Loading...

نبذة عن اختبار اختراق الشبكات

اختبار الاختراق هي عملية اكتشاف الثغرات الموجودة على النظام وتنقسم الى قسمين برمجي وشبكى وهنا سنتحدث عن الجزء الشبكى وهو اختبار اختراق الشبكات و يتعلم الهاكر فيه كيفية تحديد جميع نقاط الوصول إلى الشبكة (Ports) والعمل على الدخول من خلال احدها وتقييم مدى ضعف كل ثغرة وتحديد آلية تأمينها.

تفاصيل الكورس

يمكنك مذاكرة الدروس بعد التسجيل فى الكورس

دروس كورس اختبار اختراق الشبكات

  • 1 #1 Introduction To Cyber Security - SpicalEdition 00:26:14
  • 2 #2 Introduction To Computer Cyber Security 00:46:07
  • 3 #3 How to install Kali Linux N Virtual Box environment 00:18:05
  • 4 #4 Basic Linux Commands - Part 1 Cyber Security 00:31:02
  • 5 #4 Basic Linux Commands - Part 2 Cyber Security 00:23:04
  • 6 #4 Basic Linux Commands - Part 3 CyberSecurity 00:33:16
  • 7 #4 Basic Linux Commands - Part 4 CyberSecurity 00:33:29
  • 8 #4 Basic Linux Commands - Part 5 CyberSecurity 00:31:46
  • 9 #4 Basic Linux Commands - Part 6 CyberSecurity 00:31:58
  • 10 #4 Basic Linux Commands - Part 7 CyberSecurity 00:22:18
  • 11 #5 Hashing CyberSecurity 00:21:41
  • 12 #6 Encoding CyberSecurity 00:10:34
  • 13 #7 Encryption CyberSecurity 00:24:40
  • 14 #8 HTTPS CyberSecurity 00:17:49
  • 15 #9 Introduction To Network - Part1 CyberSecurity 00:36:06
  • 16 #9 Introduction To Network ( IPv4 , ARP , NAT , MAC ) - Part2 CyberSecurity 00:30:25
  • 17 #9 Introduction To Network ( Topolgies and OSI 7 Layers ) - Part3 CyberSecurity 00:32:51
  • 18 #9 Introduction To Network ( OSI 7 Layers ) - Part4 CyberSecurity 00:31:15
  • 19 #9 Introduction To Network ( OSI , DNS , TCP and UDP ) - Part5 CyberSecurity 00:25:01
  • 20 #9 Introduction To Network ( Switch , HUB , Repeater , Router ) - Part6 CyberSecurity 00:20:11
  • 21 #9 Introduction To Network ( Firewall , Access Point ) - Part7 CyberSecurity 00:25:37
  • 22 #9 Introduction To Network ( IPv4 Subnet Mask) - Part8 CyberSecurity 00:30:15
  • 23 #10 VPN vs Proxy CyberSecurity 00:30:58
  • 24 #11 Introduction To Information Gathering - Part1 CyberSecurity 00:30:09
  • 25 #11 Introduction To Information Gathering - Part2 CyberSecurity 00:30:09
  • 26 #11 Introduction To Information Gathering - Part3 CyberSecurity 00:33:03
  • 27 #11 Introduction To Information Gathering - Part4 CyberSecurity 00:35:19
  • 28 #11 Introduction To Information Gathering - Part5 CyberSecurity 00:15:09
  • 29 #11 Introduction To Information Gathering - Part6 CyberSecurity 00:20:22
  • 30 #12 Introduction To BurpSuite - Part1 CyberSecurity 00:30:24
  • 31 #12 Introduction To BurpSuite - Part2 CyberSecurity 00:20:59
  • 32 #12 Introduction To BurpSuite - Part3 CyberSecurity 00:43:48
  • 33 #13 SubList3r CyberSecurity 00:26:41
  • 34 #14 Subdomain TakeOver CyberSecurity 00:23:01
  • 35 #15 HTTP Methods,Request,Response CyberSecurity 00:26:53
  • 36 #16 Introduction To HTML - Part1 CyberSecurity 00:31:48
  • 37 #16 Introduction To HTML - Part2 CyberSecurity 00:24:22
  • 38 #17 XSS ( Cross Site Script ) - Part1 CyberSecurity 00:26:38
  • 39 #17 XSS ( Cross Site Script ) - Part2 CyberSecurity 00:40:07
  • 40 #17 XSS ( Cross Site Script ) - Part3 CyberSecurity 00:32:51
  • 41 #17 XSS ( Cross Site Script ) - Part4 CyberSecurity 00:08:10
  • 42 #18 RCE ( Remote Command Execution ) - Part1 CyberSecurity 00:10:22
  • 43 #19 CORS & SOP ( Same-origin Policy ) CyberSecurity 00:15:42
  • 44 #20 CSRF ( Cross Site Request Forgery ) CyberSecurity 00:24:49
  • 45 #21 LFI ( Local File Inclusion ) CyberSecurity 00:14:54
  • 46 #22 FU ( File Upload ) - Part1 CyberSecurity 00:16:12
  • 47 #22 FU ( File Upload ) - Part2 CyberSecurity 00:06:21
  • 48 #22 FU ( File Upload ) - Part3 CyberSecurity 00:09:58
  • 49 #23 SQLi ( SQL injection ) - Part2 CyberSecurity 00:32:15
  • 50 #23 SQLi ( SQL injection #Automated ) - Part3 CyberSecurity 00:20:29
  • 51 #24 Metasploit Attack Learn ( Metasploitable v2) - Part 1 CyberSecurity 00:26:11
  • 52 #24 Metasploit Attack Learn ( Metasploitable v2) - Part 2 CyberSecurity 00:16:12
  • 53 #24 Metasploit Attack Learn ( Metasploitable v2) - Part 4 CyberSecurity 00:11:59
  • 54 #26 CTF ( Capture The Flag ) Road Map For Beginners Cyber Security 00:28:21
  • 55 #27 How to hack WebApps (CTF Learn) Part 1 Cyber Security 00:12:12
  • 56 #27 How to hack WebApps (CTF Learn) Part 2 Cyber Security 00:09:12
  • 57 #27 How to hack WebApps (CTF Learn) Part 3 Cyber Security 00:07:06
  • 58 #27 How to hack WebApps (CTF Learn) Part 4 Cyber Security 00:09:08
  • 59 #28 How to solve Digital Forensics challenges (CTF Learn) Part 1 Cybersecurity 00:10:51
  • 60 #28 How to solve Digital Forensics challenges (CTF Learn) Part 2 Cybersecurity 00:11:13
  • 61 #28 How to solve Digital Forensics challenges (CTF Learn) Part 3 Cybersecurity 00:09:07
  • 62 #28 How to solve Digital Forensics challenges (CTF Learn) Part 4 Cybersecurity 00:18:50
  • 63 #28 How to solve Digital Forensics challenges (CTF Learn) Part 5 Cybersecurity 00:22:00
  • 64 #28 How to solve Digital Forensics challenges (CTF Learn) Part 6 Cybersecurity 00:28:19
  • 65 #29 How to solve Cryptography challenges (CTF Learn) Part 1 Cyber security 00:12:44
  • 66 #29 How to solve Cryptography challenges (CTF Learn) Part 2 Cyber security 00:17:25
  • 67 #29 How to solve Cryptography challenges (CTF Learn) Part 3 Cyber security 00:14:46
  • 68 Remote Code Execution via web shell upload AWAPT Portswigger Lab Cyber Security 00:15:55
  • 69 Web shell upload via Content-Type bypass and path traversal AWAPT Portswigger Lab Cyber Security 00:14:47
  • 70 Web shell upload via extension blacklist bypass AWAPT Portswigger Lab Cyber Security 00:07:13
  • 71 Web shell upload via obfuscated file extension AWAPT Portswigger Lab Cyber Security 00:07:11
  • 72 Remote code execution via polyglot web shell upload AWAPT Portswigger Lab Cyber Security 00:08:54
  • 73 Web shell upload via race condition AWAPT Portswigger Lab Cyber Security 00:11:33
  • 74 Authentication bypass via OAuth implicit flow AWAPT Portswigger Lab Cyber Security 00:10:20
  • 75 Forced OAuth profile linking AWAPT Portswigger Lab Cyber Security 00:10:18
  • 76 The End - النهاية 00:08:01

محاضر كورس اختبار اختراق الشبكات

Jordan Shield درع الأردن

تقييمات الطلاب

4.4 / 5

( 6 )

  • 16.67%
  • 83.33%
  • 0%
  • 0%
  • 0%

بعض التقييمات
ahmed

creator

Housam Mousa

wayel abdelhafiz

Fayadh21

NJM