categories: Technology & Innovation
Level: Specialized
Course Language: Arabic
By the end of this course, you will be able to: Configure access management ASA.
Configure Cisco ASA interface security levels.
Configure the default Cisco Modular Policy Framework (MPF).
Free lessons
Basic Terms
Vulnerabilities
Types of Hackers
Penetration Test (Pentest)
1. Ch1- Ethical Hacking
Basic Terms
Vulnerabilities
Types of Hackers
Penetration Test (Pentest)
Vulnerability Scaning
Penetration Test Scope
Penetration Testing Lab - Penetration Testing Stages
Moral Penetration Warnings
Penetration Testing Stages 1
Penetration Testing Stages 2
Moral Penetration Stages 1
Moral Penetration Stages 2
Moral Penetration Stages 3
Exploiting Web Application Vulnerabilities
Some Types of Web Attacks
Attacking Wireless Networks 1
Attacking Wireless Networks 2
Securing Wireless Networks
Systems with Learning Vulnerabilities
2. Ch2 - Cybersecurity Controls
Cybersecurity Controls (Administrative Control)
Cybersecurity Controls (Physical-Technical Controls) & Cybersecurity Controls Functions
Cybersecurity Technical Control 1
Cybersecurity Technical Control 2
Cybersecurity Technical Control 3
Cybersecurity Technical Control 4
3. Examples
Practical Application 1
Practical Application 2
Practical Application 3
Practical Application 4
Practical Application 5
Practical Application 6 (Vulnerability Detection through Nessus)
Practical Application 7 (Vulnerability Detection through Nessus)
Practical Application 8 (DVWA)
In this track, you will learn the cybersecurity fundamentals, the basics of networking, the fields of cybersecurity, basic concepts of cybersecurity, how to create security objects, implement security services, and identify and assess different types of risks. You will also learn about cybersecurity controls, the concept of ethical hacking, infrastructure services, and secure infrastructure engineering. Also, through this track, you will learn about hacking techniques, how to handle and respond to various incidents, and malware reverses engineering techniques.
Graduate from Engineering or Computer Science
Strong problem solving skills
Detail-oriented
Cyber Security Consultant
3,091 Learners
3 Courses