|
إنضمامك إلي منتديات استراحات زايد يحقق لك معرفة كل ماهو جديد في عالم الانترنت ...
انضم الينا
#1
| ||
| ||
<div>السلام عليكم ورحمة الله وبركاته معكم ثلاث كورسات من Lynda خاصة بالهاكر الأخلاقي الكورس الأول IT Security Foundations: Network Security MP4 | Video: 720p | Duration: 1:37:18 | English | Subtitles: VTT | 273.5 MB Description Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/e...am-98-367.aspx for more information. :Topics include (Implementing secure content management (SCM (Implementing unified threat management (UTM Introducing VLANs NAT addressing Network sniffing Understanding common attack methods, such as password attacks Protecting clients with antivirus software Implementing physical security صفحة الكورس https://www.lynda.com/Windows-Server-tutorials/IT-Security-Foundations-Network-Security/410326-2.html التحميل رابط واحد http://links.snahp.it/oXEUbeaTR0iLQD...Pm5B7UCN0F2NL9 الكورس الثاني Lynda - Ethical Hacking: Penetration Testing Duration: 1h 20m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch | 178 MB Genre: eLearning | Level: Intermediate | Language: English Description You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests—such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing—and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts. :Topics include Auditing security mechanisms Locating vulnerabilities Exploring types of penetration testing Pen testing techniques Following a pen-testing blueprint Testing physical, wireless, website, database, and email security Outsourcing penetration testing صفحة الكورس https://www.lynda.com/IT-Infrastructure-tutorials/Ethical-Hacking-Penetration-Testing/529366-2.html التحميل رابط واحد http://links.snahp.it/3azYYoGw1dU6Wn...viKnNh63O1LMvF الكورس الثالث Ethical Hacking: Viruses and Worms MP4 | Video: 720p | Duration: 38:22 | English | Subtitles: VTT | 106.7 MB Description Malware is often one of the first ways hackers will target a system or network. Ethical hackers can combat malware such as viruses and worms by understanding exactly how they are created, dispersed, detected, and neutralized. This course is part of our Ethical Hacking series, designed to give security professionals the tools to defend against attacks and prepare for the Certified Ethical Hacking exam. Join security ambassador Lisa Bock for an overview of malware, the differences between viruses and worms, and current virus trends and types, including macro, boot, shell, and cluster viruses. She also reviews the threat of polymorphism, techniques for overriding parasitic viruses, and the growing threat of ransomware. By the end of the course, you'll have the skills to detect and defend against malware on your own computer or your company's network. Learn more about the Certified Ethical Hacking exam and the benefits of certification at https://www.eccouncil.org/programs/c...al-hacker-ceh/. :Topics include Understanding viruses and worms Recognizing a virus attack Identifying different virus types Creating a simple virus Analyzing malware Countering malware صفحة الكورس https://www.lynda.com/Linux-tutorials/Ethical-Hacking-Viruses-Worms/513595-2.html التحميل رابط واحد http://links.snahp.it/6GFWKvMQlQcYbQ...rWGitJmcZpAVI9 __DEFINE_LIKE_SHARE__ |
مواقع النشر (المفضلة) |
| |
المواضيع المتشابهه | ||||
الموضوع | كاتب الموضوع | المنتدى | مشاركات | آخر مشاركة |
أول صورة للهاكر السعودى مخترق بطاقات الإئتمان الاسرائيليه | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 01-07-2012 08:22 AM |
[ للبيـع ] كورسات الانجليزى ( أرقى كورسات فى العالم لتعليم اللغة الانجليزية | yara.mohsen50 | بيع و شراء و عروض التجارية | 1 | 10-23-2011 06:21 AM |
لمديرى الشبكات و أصحاب المواقع مجموعة من أهم أدوات الشبكات | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 05-06-2009 09:30 PM |
هكر الشبكات يا خبراء الشبكات بسرعة | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 04-24-2009 01:00 PM |
هكر الشبكات يا خبراء الشبكات | محروم.كوم | منتدى أخبار المواقع والمنتديات العربية والأجنبية | 0 | 04-24-2009 12:40 PM |