Skip to main content

Pen Tester Cyber Security


Programming_and_Technology

حول الدورة التدريبية:

حماية أجهزة الكمبيوتر والشبكات وأنظمة المعلومات من الاختراق الإلكتروني بقى لا غنى عنها وده الدور الأساسي اللي بيقوم به الـ Cyber Security لأنه بيعتمد على استراتيجيات وأدوات معينة بيحمي بها البيانات ويكتشف كمان أي Bug ممكن تـ attack شبكة المعلومات. دلوقتي تقدر تكون مصدر الأمان لأي شركة أو مؤسسة كبيرة بتحرص على حماية بياناتها من أي مخاطر سيبرانية مع دبلومة لايف متكاملة مدتها 100 ساعة تدريبية هتعلمك كل حاجة إنت محتاجها من الصفر للاحتراف عشان تبقى Cyber Security Specialist ناجح.

ما ستتعلمه في هذه الدورة:

    1) أنظمة تشغيل Linux

    هتتعلم كل من:
    1. Operating systems overview
    2. Introduction to virtualization
    3. Virtual machines setup
    4. Unwrapping Kali Linux
    5. Basic concepts of Linux
    6. File system in Linux
    7. File permissions
    8. Users creations and permissions
    9. Sudoers users
    10. Basic commands
    11. Shell
    12. Intro to Bash scripting

    2) أساسيات الـ Network والـ OSI Layers

    هتتعلم كل من:
    1. Networks and topologies
    2. IP address and subnet masks
    3. Protocols
    4. Network components
    5. OSI Layers
    6. TCP/IP and 3-way handshake
    7. Ports and services
    8. Wireshark

    3) تقييم الـ Web Application Penetration

    هتتعلم كل من:
    1. Web application infrastructure
    2. DNS and domain resolving
    3. HTTP
    4. SOP & CORS
    5. Cookies and sessions
    6. JWT
    7. BurpSuite
    8. Subdomains & resources enumeration
    9. SQL injection
    10. Cross-site request forgery (CSRF)
    11. Authentication and authorization
    12. Authentication breaking
    13. Authorization bypassing
    14. IDOR
    15. File resource attacks
    16. Social engineering
    17. Some defensive controls and appliances

    4) علم التشفير (Cryptology)

    هتتعلم كل من:
    1. What is meaning by cryptology
    2. Encryption & decryption
    3. Encryption types
    4. Hashing
    5. Encoding & decoding

    5) تقييم الـ Android Application Penetration Testing

    هتتعلم كل من:
    1. Android architecture & Android application hierarchy
    2. Android application main components
    3. Android environment ex. DEX, .Smali, Run time, IPCs, intents, ..., etc
    4. Android Debugging Bridge (adb) and Android connection
    5. Static testing approach
    6. Different Android attacks

لمن هذه الدبلومة:

  • المطورين ومهندسي البرمجيات
  • المبتدئين في مجال الأمن السيبراني
  • طلاب وخريجي علوم الحاسب وهندسة البرمجيات
  • أي شخص مهتم بأمن المعلومات

About the Training Course:

Protecting computers, networks, and information systems from cyber threats has become essential. This is the core role of Cybersecurity, which relies on specific strategies and tools to safeguard data and detect any bugs that might attack an information network. Now, you can become a security asset for any company or major organization that prioritizes protecting its data from cyber risks. Join our comprehensive live diploma program spanning 100 training hours, equipping you with all the knowledge and skills you need from beginner to expert to become a successful Cybersecurity Specialist.

What You Will Learn in This Course:

    1) Linux Operating Systems

    You will learn:
    1. Overview of operating systems
    2. Introduction to virtualization
    3. Virtual machines setup
    4. Introduction to Kali Linux
    5. Basic Linux concepts
    6. Linux file system
    7. File permissions
    8. User creation and permissions
    9. Sudoers users
    10. Basic commands
    11. Shell basics
    12. Introduction to Bash scripting

    2) Network Fundamentals and OSI Layers

    You will learn:
    1. Networks and topologies
    2. IP addressing and subnet masks
    3. Network protocols
    4. Network components
    5. OSI Layers
    6. TCP/IP and 3-way handshake
    7. Ports and services
    8. Wireshark usage

    3) Web Application Penetration Testing

    You will learn:
    1. Web application infrastructure
    2. DNS and domain resolution
    3. HTTP protocol
    4. SOP & CORS concepts
    5. Cookies and session management
    6. JWT (JSON Web Token)
    7. BurpSuite for penetration testing
    8. Subdomains & resource enumeration
    9. SQL injection techniques
    10. Cross-site request forgery (CSRF)
    11. Authentication and authorization security
    12. Authentication cracking techniques
    13. Authorization bypass methods
    14. IDOR (Insecure Direct Object References)
    15. File resource attacks
    16. Social engineering tactics
    17. Defensive controls and security appliances

    4) Cryptology

    You will learn:
    1. Introduction to cryptology
    2. Encryption & decryption principles
    3. Types of encryption
    4. Hashing techniques
    5. Encoding & decoding methods

    5) Android Application Penetration Testing

    You will learn:
    1. Android architecture & application hierarchy
    2. Main components of Android applications
    3. Android environment (DEX, Smali, runtime, IPCs, intents, etc.)
    4. Android Debug Bridge (ADB) and Android connections
    5. Static analysis testing approach
    6. Various Android attack methods

Who This Diploma Is For:

  • Developers and software engineers
  • Beginners in cybersecurity
  • Computer science and software engineering students & graduates
  • Anyone interested in information security
Enroll