منتدى استراحات زايد

منتدى استراحات زايد (http://vb.ma7room.com/index.php)
-   منتدى أخبار المواقع والمنتديات العربية والأجنبية (http://vb.ma7room.com/forumdisplay.php?f=183)
-   -   ثلاث كورسات من Lynda للهاكر وحماية الشبكات (http://vb.ma7room.com/showthread.php?t=2291638)

محروم.كوم 06-03-2018 10:40 PM

ثلاث كورسات من Lynda للهاكر وحماية الشبكات
 
<div>السلام عليكم ورحمة الله وبركاته

معكم ثلاث كورسات من Lynda خاصة بالهاكر الأخلاقي

الكورس الأول
IT Security Foundations: Network Security
https://i.imgur.com/UYrkCiF.jpg
MP4 | Video: 720p | Duration: 1:37:18 | English | Subtitles: VTT | 273.5 MB

Description
Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within

Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/e...am-98-367.aspx for more information.

:Topics include
(Implementing secure content management (SCM
(Implementing unified threat management (UTM
Introducing VLANs
NAT addressing
Network sniffing
Understanding common attack methods, such as password attacks
Protecting clients with antivirus software
Implementing physical security

صفحة الكورس
https://www.lynda.com/Windows-Server-tutorials/IT-Security-Foundations-Network-Security/410326-2.html
التحميل رابط واحد
http://links.snahp.it/oXEUbeaTR0iLQD...Pm5B7UCN0F2NL9

الكورس الثاني
Lynda - Ethical Hacking: Penetration Testing
https://i.imgur.com/Xd2ed71.jpg
Duration: 1h 20m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch | 178 MB
Genre: eLearning | Level: Intermediate | Language: English

Description
You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests—such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing—and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts.

:Topics include
Auditing security mechanisms
Locating vulnerabilities
Exploring types of penetration testing
Pen testing techniques
Following a pen-testing blueprint
Testing physical, wireless, website, database, and email security
Outsourcing penetration testing

صفحة الكورس
https://www.lynda.com/IT-Infrastructure-tutorials/Ethical-Hacking-Penetration-Testing/529366-2.html
التحميل رابط واحد
http://links.snahp.it/3azYYoGw1dU6Wn...viKnNh63O1LMvF

الكورس الثالث
Ethical Hacking: Viruses and Worms
https://i.imgur.com/OYXH6dJ.jpg
MP4 | Video: 720p | Duration: 38:22 | English | Subtitles: VTT | 106.7 MB

Description
Malware is often one of the first ways hackers will target a system or network. Ethical hackers can combat malware such as viruses and worms by understanding exactly how they are created, dispersed, detected, and neutralized. This course is part of our Ethical Hacking series, designed to give security professionals the tools to defend against attacks and prepare for the Certified Ethical Hacking exam. Join security ambassador Lisa Bock for an overview of malware, the differences between viruses and worms, and current virus trends and types, including macro, boot, shell, and cluster viruses. She also reviews the threat of polymorphism, techniques for overriding parasitic viruses, and the growing threat of ransomware. By the end of the course, you'll have the skills to detect and defend against malware on your own computer or your company's network.

Learn more about the Certified Ethical Hacking exam and the benefits of certification at https://www.eccouncil.org/programs/c...al-hacker-ceh/.

:Topics include
Understanding viruses and worms
Recognizing a virus attack
Identifying different virus types
Creating a simple virus
Analyzing malware
Countering malware

صفحة الكورس
https://www.lynda.com/Linux-tutorials/Ethical-Hacking-Viruses-Worms/513595-2.html
التحميل رابط واحد
http://links.snahp.it/6GFWKvMQlQcYbQ...rWGitJmcZpAVI9


الساعة الآن 12:03 AM

Powered by vBulletin® Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO 3.5.2 TranZ By Almuhajir


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227