hacking

      • 1. Understanding this stage
      • 2. Phase 1; Gaining access - cracking passwords
      • 3. More cracking
      • 4. Phase 2; Gaining access - escalating privileges
      • 5. Phase 3; Maintaining access - executing apps
      • 6. Phase 4; Maintaining access - hiding your tools
      • 7. Phase 5; Covering your tracks - clearing logs and evidence

    • The Complete Ethical Hacking Course - Udemy

    • Wireshark 2.0

      • 1. Course Overview
      • 2. Getting Started
      • 3. Capturing Network Traffic
      • 4. Filtering Live Network Traffic
      • 5. Using Display Filters
      • 6. Using Coloring Rules
      • 7. Creating Config Profile
📌 نأتي الآن لتحميل الملف :
اذا لديك أي سؤال، فلا تتردد في الاتصال بنا
.For any kind of question, please feel free to contact us. 
تحميل كتاب:ملفات وكورسات متنوعة باللغة الانجليزية دورات تعليمية مجانا دورة امن المعلومات دورات عن الشبكات والحاسوب الالي
HAMAD BASHIR
#المصدر شبكات التواصل الاجتماعية فيس بوك security test

إرسال تعليق

0تعليقات

اطرح اي سؤال خاص بالموضوع في التعليقات

إرسال تعليق (0)