دورة الآمن السيبراني للمبتدئين |Cyber Security Essentials Course

Поделиться
HTML-код
  • Опубликовано: 10 сен 2024
  • Introduction
    *Overview of Cybersecurity Tools and Techniques:* This section provides a broad overview of essential tools and techniques used in cybersecurity. It covers the basics of how these tools contribute to protecting systems and networks from threats.
    Installing VirtualBox
    Installing Kali Linux
    Introduction to Kali Linux Terminal
    *Basic Commands and Navigation:* Familiarize yourself with basic terminal commands and navigation techniques in Kali Linux, which are crucial for efficiently working within this Linux distribution.
    TOR Installation and Usage
    *Installing TOR for Anonymous Browsing:* Discover how to install and configure TOR (The Onion Router) to browse the internet anonymously, enhancing privacy and security online.
    Anonsurf
    *Using Anonsurf for Anonymous Internet Connections:* Learn how to use Anonsurf, a tool that integrates TOR and VPN to anonymize internet connections and protect user privacy.
    VPN Installation and Usage in Kali Linux
    *Configuring and Using a VPN for Secure Connections:* This section guides you through setting up and using a Virtual Private Network (VPN) in Kali Linux to secure your online activities and maintain privacy.
    ProxyChains
    *Routing Connections through Proxy Servers:* Understand how to configure ProxyChains to route network connections through multiple proxy servers, adding a layer of anonymity to your internet activity.
    MAC Changer
    *Changing MAC Addresses for Anonymity:* Learn how to change your MAC address using the MAC Changer tool to avoid tracking and maintain anonymity on networks.
    Monitor Mode
    *Using Monitor Mode for Wireless Network Analysis:* Explore how to enable monitor mode on wireless interfaces to capture and analyze wireless network traffic, a key technique in network security assessments.
    Nmap
    *Network Mapping and Port Scanning:* Master Nmap, a powerful tool for network mapping and port scanning, to identify open ports, services, and potential vulnerabilities in networked systems.
    Etherape
    *Visual Network Traffic Analysis:* Get acquainted with Etherape, a graphical network monitoring tool that provides a visual representation of network traffic, helping to identify and analyze network activity.
    WiFi Hacking
    *Techniques and Tools for WiFi Network Penetration Testing:* Delve into various techniques and tools for assessing the security of WiFi networks, including methods for penetration testing and identifying vulnerabilities.
    Brute Force Attacks (e.g., Bopscrk)
    *Creating and Using Wordlists (e.g., rockyou):* Learn about brute force attacks and how to create and utilize wordlists, such as rockyou, to crack passwords and gain unauthorized access.
    Aircrack-ng
    *Wireless Network Security Assessment:* Explore Aircrack-ng, a suite of tools for assessing the security of wireless networks, including cracking WEP and WPA/WPA2 encryption.
    DoS (Denial of Service) Attacks
    *Types and Mitigation:* Understand various types of Denial of Service (DoS) attacks and strategies for mitigating their impact on systems and networks.
    whoami Command
    *Identifying Current User and Permissions:* Use the `whoami` command to determine the current user and their permissions, a fundamental aspect of managing user accounts and security.
    Rootkit and Rkhunter
    *Detecting and Handling Rootkits:* Learn about rootkits, their detection methods using tools like Rkhunter, and strategies for handling and removing these malicious software components.
    Local Host and Apache HTTP Server
    *Setting Up a Local Web Server:* Discover how to set up a local web server using Apache HTTP Server, an essential skill for web development and testing.
    Linux Command Line
    *Essential Commands and Scripting:* Get to grips with essential Linux command line commands and scripting techniques for efficient system management and automation.
    Phishing Techniques
    *Methods and Prevention:* Explore common phishing techniques used to deceive users and strategies to prevent falling victim to such attacks.
    Hacking Android Devices
    *Security Risks and Exploitation Techniques:* Examine the security risks associated with Android devices and techniques used for exploiting vulnerabilities in these mobile platforms.
    RSA Encryption in Linux
    *Principles and Usage:* Understand RSA encryption principles and how to implement and use RSA encryption in a Linux environment to secure communications.
    Hashdeep
    Cross-Site Scripting (XSS)
    *Types and Prevention Techniques:* Dive into Cross-Site Scripting (XSS) attacks, their types, and techniques for preventing such vulnerabilities in web applications.
    Wireshark
    IP Tracker and Source Code Analysis
    my instagram khaled.s.haddad
    my website khaledhaddad.tech

Комментарии • 36

  • @anaslabrini748
    @anaslabrini748 Месяц назад +5

    مستوى الثاني، ايوى ايوى ايوى 😅افعلها يا خالد 😂❤❤❤

  • @mohammedalgomaity
    @mohammedalgomaity 3 дня назад +1

    اني مبتدئ جدا لكن شرحك حلو وكثير واضح ياريت تعطينا الملف متاع الدورة

  • @uin0
    @uin0 9 дней назад

    يرحم ابوك بهاذا اليوم ❤

  • @YAZANALHADE
    @YAZANALHADE 10 дней назад

    شرح رائع سويلنا جزء ثاني ❤❤

  • @xcypercodex
    @xcypercodex Месяц назад +3

    اتمنى تستمر بالدورة لانه شبه ضايعين لانه ما لقيت دورات كامله

  • @gseffd
    @gseffd Месяц назад +1

    ما شاء الله افضل مهندس في هاد المجال

    • @khaled.s.haddad
      @khaled.s.haddad  27 дней назад

      المشكلة انو الدوة المستوى الثاني ما بزبط تنزل لانو فيها اختراقات وسياسة اليوتيوب راح توقف القناة

    • @MassaoudSmail
      @MassaoudSmail 5 дней назад

      كيف الحل يااستاذ❤​@@khaled.s.haddad

  • @mohammd_ktbit
    @mohammd_ktbit Месяц назад

    الله يعطيك العافية مهندسنا خالد
    عقبال الدورة الثانية

  • @Bashar-tx8ns
    @Bashar-tx8ns Месяц назад

    حياااك الله استاذ ناطرين الجزء الثاني وجزاك الله خير❤

  • @M-Koala
    @M-Koala Месяц назад

    استمر ي مبدع وبالتوفيق لك
    وان شاء الله بعتمد عليك من بعد الله في المجال وواثق انك ما بتخذلني 🙏🏻❤️

  • @MassaoudSmail
    @MassaoudSmail Месяц назад +2

    جزاك الله خيرا ❤❤❤❤❤❤❤

  • @user-op2zo6nj6k
    @user-op2zo6nj6k Месяц назад +1

    مشكور مهندس خالد

    • @khaled.s.haddad
      @khaled.s.haddad  27 дней назад

      العفو عزيزي القدام افضل باذن الله

  • @-believers6070
    @-believers6070 11 дней назад

    ليه حذفت ال 6 فديوهات الثانين ؟

  • @mj-7169
    @mj-7169 Месяц назад +1

    الله يرحم ابوك نزل المستوى الثاني

    • @khaled.s.haddad
      @khaled.s.haddad  Месяц назад

      اهلا فيك تسلم وبارك الله فيك بس المستوى الثاني صعب انزلو لانو في اختراقات وهاد الشي ممنوع في اليوتيوب

  • @Adel_abd
    @Adel_abd Месяц назад +1

    شكرااااااا🎉🎉

  • @user-lj4hl8qh4i
    @user-lj4hl8qh4i Месяц назад

    جايك من الانستا الله يرحمه والديك ويرحم جميع اموات المسلمين والمسلمات

  • @e_8f
    @e_8f 29 дней назад +1

    عاشت ايدك اني مبتدئ افتهمت وكملت نص فيديو

    • @khaled.s.haddad
      @khaled.s.haddad  27 дней назад +1

      هاد الشب ببسطني شكرا الك وعلى كلامك

  • @Semo-200
    @Semo-200 24 дня назад +1

    هل اقدر احمل الاداه ع الماك بوك M1

  • @user-xc1ur7im9c
    @user-xc1ur7im9c Месяц назад +1

    ممكن الدخول الى cyber security بمعرفة في لغات البرمجه ولكن لم اتعمق بها ؟؟ ومن اي ابدا بعد تعلم لغات البرمجه وعندي معلومات كثير في اللينكس والأدوات ومعرفه في الشبكات

    • @vz3f
      @vz3f 29 дней назад

      انصحك تبلش بـ c++ وشوف أستاذ خالد إذا تحب تتأكد

  • @M7md4ii
    @M7md4ii 20 дней назад

    اغلبك وين باقي المقاطع

  • @user-ei9yk5ve6y
    @user-ei9yk5ve6y Месяц назад

    ستمر ❤

  • @user-qr1mz3sg9b
    @user-qr1mz3sg9b Месяц назад

    اخي كيفك اخي والله الشي اصبح متقدم بقوا وامان بقوا محدا عم يعلمنه شي الصحيح ياريت لو تشرح لينكس بشي متقدم عن شروحات يواتيوب يلي ماليانه 😢 وشكرا لك مشترك جديد

  • @MOONN67
    @MOONN67 Месяц назад

    السلام عليكم اخوي خالد بتمنى منك انك تنزل دورة اختراق الهواتف خارج الشبكة

    • @khaled.s.haddad
      @khaled.s.haddad  Месяц назад +1

      للاسف سياسة اليوتيوب تمنع ذلك

  • @user3q9gn
    @user3q9gn Месяц назад

    how i can connect kali linux to wifi

    • @khaled.s.haddad
      @khaled.s.haddad  Месяц назад

      ابعتلي عزيزي على
      instagram
      khaled.s.haddad
      راح ابعتلك فيديو توضيحي