وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Cyber Security – Learn Data Security & Combat Cyber Threats

سرفصل های دوره

Cyber Threats, Attacks, Viruses, Security Measures, Cyber Crimes, Firewalls, Cyber Security Concepts, Digital Forensics


1 - Introduction
  • 1 - Introduction
  • 2 - Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals.html
  • 3 - Lets Celebrate Your Progress In This Course 25 50 75 100
  • 3 - Lets-Celebrate-Your-Progress.pdf
  • 4 - Cyber-Security-Workbook.pdf
  • 4 - Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course

  • 2 - Introduction to Cybersecurity
  • 5 - Cyber Security Course Overview
  • 6 - Introduction of Facilitator
  • 7 - Is our Data really safe on internet
  • 7 - Is-our-Data-really-safe-on-internet.pdf
  • 8 - What is Cybersecurity
  • 8 - What-is-Cybersecurity.pdf
  • 9 - Evolution of Cyber Threats
  • 9 - Evolution-of-Cyber-Threats.pdf
  • 10 - Three Types of Security Goals
  • 10 - Three-Types-of-Security-Goals.pdf
  • 11 - Importance of Cybersecurity
  • 11 - Importance-of-Cybersecurity.pdf
  • 12 - Threat Vulnerability and Risk
  • 12 - Threat-Vulnerability-and-Risk.pdf
  • 13 - Networking Devices Router
  • 13 - Networking-Devices-Router.pdf
  • 14 - Networking Devices Switch
  • 14 - Networking-Devices-Switch.pdf
  • 15 - What is an IP Address
  • 15 - What-is-an-IP-Address.pdf
  • 16 - What is a MAC Address
  • 16 - What-is-a-MAC-Address.pdf
  • 17 - What is a PORT Address
  • 17 - What-is-a-PORT-Address.pdf
  • 18 - What is a DNS
  • 18 - What-is-a-DNS.pdf
  • 19 - What is a VPN
  • 19 - What-is-a-VPN.pdf
  • 20 - What is a Virus
  • 20 - What-is-a-Virus.pdf
  • 21 - Learn Hacking and the different Types of Hackers
  • 21 - Learn-Hacking-and-the-different-Types-of-Hackers.pdf
  • 22 - Job Profiles in the field of Cybersecurity
  • 22 - Job-Profiles-in-the-field-of-Cybersecurity.pdf
  • 23 - Important Cybersecurity Skills
  • 23 - Important-Cybersecurity-Skills.pdf

  • 3 - Fundamentals of Networking
  • 24 - Fundamentals of NetworkingOverview
  • 25 - Computer Networks
  • 25 - Computer-Networks.pdf
  • 26 - The OSI Model
  • 26 - The-OSI-Model.pdf
  • 27 - OSI Model Application Layer
  • 27 - OSI-Model-Application-Layer.pdf
  • 28 - OSI Model Presentation Layer
  • 28 - OSI-Model-Presentation-Layer.pdf
  • 29 - OSI Model Session Layer
  • 29 - OSI-Model-Session-Layer.pdf
  • 30 - OSI Model Transport Layer
  • 30 - OSI-Model-Transport-Layer.pdf
  • 31 - OSI Model Network Layer
  • 31 - OSI-Model-Network-Layer.pdf
  • 32 - OSI Model Data Link Layer
  • 32 - OSI-Model-Data-Link-Layer.pdf
  • 33 - OSI Model Physical Layer
  • 33 - OSI-Model-Physical-Layer.pdf
  • 34 - OSI Layers Example
  • 34 - OSI-Layers-Example.pdf
  • 35 - OSI Layers Protocols
  • 35 - OSI-Layers-Protocols.pdf
  • 36 - HTTP Protocol
  • 36 - HTTP-Protocol.pdf
  • 37 - Quarter-Complete-Well-Done-Keep-Going.pdf
  • 37 - Youve Achieved 25 Lets Celebrate Your Progress And Keep Going To 50
  • 38 - TCP Protocol
  • 38 - TCP-Protocol.pdf
  • 39 - UDP Protocol
  • 39 - UDP-Protocol.pdf
  • 40 - Difference between UDP and TCP Protocol
  • 40 - Difference-between-UDP-and-TCP-Protocol.pdf
  • 41 - DHCP Protocol
  • 41 - DHCP-Protocol.pdf
  • 42 - ARP Protocol
  • 42 - ARP-Protocol.pdf
  • 43 - What is an IP address and its types
  • 43 - What-is-an-IP-address-and-its-types.pdf
  • 44 - What is a Port Address and its types
  • 44 - What-is-a-Port-Address-and-its-types.pdf
  • 45 - Network Troubleshooting
  • 45 - Network-Troubleshooting.pdf

  • 4 - Types of Attacks part 1
  • 46 - What is an Attack
  • 46 - What-is-an-Attack.pdf
  • 47 - Categories of Cyber Attacks
  • 47 - Categories-of-Cyber-Attacks.pdf
  • 48 - Types of Attacks
  • 48 - Types-of-Attacks.pdf
  • 49 - Password attack and its types
  • 49 - Password-attack-and-its-types.pdf
  • 50 - Malware Attack
  • 50 - Malware-Attack.pdf
  • 51 - Types of Malware Worms
  • 51 - Worms.pdf
  • 52 - Types of Malware Viruses
  • 52 - Viruses.pdf
  • 53 - Trojan.pdf
  • 53 - Types of Malware Trojan
  • 54 - Adware.pdf
  • 54 - Types of Malware Adware
  • 55 - Spyware.pdf
  • 55 - Types of Malware Spyware
  • 56 - Crimeware.pdf
  • 56 - Types of Malware Crimeware
  • 57 - Rootkit.pdf
  • 57 - Types of Malware Rootkit
  • 58 - Ransomware.pdf
  • 58 - Types of Malware Ransomware
  • 59 - Man in the Middle Attack
  • 59 - Man-in-the-Middle-Attack.pdf
  • 60 - Man in the Middle Attack Example
  • 60 - Man-in-the-Middle-Attack-Example.pdf
  • 61 - Sniffing Attack
  • 61 - Sniffing-Attack.pdf
  • 62 - DOS Attack
  • 62 - DOS-Attack.pdf
  • 63 - DOS Attack Example
  • 63 - DOS-Attack-Example.pdf

  • 5 - Types of Attacks part 2
  • 64 - What is DDOS Attack
  • 64 - What-is-DDOS-Attack.pdf
  • 65 - DDOS Attack Example
  • 65 - DDOS-Attack-Example.pdf
  • 66 - Phishing Attack
  • 66 - Phishing-Attack.pdf
  • 67 - Phishing Attack Example
  • 67 - Phishing-Attack-Example.pdf
  • 68 - SQL Injection Attack
  • 68 - SQL-Injection-Attack.pdf
  • 69 - Example of SQL Injection Attack
  • 69 - Example-of-SQL-Injection-Attack.pdf
  • 70 - Crosssite Scripting Attack
  • 70 - Cross-site-Scripting-Attack.pdf
  • 71 - Post Scanning Attack
  • 71 - Post-Scanning-Attack.pdf

  • 6 - Cybersecurity Quiz 1

    7 - Cryptography part 1
  • 72 - What is Cryptology
  • 72 - What-is-Cryptology.pdf
  • 73 - The Need for Cryptography
  • 73 - The-Need-for-Cryptography.pdf
  • 74 - Basic Cryptography System
  • 74 - Basic-Cryptography-System.pdf
  • 75 - What is Encryption
  • 75 - What-is-Encryption.pdf
  • 76 - What is Decryption
  • 76 - What-is-Decryption.pdf
  • 77 - Define Plain text
  • 77 - Define-Plain-text.pdf
  • 78 - Half-Complete-Well-Done-Keep-Going.pdf
  • 78 - Youve Achieved 50 Lets Celebrate Your Progress And Keep Going To 75
  • 79 - What is Secret Key
  • 79 - What-is-Secret-Key.pdf
  • 80 - What is Cipher text
  • 80 - What-is-Cipher-text.pdf
  • 81 - Cryptography System
  • 81 - Cryptography-System.pdf
  • 82 - Cryptography in everyday life
  • 82 - Cryptography-in-everyday-life.pdf
  • 83 - Types of Cryptography
  • 83 - Types-of-Cryptography.pdf
  • 84 - Symmetric Key Cryptography
  • 84 - Symmetric-Key-Cryptography.pdf
  • 85 - Asymmetric Key Cryptography
  • 85 - Asymmetric-Key-Cryptography.pdf
  • 86 - What is Hashing
  • 86 - What-is-Hashing.pdf
  • 87 - Hashing Algorithm
  • 87 - Hashing-Algorithm.pdf
  • 88 - Techniques of Hashing
  • 88 - Techniques-of-Hashing.pdf

  • 8 - Cryptography part 2
  • 89 - What is Substitution Cipher
  • 89 - What-is-Substitution-Cipher.pdf
  • 90 - What is Transposition Cipher
  • 90 - What-is-Transposition-Cipher.pdf
  • 91 - Cesar Cipher and how it works
  • 91 - Cesar-Cipher-and-how-it-works.pdf
  • 92 - Example of Cesar Cipher
  • 92 - Example-of-Cesar-Cipher.pdf
  • 93 - Transposition Cipher
  • 93 - Transposition-Cipher.pdf
  • 94 - Example of Transposition Cipher
  • 95 - Stream Cipher
  • 95 - Stream-Cipher.pdf
  • 96 - Block Cipher
  • 96 - Block-Cipher.pdf
  • 97 - Advantages of Symmetric Key Cryptography
  • 97 - Advantages-of-Symmetric-Key-Cryptography.pdf
  • 98 - Why Asymmetric key cryptography is important
  • 98 - Why-Asymmetric-key-cryptography-is-important.pdf
  • 99 - Advantages of Asymmetric Key Cryptography
  • 99 - Advantages-of-Asymmetric-Key-Cryptography.pdf
  • 100 - Digital Signature
  • 100 - Digital-Signature.pdf
  • 101 - Signing and Verification Process
  • 101 - Signing-and-Verification-Process.pdf
  • 102 - How to check the Integrity of a Message
  • 102 - How-to-check-Integrity-of-Message.pdf

  • 9 - Security Measures
  • 103 - Security Measures
  • 103 - Security-Measures.pdf
  • 104 - What is Firewall
  • 104 - What-is-Firewall.pdf
  • 105 - Types of Firewall Packet Filter
  • 105 - Types-of-Firewall-Packet-Filter.pdf
  • 106 - Types of Firewall Stateful Inspection Firewall
  • 106 - Types-of-Firewall-Stateful-Inspection-Firewall.pdf
  • 107 - Types of Firewall Proxyserver firewall
  • 107 - Types-of-Firewall-Proxy-server-firewall.pdf

  • 10 - Cyber Law
  • 108 - Cyber Law
  • 108 - Cyber-Law.pdf
  • 109 - Why there is a need for Cyber Law
  • 109 - Why-there-is-a-need-for-Cyber-Law.pdf
  • 110 - What is Cyber Crime
  • 110 - What-is-Cyber-Crime.pdf
  • 111 - Classification of Cyber Crime
  • 111 - Classification-of-Cyber-Crime.pdf
  • 112 - Cyber Crimes Against Person Cyber Stalking
  • 112 - Cyber-Crimes-Against-Person-Cyber-Stalking.pdf
  • 113 - Cyber Crimes Against Person Dissemination of obscene Material
  • 113 - Cyber-Crimes-Against-Person-Dissemination-of-obscene-Material.pdf
  • 114 - Cyber Crimes Against Person Defamation
  • 114 - Cyber-Crimes-Against-Person-Defamation.pdf
  • 115 - Cyber Crimes Against Person Hacking
  • 115 - Cyber-Crimes-Against-Person-Hacking.pdf
  • 116 - Cyber Crimes Against Person Cracking
  • 116 - Cyber-Crimes-Against-Person-Cracking.pdf
  • 117 - Cyber Crimes Against Person Email and SMS Spoofing
  • 117 - Cyber-Crimes-Against-Person-Email-and-SMS-Spoofing.pdf
  • 118 - 3-Quarters-Complete-Well-Done-Keep-Going.pdf
  • 118 - Youve Achieved 75 Lets Celebrate Your Progress And Keep Going To 100
  • 119 - Cyber Crimes Against Person Carding
  • 119 - Cyber-Crimes-Against-Person-Carding.pdf
  • 120 - Cyber Crimes Against Person Cheating and Fraud
  • 120 - Cyber-Crimes-Against-Person-Cheating-and-Fraud.pdf
  • 121 - Cyber Crimes Against Person Assault by Threat
  • 121 - Cyber-Crimes-Against-Person-Assault-by-Threat.pdf
  • 122 - Cyber Crime Against Persons Property
  • 122 - Cyber-Crime-Against-Persons-Property.pdf
  • 123 - Cyber Crime against Government
  • 123 - Cyber-Crime-against-Government.pdf
  • 124 - Cyber Crime against Society at Large
  • 124 - Cyber-Crime-against-Society-at-Large.pdf

  • 11 - Cybersecurity Quiz 2

    12 - Digital Forensics
  • 125 - Definition of Digital Forensics
  • 125 - What-is-meant-by-term-Digital-Forensics.pdf
  • 126 - Process of Digital Forensics
  • 126 - Process-of-Digital-Forensics.pdf
  • 127 - Types of Digital Forensics
  • 127 - Types-of-Digital-Forensics.pdf

  • 13 - Cybersecurity Quiz 3
  • 128 - All-Complete-Well-Done.pdf
  • 128 - Youve Achieved 100 Lets Celebrate Remember To Share Your Certificate
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 584
    حجم: 8458 مگابایت
    مدت زمان: 493 دقیقه
    تاریخ انتشار: 22 دی 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید