ملفات وكورسات دورات متنوعة باللغة الانجليزية لتعلم الحاسوب والشبكات وامن المعلومات 50 جيجا
ملفات وكورسات متنوعة باللغة الانجليزية لتعلم الحاسوب والشبكات وامن المعلومات 50 جيجا
اسم الملف :
Hax 1
الحجم الإجمالي للمف:
49.94 جيجابايت
يحتوي على:
216 مجلدات وملفات 1920
محتويات المجلد كالتالي:
اسم الملف :
Hax 1
الحجم الإجمالي للمف:
49.94 جيجابايت
يحتوي على:
216 مجلدات وملفات 1920
محتويات المجلد كالتالي:
- Hax 1
- Arduino
- 1.
Introduction to Arduino
- 2.
Programming Arduino
- 3.
Arduino Hardware
- 4.
Working with sensors and shields
- Assembly
- Code
Samples
- functions
- if
- loops
- structs
- Bitcoin and Cryptocurrency Technologies [Princeton University]
- assignments
- assignment_1
- assignment_2
- assignment_3
- assignment_4
- CHFI
- CHFI
Module 1 Introduction
- CHFI
Module 2 Forensics Investigation Process
- CHFI
Module 3 Searching & Seizing
- CHFI
Module 4 Digital Evidence
- CHFI
Module 5 Responder Procedures
- CHFI
Module 6 Forensic Lab
- CHFI
Module 7 Hard Disks & File Systems
- CHFI
Module 8 Windows Forensics
- CHFI
Module 9 Data Acquisition and Duplication
- CHFI
Module 10 Recovering Deleted Files and Partitions
- CHFI
Module 11 Using Access Data FTK
- CHFI
Module 12 Using EnCase
- CHFI
Module 13 Steganography
- CHFI
Module 14 Password Crackers
- CHFI
Module 15 Log Correlation
- CHFI
Module 16 Network Forensics
- CHFI
Module 17 Wireless Attacks
- CHFI
Module 18 Web Attacks
- CHFI
Module 19 Email Crimes
- CHFI
Module 20 Mobile Investigation
- CHFI
Module 21 Investigative Reports
- CHFI
Module 22 Expert Witness
- CISA
- CISA
- Lesson 1
- CISA
- Lesson 2
- CISA
- Lesson 3
- CISA
- Lesson 4
- CISA
- Lesson 5
- CISA
- Lesson 6
- CISA
- Lesson 7
- CISM
- CISM
- Domain 1 Information Security Governance
- CISM
- Domain 2 Risk Management
- CISM
- Domain 3 Information Security Program
- CISM
- Domain 4 Information Security Program Implementation
- CISM
- Domain 5 Information Security Program Management
- CISM
- Domain 6 Incident Management and Response
- CISSP
- CISSP
Module 1 Security and Risk Management
- CISSP
Module 2 Asset Security
- CISSP
Module 3 Security Engineering
- CISSP
Module 4 Communication and Network Security
- CISSP
Module 5 Identity and Access Management
- CISSP
Module 6 Security Assessment Testing
- CISSP
Module 7 Security Operations
- CISSP
Module 8 Software Development Security
- Raspberry
for Devs
- Clean Code; Writing Code for Humans
- 1.
Introduction
- 2.
Principles
- 3.
Naming
- 4.
Conditionals
- 5.
Functions
- 6.
Classes
- 7.
Comments
- 8.
Demo
- 9.
Stay clean
- Hacking wireless networks
- 1.
Insights into wireless
- 2.
Encryption in wireless
- 3.
Threats from wireless
- 4.
The methodology of hacking wireless
- 5.
Hacking bluetooth
- 6.
Countermeasures
- Hardware Security
- Week
1
- Week
2
- Week
3
- Week
4
- Week
5
- Week
6
- Introduction to Firewalls
- Introduction
to Firewalls
- Introduction to Penetration Testing Using Metasploit
- 1.
Course overview
- 2.
Introducing metasploit for pentesting
- 3.
Installing and configuring metasploit
- 4.
Scanning the network
- 5.
Gaining access to systems
- 6.
Maintaining and expanding metasploit
- Introduction to Pentesting
- 1.
Understanding Pentesting
- 2.
Recon-Footprint
- 3.
Scanning
- 4.
Enumerating
- 5.
Hacking
- 6.
Sniffing
- 7.
Social Engineering
- 8.
DoS
- 9.
Session Hijacking
- 10.
Web Servers
- 11.
Web Apps
- 12.
WiFi
- 13.
Mobile Devices
- 14.
Firewall & IDS
- 15.
Cloud
- 16.
Bring it all together
- Metasploit Basics
- Metasploit
Basics for Protecting SharePoint
- Perl
- Perl
Underground [Ezines]
- Python – Beyond the Basics
- 1.
Prerequisites
- 2.
Organizing Larger Programs
- 3.
Beyond Basic Functions
- 4.
Closures and Decorators
- 5.
Properties and Class methods
- 6.
Strings and Representations
- 7.
Numeric and Scalar Types
- 8.
Iterables and Iteration
- 9.
Inheritance and subtype polymorphism
- 10.
Implementing Collections
- 11.
Exceptions and Errors
- 12.
Defining Context Managers
- 13.
Instrospection
- Python Fundamentals
- 1.
Introduction to course
- 2.
Getting started with Python 3
- 3.
Strings and Collections
- 4.
Modularity
- 5.
Objects
- 6.
Collections
- 7.
Handling exceptions
- 8.
Iterables
- 9.
Classes
- 10.
Files and Resource Management
- 11.
Shipping Working and Maintainable Code
- red hat
- Reverse Engineering
- Reverse
Engineering
- Social Engineering
- 1.
Humans; The soft center withing the hard shell
- 2.
A walkthrough of a social engineering attack
- 3.
Reconnaisance and OSINT
- 4.
Phishing attacks
- 5.
Identity theft and impersonation
- 6.
Social Engineering Countermeasures
- SQL Injection
- 1.
Why SQL Injection Matters
- 2.
Understanding SQL Queries
- 3.
The mechanics of SQL Injection Attacks
- 4.
Discovering Schema and Extracting Data
- 5.
Blind SQL Injection
- 6.
Advanced SQL Injection Concepts
- 7.
Defending against attacks
- 8.
Evasion Techniques
- 9.
Automating Attacks
- System hacking
- 1.
Understanding this stage
- 2.
Phase 1; Gaining access - cracking passwords
- 3.
More cracking
- 4.
Phase 2; Gaining access - escalating privileges
- 5.
Phase 3; Maintaining access - executing apps
- 6.
Phase 4; Maintaining access - hiding your tools
- 7.
Phase 5; Covering your tracks - clearing logs and evidence
- The Complete Ethical Hacking Course - Udemy
- Wireshark 2.0
- 1.
Course Overview
- 2.
Getting Started
- 3.
Capturing Network Traffic
- 4.
Filtering Live Network Traffic
- 5.
Using Display Filters
- 6.
Using Coloring Rules
- 7. Creating Config Profile
📌 نأتي الآن لتحميل الملف :
اذا لديك أي سؤال، فلا تتردد في الاتصال بنا
.For any kind of question, please feel free to contact us.
تحميل كتاب:ملفات وكورسات متنوعة باللغة الانجليزية دورات تعليمية مجانا دورة امن المعلومات دورات عن الشبكات والحاسوب الالي
HAMAD BASHIR
#المصدر شبكات التواصل الاجتماعية فيس بوك security test
اطرح اي سؤال خاص بالموضوع في التعليقات