0
مجموع العربة
0,00 $
Checkout
0
Your cart
سلة التسوق
Delivery
Payment
Your cart is empty.
Please go to Shop Now
المنتج السعر الكمية المجموع

إجمالي سلة المشتريات

المجموع 0,00 $
الإجمالي 0,00 $
التقدم لإتمام الطلب
Returning customer? Click here to login

إذا تسوّقت بمتجرنا من قبل ولديك حساب لدينا، الرجاء إدخال تفاصيل دخولك بالأسفل. وإذا كنت عميلاً جديدًا، فيرجى منك المتابعة إلى قسم الفاتورة.

نسيت كلمة مرورك؟

تفاصيل الفاتورة

معلومات إضافية

Contact

عنوان الشحن

Order Summary

طرق الدفع

Your personal data will be used to process your order, support your experience throughout this website, and for other purposes described in our سياسة الخصوصية.

CYS TECH
CYS TECH
Call: +964 750 123 4567
Email: info@cystech1.com
CYS TECH
  • Home
  • Services
  • About
  • Courses
  • Teachers
  • Contact
  • Exams
  • CTF
Join Now
Home About Courses Teachers Contact Exams CTF Login Register My Account Logout
Join Now
Home About Courses Teachers Contact Exams CTF Login Register My Account Logout

Learn CTF

Master cybersecurity through hands-on Capture The Flag challenges. Learn penetration testing, vulnerability assessment, and ethical hacking.

Penetration Testing Digital Forensics Cryptography
Start Learning

Courses

Comprehensive cybersecurity courses designed by industry experts. From beginner to advanced levels, master the skills you need.

Certified Programs Video Lectures Practical Labs
Browse Courses

Exams

Test your cybersecurity knowledge with our comprehensive exam system. Get certified and validate your skills.

Certifications Timed Tests Progress Tracking
Take Exam

Teachers

Learn from industry-leading cybersecurity experts and professionals with years of real-world experience.

Expert Instructors Industry Experience Mentorship
Meet Teachers

About

Discover our mission to advance cybersecurity education and create the next generation of security professionals.

Our Mission Our Story Achievements
Learn More

Contact

Get in touch with our team for inquiries, support, or collaboration opportunities. We're here to help you succeed.

24/7 Support Global Reach Quick Response
Contact Us

Home

Welcome to CYS TECH - your gateway to comprehensive cybersecurity education and professional development.

Get Started Explore Discover
Go Home

eJPTv2

التصنيفات : الامن السيبراني
قائمتي المفضلة مشاركة
مشاركة
رابط الصفحة
مشاركة على وسائل التواصل الاجتماعي
  • معلومات الدورة
  • التقييمات
  • المزيد
    • ماذا سوف تتعلم؟

      • هذا الكورس يركز على الهجوم والتطبيق العملي، وليس الدفاع والنظرية.
      • ستتعلم كيف تخترق الأنظمة والشبكات خطوة بخطوة، تماماً كفريق الهاكرز الأخلاقي (Penetration Tester):
      • اكتشاف الهدف: استخدام أدوات مثل Nmap لمعرفة ما هي الأجهزة والخدمات المفتوحة في الشبكة.
      • البحث عن نقاط الضعف: استخدام Nessus أو OpenVAS لتحديد الثغرات في النظام أو تطبيق الويب.
      • الاستغلال والاختراق: استخدام أداة Metasploit أو Burp Suite لاختراق النظام أو تطبيق الويب (مثل ثغرات SQL Injection).
      • التوسع والحركة: تعلم كيف تنتقل من جهاز تم اختراقه إلى أجهزة أخرى داخل الشبكة.

      محتوى الدورة

      introduction to course

      • introduction pen testing
        31:26
      • VPN
        17:29
      • Network part 1
        44:00
      • Network part 2
        28:44
      • Network part 3
        24:11
      • Network part 4
        37:24
      • Network part 5
        39:02
      • Network part 6
        37:30
      • Network part 7
        16:04
      • wireshark part 1
        39:42
      • wireshark part 2(extra)
        24:53
      • wireshark part3 (extra)
        28:46
      • Wep application part 1
        32:24
      • web application part 2
        25:55
      • web application part 3
        15:30

      Basic kali linux (old)

      • kali download
        11:21
      • command kali part 1
        19:14
      • command kali part 2
        35:40
      • command kali part 3
        35:14
      • abbreviations in Kali Linux
        14:26

      Assessment methodologies

      • information gathering part 1
        21:42
      • information gathering part 2
        32:03
      • information gathering part 3
        30:38
      • information gathering part 4
        16:21
      • information gathering part 5
        34:55
      • information gathering part 6
        44:44
      • information gathering part 7
        53:48
      • footprinting & scanning part 1
        28:22
      • footprinting & scanning part 2
        47:33
      • footprinting & scanning part 3
        35:06
      • footprinting & scanning part 4
        36:21
      • footprinting & scanning part 5 (vulnversity lab 1)
        15:35
      • footprinting & scanning part 6 (Passive Recon lab2)
        19:52
      • footprinting & scanning part 7 (Active Recon lab3)
        18:25
      • footprinting & scanning part 8 (lab 4 Blue SMB )
        47:53
      • footprinting & scanning part 9 ( lab 5)
        07:08
      • Enumeration part 1
        54:54
      • Enumeration part 2 (FTP brute force attack)
        28:31
      • Enumeration part3 (lab 2 login SSH)
        21:22
      • Enumeration part 4 (lab 3 Enumeration apache)
        43:36
      • Enumeration part 5 (lab 4 samba recon )
        18:04
      • Enumeration part 6 (lab5 Mysql Recon)
        38:00
      • Enumeration part 7 (lab 6 Enumeration Telnet )
        23:37
      • Enumeration part 8 (lab 7 Enumeration SMTP)
        28:20
      • Vulnerability assessment part 1
        31:24
      • Vulnerability assessment part 2
        17:22
      • Vulnerability assessment part 3 (lab 1 nessus)
        34:59
      • Vulnerability assessment part 4 (lab 2 webdav)
        29:59
      • Vulnerability assessment part 5 (lab3 shellshock)
        35:20

      Network Auditing

      • auditing fundamentals
        26:19

      Host&Network penetration testing

      • system and host based attack part 1
        30:05
      • system and host based attack part 2 (webdav part 1)
        29:59
      • system and host based attack part3(webdav part2 )
        26:56
      • system and host based attack part4 SMB
        22:01
      • system and host based attack part 5(lab3 psexec)
        53:27
      • system and host based attack part6(lab 4 SMB)
        39:02
      • system and host based attack part 7 (RDP)
        11:46
      • system and host based attack part 8 (lab 5 RDP)
        18:18
      • system and host based attack part 9
        09:04
      • system and host based attack part 10 (lab 6 WinRM)
        32:20
      • system and host based attack part 11
        13:18
      • system and host based attack part 12 (UAC)
        15:39
      • system and host based attack part 13(lab 7 UAC)
        34:27
      • system and host based attack part 14
        13:32
      • system and host based attack part 15 (lab8 Token)
        13:18
      • system and host based attack part 16
        27:53
      • system and host based attack part 17(lab9 Unatted)
        16:21
      • system and host based attack part 18 (lab10 kiwi)
        13:22
      • system and host based attack part 19
        24:08
      • system and host based attack part 20 (lab 11shellshoke)
        35:20
      • system and host based attack part 21
        08:56
      • system and host based attack part 22 (lab 12 FTP)
        28:31
      • system and host based attack part 23 (lab SSH)
        21:22
      • system and host based attack part 24(lab 14 samba)
        18:04
      • system and host based attack part 25
        17:14
      • system and host based attack part 26 (lab 15 cron)
        19:10
      • system and host based attack part 27 (lab 16 SUID)
        24:52
      • system and host based attack part 28 (lab 17 SUID)
        36:06
      • Network based attack part 1
        24:12
      • Network based attack part 2 (lab 1 NetBios)
        17:14
      • Network based attack part 3
        14:52
      • Network based attack part 4 (lab 2 SNMP)
        37:02
      • Network based attack part 5
        12:59
      • Metasploit framework part 1
        26:29
      • Metasploit framework part 2
        28:25
      • Metasploit framework part 3
        11:31
      • Metasploit framework part 4 (lab 1)
        20:00
      • Metasploit framework Part 5
        16:05
      • Metasploit framework part 6 (lab 2 FTP)
        21:05
      • Metasploit framework Part 7 (lab 3 SMB)
        28:26
      • Metasploit framework part 8 (lab 4 Web Server)
        43:52
      • Metasploit framework part 9 (lab 5 MySQL)
        31:19
      • Metasploit framework part 10 (lab 6 SSH)
        20:17
      • Metasploit framework part 11 (lab 6 SMTP)
        28:20
      • Metasploit framework part 12
        12:42
      • metasploitable3 download
        05:49
      • Metasploit framework part 12 (lab 7 wmap )
        15:15
      • Metasploit framework Part 13
        19:14
      • Metasploit framework Part 14 (lab 8)
        16:29
      • Metasploit framework Part 15 (lab 9)
        14:50
      • Metasploit framework Part 16 (lab 10)
        08:20
      • Metasploit framework Part 17 (lab 11)
        22:56
      • Metasploit framework Part 18 (lab 12)
        45:45
      • Metasploit framework Part 19 (lab 13 )
        18:43
      • Metasploit framework Part 20 (lab 14 )
        15:59

      تقييمات ومراجعات الطلاب

      لا يوجد تقييم حتى الآن
      لا يوجد تقييم حتى الآن
      70,00 $ 100,00 $
      • متوسط
      • 49 إجمالي الملتحقين
      • 90 ساعات المدة
      • يناير 30, 2026 آخر تحديث
      • Certificate of completion
      أهلاً بك مرة أخرى!
      نسيت كلمة السر؟
      ليس لديك حساب؟  سجّل الآن

      دورة بواسطة

      MJ
      mostafa jabale

      مواد الدورة

      • Penetration testing
      • 1-Introduction
      • 1.1 Introduction To Penetration Testing
      • 1.2 Cryptography and VPNs
      • 1.3 Networking Basics
      • 1.3 web application
      • 2- Assessment methodologies
      • 2.1 information gathering (5-7 labs )
      • 2.2 footprinting & scanning (4-6 labs )
      • 2.3 Enumeration (6-8 labs)
      • 2.4 vulnerability assessment (2-3labs )
      • 3- Network Auditing
      • 3.1 auditing fundamentals
      • 4-Network & Host Penetration Testing
      • 4.1 system and host based attack (10-14 labs )
      • 4.2 Network based attack (3-5 labs )
      • 4.3 Metasploit framework (12-15 labs )
      • 4.4 Exploitation (10-15 labs )
      • 4.5 post Exploitation(15-20 labs )
      • 4.6 social engineering (2 labs )
      • 5- Web Application Penetration Testing
      • 5.1 introduction the web and http (2 labs ) lab shellshock
      • 0779306064

      المتطلبات

      • No Requirements

      الجمهور

      • للمبتدئين في مجال اختبار الاختراق Penetration Testing

      Want to receive push notifications for all major on-site activities?

      ✕

      Cys Tech

      • الصفحة الرئيسية
      • لغات البرمجة
      • امن سيبراني
      • الشبكات
      • انظمة التشغيل
      • مواد جامعية
      • My account
      • الصفحة الرئيسية
      • لغات البرمجة
      • امن سيبراني
      • الشبكات
      • انظمة التشغيل
      • مواد جامعية
      • My account
      تسجيل الدخول