منتديات ملتقى الشباب العربى

هل تريد التفاعل مع هذه المساهمة؟ كل ما عليك هو إنشاء حساب جديد ببضع خطوات أو تسجيل الدخول للمتابعة.
منتديات ملتقى الشباب العربى


3 مشترك

    Cd.nseh كورس حماية الشبكات

    avatar
    hero_1978
    متالق شايف روحه
    متالق شايف روحه


    ذكر
    عدد الرسائل : 227
    العمر : 46
    البلـــــــــد : العظمى
    المدينة : طرابلس
    تاريخ التسجيل : 21/01/2008

    Cd.nseh كورس حماية الشبكات Empty Cd.nseh كورس حماية الشبكات

    مُساهمة من طرف hero_1978 28/1/2008, 6:33 am

    محتويات الكورس السي دي 1:



    Introduction to Information Security & Ethical Hacking
    Basics of Networking (Tutorial for beginners) (Introduction Only*)
    Introduction
    Hacker Vs Cracker
    Ethical Hacking
    Precautions
    Current Cyber Threats

    Desktop and Server Security
    Windows Security
    Hacking into Windows XP, NT
    SAM (Security Accounts Manager)
    Registries
    Counter Measures
    Linux Security
    Hacking into Linux
    Keyloggers - Hardware & Software
    Anti Keyloggers
    Trojans or Remote Administration Tools
    Spywares
    Viruses and Worms Introduction
    Classification of Viruses and Worms
    Examples of Viruses and Worms
    Countermeasures
    Anti Virus


    LAN Security
    Threats to LAN
    Countermeasures
    Network and File Sharing
    Firewalls
    Anti Virus
    Anti Spywares
    Network Scanners
    Introduction to Firewalls
    Working of a Firewall
    Types of Firewalls
    Packet Filters
    Proxy Gateways
    Network Address Translation
    Intrusion Detection
    Logging
    Network Tools and Commands (Tutorial)
    TCP/IP Commands
    ARP Command
    Trace route Command
    Netstat Command
    Finger Command
    Ping Command
    Nbtstat Command
    Ipconfig Command
    Telnet Command
    ==========================================

    كورس حماية الشبكات الجزء الثاني



    محتويات الكورس :

    Internet Security

    IP Addresses

    Finding an IP Address
    Through Instant Messaging Software
    Through Internet Relay Chat
    Through Website
    Through Email Headers
    Through Message Board Postings
    Proxies Servers
    Transparent Proxies
    Anonymous Proxies
    Distorting Proxies
    Elite Proxies
    Free Proxy Servers
    Analysis of Email Headers
    Yahoo Email
    Google Email
    SSL (Secure Sockets Layer)
    IP Spoofing


    Information Gathering for a Remote System
    Daemon Grabbing
    Port Scanning
    ICMP Messages
    Banner Grabbing
    Sockets
    Detection of TCP Port Scan TCP SYN Scanning
    Detection of SYN Scans
    SYN/ACK Scanning
    Detection of SYN/ACK Port Scan
    TCP FIN Scanning
    TCP XMAS tree scanning
    ACK Scanning
    UDP Ports
    Utility
    Fingerprinting
    OS Fingerprinting
    Remote OS Fingerprinting
    Attacking the System
    Nontechnical Attacks
    Network Infrastructure Attacks
    Operating System Attacks
    Technical Attacks
    Denial of Services attacks (DOS Attacks)
    Threat from Sniffing and Key Logging
    Trojan Attacks
    HTTP Request Smuggling g
    IP Spoofing
    Cross site ******ing (XSS)
    Buffer Overflows
    Format Bugs
    SQL Injection s
    Input Validation
    Viruses & Worms
    Spy Ware Software


    Password Cracking
    All other types of Attacks
    Password Cracking
    Password Guessing
    Dictionary Based Attacks
    Brute-Force Attacks
    Default Passwords
    Attacks on LOG files
    Sniffer Attacks


    Wireless & Bluetooth Security (Tutorial only) (Introduction Only*)
    Penetration Testing
    Definition
    Methodology
    Basic Approaches
    Google Hacking
    Terminologies
    Basic Search Techniques
    Basic Keyword searching
    Phrase search
    + Operator search
    - Operator search
    Range search
    Advanced Search Techniques Site
    Intitle, allintitle
    Inurl, allinurl
    Link .
    Phonebook
    Rphonebook
    Bphonebook
    Daterange
    Cache
    Filetype .
    Robots.txt
    ======================================

    كورس حماية الشبكات الجزء الثالث والأخير:



    محتويات الكورس :

    Encryption & Cryptography (Introduction Only*)
    Introduction to Cryptography
    Private Key Encryption
    Public Key Encryption
    DES Algorithm
    RSA Algorithm
    Hash Functions
    MD5 HASH algorithm
    Digital Signatures
    Encyptorsetup

    Computer Forensics (Introduction Only*)
    Introduction to Forensics
    Digital Evidence
    Requirements for Forensics
    Steps taken in Forensics investigation
    Acquisition
    Identification
    Evaluation
    Presentation
    Forensic Toolkit
    Steganography and Data Hiding
    Introduction
    Digital Watermarking
    Types of Steganography
    In band Data Insertion
    Data Algorithmic
    Overt based grammar
    Out-band Data Insertion
    Overwriting Data Insertion
    Steganography Tools & Applications

    Catching Criminals
    Cyber Terrorism
    Forms of Cyber Terrorism
    Factors & Reasons
    Countermeasures
    Challenges
    Honey Pots
    Definition
    Research Honey Pots
    Production Honey Pots
    Low Involved Honey Pots
    High Involved Honey Pots
    Pros & Cons
    Famous Honey Pots

    Cyber Laws & IT Act India (Introduction Only*)
    IT Act 2000
    Domain Name Disputes
    Definitions and Laws
    Cyber Crimes & penalties

    Security Auditing (Introduction Only*)
    Audit Objectives
    Risk Analysis
    Auditing Steps
    Previous Check
    Planning & Organisation
    Network Control - Policies / Stds
    Network Control - Hardware / Software
    Network Data Standards and Data Access
    Hardware and Software Backup and Recovery
    Software Communications
    Access to Network Operating Systems Software and Facilities
    Data Encryption and Filtering
    Internet Applications
    Password Protection

    تنبيه قد تظهر بعض الصور الغير اخلاقية
    أضغط هنا cat
    فارسة العرب
    فارسة العرب
    (^ سكرتيرة القائد العام v) ‏
    (^ سكرتيرة القائد العام v) ‏


    انثى
    عدد الرسائل : 611
    البلـــــــــد : United Arab Emirates
    العمل : Business Administration
    المدينة : Al 3in
    تاريخ التسجيل : 24/01/2008

    Cd.nseh كورس حماية الشبكات Empty رد: Cd.nseh كورس حماية الشبكات

    مُساهمة من طرف فارسة العرب 10/2/2008, 10:52 pm


    بــارك الله فيــك اخــي الكــريم هيــرو

    الله يـعــطيك العــافية ع الشــرح الــوافي ما قصــرت
    avatar
    ولدالسعوديه
    متالق شايف روحه
    متالق شايف روحه


    ذكر
    عدد الرسائل : 156
    العمر : 31
    البلـــــــــد : مكه المكرمه
    العمل : آدررس
    المدينة : مكه
    *جوى اليوم* : Cd.nseh كورس حماية الشبكات 2510
    تاريخ التسجيل : 29/01/2008

    Cd.nseh كورس حماية الشبكات Empty رد: Cd.nseh كورس حماية الشبكات

    مُساهمة من طرف ولدالسعوديه 8/3/2008, 2:28 am

    الله يعطيك العافيه

    ولا تحرمنا من جديدك

    أخوك ولد السعوديه
    واخي هيرو

      الوقت/التاريخ الآن هو 9/5/2024, 2:02 pm