Cyber Security Course بالعربي
التصنيفات : تعلم البرمجة - Learn programming
محتوى الدورة
الاسبوع الاول
#1 Introduction To Cyber Security – SpicalEdition
26:14#2 Introduction To Computer | Cyber Security
46:07#3 How to install Kali Linux N Virtual Box environment
18:05#4 Basic Linux Commands – Part 1 | Cyber Security
31:02#4 Basic Linux Commands – Part 2 | Cyber Security
23:04#4 Basic Linux Commands – Part 3 | CyberSecurity
33:15#4 Basic Linux Commands – Part 4 | CyberSecurity
33:29
الاسبوع الثانى
#4 Basic Linux Commands – Part 5 | CyberSecurity
31:46#4 Basic Linux Commands – Part 6 | CyberSecurity
31:58#4 Basic Linux Commands – Part 7 | CyberSecurity
22:18#5 Hashing | CyberSecurity
21:41#6 Encoding | CyberSecurity
10:33#7 Encryption | CyberSecurity
24:40#8 HTTPS | CyberSecurity
17:49
الاسبوع الثالث
#9 Introduction To Network – Part1 | CyberSecurity
36:05#9 Introduction To Network ( IPv4 , ARP , NAT , MAC ) – Part2 | CyberSecurity
30:25#9 Introduction To Network ( Topolgies and OSI 7 Layers ) – Part3 | CyberSecurity
32:51#9 Introduction To Network ( OSI 7 Layers ) – Part4 | CyberSecurity
31:14#9 Introduction To Network ( OSI , DNS , TCP and UDP ) – Part5 | CyberSecurity
25:01#9 Introduction To Network ( Switch , HUB , Rpeater , Router ) – Part6 | CyberSecurity
20:11#9 Introduction To Network ( Firewall , Access Point ) – Part7 | CyberSecurity
25:37
الاسبوع الرابع
#9 Introduction To Network ( IPv4 Subnet Mask) – Part8 | CyberSecurity
30:14#10 VPN vs Proxy | CyberSecurity
30:58#11 Introduction To Information Gathering – Part1 | CyberSecurity
30:09#11 Introduction To Information Gathering – Part2 | CyberSecurity
30:09#11 Introduction To Information Gathering – Part3 | CyberSecurity
33:03#11 Introduction To Information Gathering – Part4 | CyberSecurity
35:19#11 Introduction To Information Gathering – Part5 | CyberSecurity
15:09
الاسبوع الخامس
#11 Introduction To Information Gathering – Part6 | CyberSecurity
20:22#12 Introduction To BurpSuite – Part1 | CyberSecurity
30:24#12 Introduction To BurpSuite – Part2 | CyberSecurity
20:59#12 Introduction To BurpSuite – Part3 | CyberSecurity
43:47#13 SubList3r | CyberSecurity
26:41#14 Subdomain TakeOver | CyberSecurity
23:01#15 HTTP Methods,Request,Response | CyberSecurity
26:52
الاسبوع السادس
#16 Introduction To HTML – Part1 | CyberSecurity
31:47#16 Introduction To HTML – Part2 | CyberSecurity
24:22#17 XSS ( Cross Site Script ) – Part1 | CyberSecurity
26:38#17 XSS ( Cross Site Script ) – Part2 | CyberSecurity
40:07#17 XSS ( Cross Site Script ) – Part3 | CyberSecurity
32:51#17 XSS ( Cross Site Script ) – Part4 | CyberSecurity
08:10#18 RCE ( Remote Command Execution ) – Part1 | CyberSecurity
10:22
الاسبوع السابع
#19 CORS & SOP ( Same-origin Policy ) | CyberSecurity
15:41#20 CSRF ( Cross Site Request Forgery ) | CyberSecurity
24:48#21 LFI ( Local File Inclusion ) | CyberSecurity
14:54#22 FU ( File Upload ) – Part1 | CyberSecurity
16:12#22 FU ( File Upload ) – Part2 | CyberSecurity
06:21#22 FU ( File Upload ) – Part3 | CyberSecurity
09:58#23 SQLi ( SQL injection ) – Part2 | CyberSecurity
32:15
الاسبوع الثامن
#23 SQLi ( SQL injection #Automated ) – Part3 | CyberSecurity
20:28#24 Metasploit Attack Learn ( Metasploitable v2) – Part 1 | CyberSecurity
26:11#24 Metasploit Attack Learn ( Metasploitable v2) – Part 2 | CyberSecurity
16:12#24 Metasploit Attack Learn ( Metasploitable v2) – Part 3 | CyberSecurity
15:38#24 Metasploit Attack Learn ( Metasploitable v2) – Part 4 | CyberSecurity
11:59#26 CTF ( Capture The Flag ) Road Map For Beginners | Cyber Security
28:21#27 How to hack WebApps (CTF Learn) Part 1 | Cyber Security
12:12
الاسبوع التاسع
#27 How to hack WebApps (CTF Learn) Part 2 | Cyber Security
09:12#27 How to hack WebApps (CTF Learn) Part 3 | Cyber Security
07:06#27 How to hack WebApps (CTF Learn) Part 4 | Cyber Security
09:08#28 How to solve Digital Forensics challenges (CTF Learn) Part 1 | Cybersecurity
10:51#28 How to solve Digital Forensics challenges (CTF Learn) Part 2 | Cybersecurity
11:13#28 How to solve Digital Forensics challenges (CTF Learn) Part 3 | Cybersecurity
09:07#28 How to solve Digital Forensics challenges (CTF Learn) Part 4 | Cybersecurity
18:50
الاسبوع العاشر
#28 How to solve Digital Forensics challenges (CTF Learn) Part 5 | Cybersecurity
22:00#28 How to solve Digital Forensics challenges (CTF Learn) Part 6 | Cybersecurity
28:19#29 How to solve Cryptography challenges (CTF Learn) Part 1 | Cyber security
12:44#29 How to solve Cryptography challenges (CTF Learn) Part 2 | Cyber security
17:25#29 How to solve Cryptography challenges (CTF Learn) Part 3 | Cyber security
14:46Remote Code Execution via web shell upload | AWAPT | Portswigger Lab | Cyber Security
15:55Web shell upload via Content-Type bypass and path traversal |AWAPT| Portswigger Lab | Cyber Security
14:47
الاسبوع الحادى عشر
Web shell upload via extension blacklist bypass | AWAPT | Portswigger Lab | Cyber Security
07:13Web shell upload via obfuscated file extension | AWAPT | Portswigger Lab | Cyber Security
07:11Remote code execution via polyglot web shell upload | AWAPT | Portswigger Lab | Cyber Security
08:54Web shell upload via race condition | AWAPT | Portswigger Lab | Cyber Security
11:33Authentication bypass via OAuth implicit flow | AWAPT | Portswigger Lab | Cyber Security
10:20Forced OAuth profile linking | AWAPT | Portswigger Lab | Cyber Security
10:18
تقييمات ومراجعات الطلاب
لا يوجد تقييم حتى الآن