Cyber Security Course بالعربي
التصنيفات : تعلم البرمجة - Learn programming

محتوى الدورة
الاسبوع الاول
-
#1 Introduction To Cyber Security – SpicalEdition
26:14 -
#2 Introduction To Computer | Cyber Security
46:07 -
#3 How to install Kali Linux N Virtual Box environment
18:05 -
#4 Basic Linux Commands – Part 1 | Cyber Security
31:02 -
#4 Basic Linux Commands – Part 2 | Cyber Security
23:04 -
#4 Basic Linux Commands – Part 3 | CyberSecurity
33:15 -
#4 Basic Linux Commands – Part 4 | CyberSecurity
33:29
الاسبوع الثانى
-
#4 Basic Linux Commands – Part 5 | CyberSecurity
31:46 -
#4 Basic Linux Commands – Part 6 | CyberSecurity
31:58 -
#4 Basic Linux Commands – Part 7 | CyberSecurity
22:18 -
#5 Hashing | CyberSecurity
21:41 -
#6 Encoding | CyberSecurity
10:33 -
#7 Encryption | CyberSecurity
24:40 -
#8 HTTPS | CyberSecurity
17:49
الاسبوع الثالث
-
#9 Introduction To Network – Part1 | CyberSecurity
36:05 -
#9 Introduction To Network ( IPv4 , ARP , NAT , MAC ) – Part2 | CyberSecurity
30:25 -
#9 Introduction To Network ( Topolgies and OSI 7 Layers ) – Part3 | CyberSecurity
32:51 -
#9 Introduction To Network ( OSI 7 Layers ) – Part4 | CyberSecurity
31:14 -
#9 Introduction To Network ( OSI , DNS , TCP and UDP ) – Part5 | CyberSecurity
25:01 -
#9 Introduction To Network ( Switch , HUB , Rpeater , Router ) – Part6 | CyberSecurity
20:11 -
#9 Introduction To Network ( Firewall , Access Point ) – Part7 | CyberSecurity
25:37
الاسبوع الرابع
-
#9 Introduction To Network ( IPv4 Subnet Mask) – Part8 | CyberSecurity
30:14 -
#10 VPN vs Proxy | CyberSecurity
30:58 -
#11 Introduction To Information Gathering – Part1 | CyberSecurity
30:09 -
#11 Introduction To Information Gathering – Part2 | CyberSecurity
30:09 -
#11 Introduction To Information Gathering – Part3 | CyberSecurity
33:03 -
#11 Introduction To Information Gathering – Part4 | CyberSecurity
35:19 -
#11 Introduction To Information Gathering – Part5 | CyberSecurity
15:09
الاسبوع الخامس
-
#11 Introduction To Information Gathering – Part6 | CyberSecurity
20:22 -
#12 Introduction To BurpSuite – Part1 | CyberSecurity
30:24 -
#12 Introduction To BurpSuite – Part2 | CyberSecurity
20:59 -
#12 Introduction To BurpSuite – Part3 | CyberSecurity
43:47 -
#13 SubList3r | CyberSecurity
26:41 -
#14 Subdomain TakeOver | CyberSecurity
23:01 -
#15 HTTP Methods,Request,Response | CyberSecurity
26:52
الاسبوع السادس
-
#16 Introduction To HTML – Part1 | CyberSecurity
31:47 -
#16 Introduction To HTML – Part2 | CyberSecurity
24:22 -
#17 XSS ( Cross Site Script ) – Part1 | CyberSecurity
26:38 -
#17 XSS ( Cross Site Script ) – Part2 | CyberSecurity
40:07 -
#17 XSS ( Cross Site Script ) – Part3 | CyberSecurity
32:51 -
#17 XSS ( Cross Site Script ) – Part4 | CyberSecurity
08:10 -
#18 RCE ( Remote Command Execution ) – Part1 | CyberSecurity
10:22
الاسبوع السابع
-
#19 CORS & SOP ( Same-origin Policy ) | CyberSecurity
15:41 -
#20 CSRF ( Cross Site Request Forgery ) | CyberSecurity
24:48 -
#21 LFI ( Local File Inclusion ) | CyberSecurity
14:54 -
#22 FU ( File Upload ) – Part1 | CyberSecurity
16:12 -
#22 FU ( File Upload ) – Part2 | CyberSecurity
06:21 -
#22 FU ( File Upload ) – Part3 | CyberSecurity
09:58 -
#23 SQLi ( SQL injection ) – Part2 | CyberSecurity
32:15
الاسبوع الثامن
-
#23 SQLi ( SQL injection #Automated ) – Part3 | CyberSecurity
20:28 -
#24 Metasploit Attack Learn ( Metasploitable v2) – Part 1 | CyberSecurity
26:11 -
#24 Metasploit Attack Learn ( Metasploitable v2) – Part 2 | CyberSecurity
16:12 -
#24 Metasploit Attack Learn ( Metasploitable v2) – Part 3 | CyberSecurity
15:38 -
#24 Metasploit Attack Learn ( Metasploitable v2) – Part 4 | CyberSecurity
11:59 -
#26 CTF ( Capture The Flag ) Road Map For Beginners | Cyber Security
28:21 -
#27 How to hack WebApps (CTF Learn) Part 1 | Cyber Security
12:12
الاسبوع التاسع
-
#27 How to hack WebApps (CTF Learn) Part 2 | Cyber Security
09:12 -
#27 How to hack WebApps (CTF Learn) Part 3 | Cyber Security
07:06 -
#27 How to hack WebApps (CTF Learn) Part 4 | Cyber Security
09:08 -
#28 How to solve Digital Forensics challenges (CTF Learn) Part 1 | Cybersecurity
10:51 -
#28 How to solve Digital Forensics challenges (CTF Learn) Part 2 | Cybersecurity
11:13 -
#28 How to solve Digital Forensics challenges (CTF Learn) Part 3 | Cybersecurity
09:07 -
#28 How to solve Digital Forensics challenges (CTF Learn) Part 4 | Cybersecurity
18:50
الاسبوع العاشر
-
#28 How to solve Digital Forensics challenges (CTF Learn) Part 5 | Cybersecurity
22:00 -
#28 How to solve Digital Forensics challenges (CTF Learn) Part 6 | Cybersecurity
28:19 -
#29 How to solve Cryptography challenges (CTF Learn) Part 1 | Cyber security
12:44 -
#29 How to solve Cryptography challenges (CTF Learn) Part 2 | Cyber security
17:25 -
#29 How to solve Cryptography challenges (CTF Learn) Part 3 | Cyber security
14:46 -
Remote Code Execution via web shell upload | AWAPT | Portswigger Lab | Cyber Security
15:55 -
Web shell upload via Content-Type bypass and path traversal |AWAPT| Portswigger Lab | Cyber Security
14:47
الاسبوع الحادى عشر
-
Web shell upload via extension blacklist bypass | AWAPT | Portswigger Lab | Cyber Security
07:13 -
Web shell upload via obfuscated file extension | AWAPT | Portswigger Lab | Cyber Security
07:11 -
Remote code execution via polyglot web shell upload | AWAPT | Portswigger Lab | Cyber Security
08:54 -
Web shell upload via race condition | AWAPT | Portswigger Lab | Cyber Security
11:33 -
Authentication bypass via OAuth implicit flow | AWAPT | Portswigger Lab | Cyber Security
10:20 -
Forced OAuth profile linking | AWAPT | Portswigger Lab | Cyber Security
10:18
تقييمات ومراجعات الطلاب
لا يوجد تقييم حتى الآن