Pen Tester Cyber Security
Programming_and_Technology
حول الدورة التدريبية:
حماية أجهزة الكمبيوتر والشبكات وأنظمة المعلومات من الاختراق الإلكتروني بقى لا غنى عنها وده الدور الأساسي اللي بيقوم به الـ Cyber Security لأنه بيعتمد على استراتيجيات وأدوات معينة بيحمي بها البيانات ويكتشف كمان أي Bug ممكن تـ attack شبكة المعلومات. دلوقتي تقدر تكون مصدر الأمان لأي شركة أو مؤسسة كبيرة بتحرص على حماية بياناتها من أي مخاطر سيبرانية مع دبلومة لايف متكاملة مدتها 100 ساعة تدريبية هتعلمك كل حاجة إنت محتاجها من الصفر للاحتراف عشان تبقى Cyber Security Specialist ناجح.
ما ستتعلمه في هذه الدورة:
1) أنظمة تشغيل Linux
هتتعلم كل من:
1. Operating systems overview
2. Introduction to virtualization
3. Virtual machines setup
4. Unwrapping Kali Linux
5. Basic concepts of Linux
6. File system in Linux
7. File permissions
8. Users creations and permissions
9. Sudoers users
10. Basic commands
11. Shell
12. Intro to Bash scripting
2) أساسيات الـ Network والـ OSI Layers
هتتعلم كل من:
1. Networks and topologies
2. IP address and subnet masks
3. Protocols
4. Network components
5. OSI Layers
6. TCP/IP and 3-way handshake
7. Ports and services
8. Wireshark
3) تقييم الـ Web Application Penetration
هتتعلم كل من:
1. Web application infrastructure
2. DNS and domain resolving
3. HTTP
4. SOP & CORS
5. Cookies and sessions
6. JWT
7. BurpSuite
8. Subdomains & resources enumeration
9. SQL injection
10. Cross-site request forgery (CSRF)
11. Authentication and authorization
12. Authentication breaking
13. Authorization bypassing
14. IDOR
15. File resource attacks
16. Social engineering
17. Some defensive controls and appliances
4) علم التشفير (Cryptology)
هتتعلم كل من:
1. What is meaning by cryptology
2. Encryption & decryption
3. Encryption types
4. Hashing
5. Encoding & decoding
5) تقييم الـ Android Application Penetration Testing
هتتعلم كل من:
1. Android architecture & Android application hierarchy
2. Android application main components
3. Android environment ex. DEX, .Smali, Run time, IPCs, intents, ..., etc
4. Android Debugging Bridge (adb) and Android connection
5. Static testing approach
6. Different Android attacks
لمن هذه الدبلومة:
- المطورين ومهندسي البرمجيات
- المبتدئين في مجال الأمن السيبراني
- طلاب وخريجي علوم الحاسب وهندسة البرمجيات
- أي شخص مهتم بأمن المعلومات
About the Training Course:
Protecting computers, networks, and information systems from cyber threats has become essential. This is the core role of Cybersecurity, which relies on specific strategies and tools to safeguard data and detect any bugs that might attack an information network. Now, you can become a security asset for any company or major organization that prioritizes protecting its data from cyber risks. Join our comprehensive live diploma program spanning 100 training hours, equipping you with all the knowledge and skills you need from beginner to expert to become a successful Cybersecurity Specialist.
What You Will Learn in This Course:
1) Linux Operating Systems
You will learn:
1. Overview of operating systems
2. Introduction to virtualization
3. Virtual machines setup
4. Introduction to Kali Linux
5. Basic Linux concepts
6. Linux file system
7. File permissions
8. User creation and permissions
9. Sudoers users
10. Basic commands
11. Shell basics
12. Introduction to Bash scripting
2) Network Fundamentals and OSI Layers
You will learn:
1. Networks and topologies
2. IP addressing and subnet masks
3. Network protocols
4. Network components
5. OSI Layers
6. TCP/IP and 3-way handshake
7. Ports and services
8. Wireshark usage
3) Web Application Penetration Testing
You will learn:
1. Web application infrastructure
2. DNS and domain resolution
3. HTTP protocol
4. SOP & CORS concepts
5. Cookies and session management
6. JWT (JSON Web Token)
7. BurpSuite for penetration testing
8. Subdomains & resource enumeration
9. SQL injection techniques
10. Cross-site request forgery (CSRF)
11. Authentication and authorization security
12. Authentication cracking techniques
13. Authorization bypass methods
14. IDOR (Insecure Direct Object References)
15. File resource attacks
16. Social engineering tactics
17. Defensive controls and security appliances
4) Cryptology
You will learn:
1. Introduction to cryptology
2. Encryption & decryption principles
3. Types of encryption
4. Hashing techniques
5. Encoding & decoding methods
5) Android Application Penetration Testing
You will learn:
1. Android architecture & application hierarchy
2. Main components of Android applications
3. Android environment (DEX, Smali, runtime, IPCs, intents, etc.)
4. Android Debug Bridge (ADB) and Android connections
5. Static analysis testing approach
6. Various Android attack methods
Who This Diploma Is For:
- Developers and software engineers
- Beginners in cybersecurity
- Computer science and software engineering students & graduates
- Anyone interested in information security