ماذا سوف تتعلم؟
- هذا الكورس يركز على الهجوم والتطبيق العملي، وليس الدفاع والنظرية.
- ستتعلم كيف تخترق الأنظمة والشبكات خطوة بخطوة، تماماً كفريق الهاكرز الأخلاقي (Penetration Tester):
- اكتشاف الهدف: استخدام أدوات مثل Nmap لمعرفة ما هي الأجهزة والخدمات المفتوحة في الشبكة.
- البحث عن نقاط الضعف: استخدام Nessus أو OpenVAS لتحديد الثغرات في النظام أو تطبيق الويب.
- الاستغلال والاختراق: استخدام أداة Metasploit أو Burp Suite لاختراق النظام أو تطبيق الويب (مثل ثغرات SQL Injection).
- التوسع والحركة: تعلم كيف تنتقل من جهاز تم اختراقه إلى أجهزة أخرى داخل الشبكة.
محتوى الدورة
introduction to course
- 31:26
VPN
17:29Network part 1
44:00Network part 2
28:44Network part 3
24:11Network part 4
37:24Network part 5
39:02Network part 6
37:30Network part 7
16:04wireshark part 1
39:42wireshark part 2(extra)
24:53wireshark part3 (extra)
28:46Wep application part 1
32:24web application part 2
25:55web application part 3
15:30
Basic kali linux (old)
kali download
11:21command kali part 1
19:14command kali part 2
35:40command kali part 3
35:14abbreviations in Kali Linux
14:26
Assessment methodologies
information gathering part 1
21:42information gathering part 2
32:03information gathering part 3
30:38information gathering part 4
16:21information gathering part 5
34:55information gathering part 6
44:44information gathering part 7
53:48footprinting & scanning part 1
28:22footprinting & scanning part 2
47:33footprinting & scanning part 3
35:06footprinting & scanning part 4
36:21footprinting & scanning part 5 (vulnversity lab 1)
15:35footprinting & scanning part 6 (Passive Recon lab2)
19:52footprinting & scanning part 7 (Active Recon lab3)
18:25footprinting & scanning part 8 (lab 4 Blue SMB )
47:53footprinting & scanning part 9 ( lab 5)
07:08Enumeration part 1
54:54Enumeration part 2 (FTP brute force attack)
28:31Enumeration part3 (lab 2 login SSH)
21:22Enumeration part 4 (lab 3 Enumeration apache)
43:36Enumeration part 5 (lab 4 samba recon )
18:04Enumeration part 6 (lab5 Mysql Recon)
38:00Enumeration part 7 (lab 6 Enumeration Telnet )
23:37Enumeration part 8 (lab 7 Enumeration SMTP)
28:20Vulnerability assessment part 1
31:24Vulnerability assessment part 2
17:22Vulnerability assessment part 3 (lab 1 nessus)
34:59Vulnerability assessment part 4 (lab 2 webdav)
29:59Vulnerability assessment part 5 (lab3 shellshock)
35:20
Network Auditing
auditing fundamentals
26:19
Host&Network penetration testing
system and host based attack part 1
30:05system and host based attack part 2 (webdav part 1)
29:59system and host based attack part3(webdav part2 )
26:56system and host based attack part4 SMB
22:01system and host based attack part 5(lab3 psexec)
53:27system and host based attack part6(lab 4 SMB)
39:02system and host based attack part 7 (RDP)
11:46system and host based attack part 8 (lab 5 RDP)
18:18system and host based attack part 9
09:04system and host based attack part 10 (lab 6 WinRM)
32:20system and host based attack part 11
13:18system and host based attack part 12 (UAC)
15:39system and host based attack part 13(lab 7 UAC)
34:27system and host based attack part 14
13:32system and host based attack part 15 (lab8 Token)
13:18system and host based attack part 16
27:53system and host based attack part 17(lab9 Unatted)
16:21system and host based attack part 18 (lab10 kiwi)
13:22system and host based attack part 19
24:08system and host based attack part 20 (lab 11shellshoke)
35:20system and host based attack part 21
08:56system and host based attack part 22 (lab 12 FTP)
28:31system and host based attack part 23 (lab SSH)
21:22system and host based attack part 24(lab 14 samba)
18:04system and host based attack part 25
17:14system and host based attack part 26 (lab 15 cron)
19:10system and host based attack part 27 (lab 16 SUID)
24:52system and host based attack part 28 (lab 17 SUID)
36:06Network based attack part 1
24:12Network based attack part 2 (lab 1 NetBios)
17:14Network based attack part 3
14:52Network based attack part 4 (lab 2 SNMP)
37:02Network based attack part 5
12:59Metasploit framework part 1
26:29Metasploit framework part 2
28:25Metasploit framework part 3
11:31Metasploit framework part 4 (lab 1)
20:00Metasploit framework Part 5
16:05Metasploit framework part 6 (lab 2 FTP)
21:05Metasploit framework Part 7 (lab 3 SMB)
28:26Metasploit framework part 8 (lab 4 Web Server)
43:52Metasploit framework part 9 (lab 5 MySQL)
31:19Metasploit framework part 10 (lab 6 SSH)
20:17Metasploit framework part 11 (lab 6 SMTP)
28:20Metasploit framework part 12
12:42metasploitable3 download
05:49Metasploit framework part 12 (lab 7 wmap )
15:15Metasploit framework Part 13
19:14Metasploit framework Part 14 (lab 8)
16:29Metasploit framework Part 15 (lab 9)
14:50Metasploit framework Part 16 (lab 10)
08:20Metasploit framework Part 17 (lab 11)
22:56Metasploit framework Part 18 (lab 12)
45:45Metasploit framework Part 19 (lab 13 )
18:43Metasploit framework Part 20 (lab 14 )
15:59Metasploit framework part 21 (lab 15)
23:31Metasploit framework part 22 (lab 16 )
10:15Metasploit framework Part 23 (lab 17)
18:46Metasploit framework Part 24
11:03Metasploit framework Part 25 (lab 18)
32:20Metasploit framework Part 26
09:30Metasploit framework Part 27 lab 19
26:06Metasploit framework Part 28 (lab 20)
20:28Metasploit framework Part 29
14:03(Metasploit Framework Part 30 (lab 21
22:00(Metasploit Framework Part 31 (lab 22
10:06Metasploit Framework Part 32
09:50Metasploit Framework Part 33 (lab23)
34:27Metasploit Framework Part 34
18:48
تقييمات ومراجعات الطلاب
لا يوجد تقييم حتى الآن