• دعنا نشارك هذا :

خصائص الدورة:

  1. 01 #1 Introduction To Cyber Security - SpicalEdition 00:26:14
  2. 02 #2 Introduction To Computer Cyber Security 00:46:07
  3. 03 #3 How to install Kali Linux N Virtual Box environment 00:18:05
  4. 04 #4 Basic Linux Commands - Part 1 Cyber Security 00:31:02
  5. 05 #4 Basic Linux Commands - Part 2 Cyber Security 00:23:04
  6. 06 #4 Basic Linux Commands - Part 3 CyberSecurity 00:33:16
  7. 07 #4 Basic Linux Commands - Part 4 CyberSecurity 00:33:29
  8. 08 #4 Basic Linux Commands - Part 5 CyberSecurity 00:31:46
  9. 09 #4 Basic Linux Commands - Part 6 CyberSecurity 00:31:58
  10. 10 #4 Basic Linux Commands - Part 7 CyberSecurity 00:22:18
  11. 11 #5 Hashing CyberSecurity 00:21:41
  12. 12 #6 Encoding CyberSecurity 00:10:34
  13. 13 #7 Encryption CyberSecurity 00:24:40
  14. 14 #8 HTTPS CyberSecurity 00:17:49
  15. 15 #9 Introduction To Network - Part1 CyberSecurity 00:36:06
  16. 16 #9 Introduction To Network ( IPv4 , ARP , NAT , MAC ) - Part2 CyberSecurity 00:30:25
  17. 17 #9 Introduction To Network ( Topolgies and OSI 7 Layers ) - Part3 CyberSecurity 00:32:51
  18. 18 #9 Introduction To Network ( OSI 7 Layers ) - Part4 CyberSecurity 00:31:15
  19. 19 #9 Introduction To Network ( OSI , DNS , TCP and UDP ) - Part5 CyberSecurity 00:25:01
  20. 20 #9 Introduction To Network ( Switch , HUB , Rpeater , Router ) - Part6 CyberSecurity 00:20:11
  21. 21 #9 Introduction To Network ( Firewall , Access Point ) - Part7 CyberSecurity 00:25:37
  22. 22 #9 Introduction To Network ( IPv4 Subnet Mask) - Part8 CyberSecurity 00:30:15
  23. 23 #10 VPN vs Proxy CyberSecurity 00:30:58
  24. 24 #11 Introduction To Information Gathering - Part1 CyberSecurity 00:30:09
  25. 25 #11 Introduction To Information Gathering - Part2 CyberSecurity 00:30:09
  26. 26 #11 Introduction To Information Gathering - Part3 CyberSecurity 00:33:03
  27. 27 #11 Introduction To Information Gathering - Part4 CyberSecurity 00:35:19
  28. 28 #11 Introduction To Information Gathering - Part5 CyberSecurity 00:15:09
  29. 29 #11 Introduction To Information Gathering - Part6 CyberSecurity 00:20:22
  30. 30 #12 Introduction To BurpSuite - Part1 CyberSecurity 00:30:24
  31. 31 #12 Introduction To BurpSuite - Part2 CyberSecurity 00:20:59
  32. 32 #12 Introduction To BurpSuite - Part3 CyberSecurity 00:43:48
  33. 33 #13 SubList3r CyberSecurity 00:26:41
  34. 34 #14 Subdomain TakeOver CyberSecurity 00:23:01
  35. 35 #15 HTTP Methods,Request,Response CyberSecurity 00:26:53
  36. 36 #16 Introduction To HTML - Part1 CyberSecurity 00:31:48
  37. 37 #16 Introduction To HTML - Part2 CyberSecurity 00:24:22
  38. 38 #17 XSS ( Cross Site Script ) - Part1 CyberSecurity 00:26:38
  39. 39 #17 XSS ( Cross Site Script ) - Part2 CyberSecurity 00:40:07
  40. 40 #17 XSS ( Cross Site Script ) - Part3 CyberSecurity 00:32:51
  41. 41 #17 XSS ( Cross Site Script ) - Part4 CyberSecurity 00:08:10
  42. 42 #18 RCE ( Remote Command Execution ) - Part1 CyberSecurity 00:10:22
  43. 43 #19 CORS & SOP ( Same-origin Policy ) CyberSecurity 00:15:42
  44. 44 #20 CSRF ( Cross Site Request Forgery ) CyberSecurity 00:24:49
  45. 45 #21 LFI ( Local File Inclusion ) CyberSecurity 00:14:54
  46. 46 #22 FU ( File Upload ) - Part1 CyberSecurity 00:16:12
  47. 47 #22 FU ( File Upload ) - Part2 CyberSecurity 00:06:21
  48. 48 #22 FU ( File Upload ) - Part3 CyberSecurity 00:09:58
  49. 49 #23 SQLi ( SQL injection ) - Part2 CyberSecurity 00:32:15
  50. 50 #23 SQLi ( SQL injection #Automated ) - Part3 CyberSecurity 00:20:29
  51. 51 #24 Metasploit Attack Learn ( Metasploitable v2) - Part 1 CyberSecurity 00:26:11
  52. 52 #24 Metasploit Attack Learn ( Metasploitable v2) - Part 2 CyberSecurity 00:16:12
  53. 53 #24 Metasploit Attack Learn ( Metasploitable v2) - Part 3 CyberSecurity 00:15:38
  54. 54 #24 Metasploit Attack Learn ( Metasploitable v2) - Part 4 CyberSecurity 00:11:59
  55. 55 #26 CTF ( Capture The Flag ) Road Map For Beginners Cyber Security 00:28:21
  56. 56 #27 How to hack WebApps (CTF Learn) Part 1 Cyber Security 00:12:12
  57. 57 #27 How to hack WebApps (CTF Learn) Part 2 Cyber Security 00:09:12
  58. 58 #27 How to hack WebApps (CTF Learn) Part 3 Cyber Security 00:07:06
  59. 59 #27 How to hack WebApps (CTF Learn) Part 4 Cyber Security 00:09:08
  60. 60 #28 How to solve Digital Forensics challenges (CTF Learn) Part 1 Cybersecurity 00:10:51
  61. 61 #28 How to solve Digital Forensics challenges (CTF Learn) Part 2 Cybersecurity 00:11:13
  62. 62 #28 How to solve Digital Forensics challenges (CTF Learn) Part 3 Cybersecurity 00:09:07
  63. 63 #28 How to solve Digital Forensics challenges (CTF Learn) Part 4 Cybersecurity 00:18:50
  64. 64 #28 How to solve Digital Forensics challenges (CTF Learn) Part 5 Cybersecurity 00:22:00
  65. 65 #28 How to solve Digital Forensics challenges (CTF Learn) Part 6 Cybersecurity 00:28:19
  66. 66 #29 How to solve Cryptography challenges (CTF Learn) Part 1 Cyber security 00:12:44
  67. 67 #29 How to solve Cryptography challenges (CTF Learn) Part 2 Cyber security 00:17:25
  68. 68 #29 How to solve Cryptography challenges (CTF Learn) Part 3 Cyber security 00:14:46
  69. 69 Remote Code Execution via web shell upload AWAPT Portswigger Lab Cyber Security 00:15:55
  70. 70 Web shell upload via Content-Type bypass and path traversal AWAPT Portswigger Lab Cyber Security 00:14:47
  71. 71 Web shell upload via extension blacklist bypass AWAPT Portswigger Lab Cyber Security 00:07:13
  72. 72 Web shell upload via obfuscated file extension AWAPT Portswigger Lab Cyber Security 00:07:11
  73. 73 Remote code execution via polyglot web shell upload AWAPT Portswigger Lab Cyber Security 00:08:54
  74. 74 Web shell upload via race condition AWAPT Portswigger Lab Cyber Security 00:11:33
  75. 75 Authentication bypass via OAuth implicit flow AWAPT Portswigger Lab Cyber Security 00:10:20
  76. 76 Forced OAuth profile linking AWAPT Portswigger Lab Cyber Security 00:10:18
    بإذن الله تعالى حاولنا تكون هاي القناة الذراع الأقوى لكل طالب "علم" لا يملك المال عشان يدفع أسعار دورات الأمن السيبراني الخيالية !

    هذا العمل هو عمل خالص لله عز وجل ولا يوجد أي مصالح شخصية منه .
    القائم على هذا العمل يتمنى من الطالب الجهد والممارسة والمتابعه .
    نتمنى لكم حياة موفقه بظل رحمة الله عز وجل .
    دعوة بظهر الغيب نلقاها يوم الحساب .

    شكراً لكم جميعا .

    كورس Cyber Security Course بالعربي كامل مجانى لتعلم اختبار اختراق الشبكات اونلاين بإحتراف شرح Jordan Shield درع الأردن مع شهادة مجانية معتمدة من تيرا كورسيز

    سيتم تفعيل التعليقات قريبا

    4.6

    متوسط التقييمات

    79%
    13%
    7%
    0%
    1%
    s
    Apr 01, 2023 20:23:22
    shaker1200
    g
    Apr 01, 2023 17:52:27
    gharib8702
    b
    Apr 01, 2023 16:45:45
    boruti.2008
    m
    Mar 31, 2023 01:44:14
    mohamedgamervs129
    p
    Mar 31, 2023 01:19:13
    penos87622
    a
    Mar 30, 2023 02:33:34
    alhmydymhmd064