وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Cyber Security – Python and Web Applications

سرفصل های دوره

Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more!


01-Training-Overview
  • 01-Description-of-Training.html
  • 02-Video-Overview-(2-22-)

  • 02-Introduction
  • 01-Introduction-(3-03-)
  • 02-Course-Work-Overview-(1-53-)
  • 03-Sample-Tool-1---Log-Analyzer-(10-22-)
  • 04-Sample-Tool-1---Text-Instructions.html
  • 05-Sample-Tool-2---Password-Checker-(7-26-)
  • 06-Sample-Tool-2---Text-Instructions.html
  • 07-Development-Environment-Overview-(4-33-)

  • 03-Cyber-Security
  • 01-Cyber-Security-Introduction-to-Section-2-(0-45-)
  • 02-What-is-Cyber-Security-(8-01-)
  • 03-Explaining-the-methodology-(7-12-)
  • 04-repl.it-Introduction-(6-33-)
  • 05-Penetration-Testing---Overview-(5-31-)
  • 06-Penetration-Testing---Code-Example-(5-27-)
  • 07-Penetration Testing - Text Instructions.txt
  • 08-Penetration-Testing---Remediation-(8-28-)
  • 09-Port-Scanning---Overview-(4-29-)
  • 10-Port-Scanning---Code-Example-(3-38-)
  • 11-Port Scanning - Text Instructions.txt
  • 12-Port-Scanning---Remediation-(3-51-)
  • 13-Botnets---Overview-(6-01-)
  • 14-Botnets---Code-Example-(5-06-)
  • 15-Botnets---Code-Example-Continued-(5-04-)
  • 16-Botnets - Text Instructions.txt
  • 17-Botnets---Remediation-(12-15-)
  • 18-Code-Exploits---Overview-(4-51-)
  • 19-Code-Exploits---Code-Example-(5-33-)
  • 20-Code Exploits - Text Instructions.txt
  • 21-Code-Exploits---Remediation-(3-55-)
  • 22-Forensic-Investigation---Overview-(5-31-)
  • 23-Forensic-Investigation---Code-Example-(8-29-)
  • 24-Forensic Investigation - Text Instructions.txt
  • 25-Forensic-Investigation---Remediation-(5-09-)
  • 26-Network-Traffic-Analysis---Overview-(5-11-)
  • 27-Network-Traffic-Analysis---Code-Example-(4-28-)
  • 28-Network Traffic Analysis - Text Instructions.txt
  • 29-Network-Traffic-Analysis---Remediation-(3-43-)
  • 30-Wireless---Overview-(4-33-)
  • 31-Wireless---Code-Example-(3-08-)
  • 32-Wireless - Text Instructions.txt
  • 33-Wireless---Remediation-(9-58-)
  • 34-Web-Reconnaissance---Overview-(5-31-)
  • 35-Web-Reconnaissance---Code-Example-(9-36-)
  • 36-Web Reconnaissance - Text Instructions.txt
  • 37-Web-Reconnaissance---Remediation-(6-30-)
  • 38-Antivirus-Evasion---Overview-(5-39-)
  • 39-Antivirus-Evasion---Code-Example-(7-02-)
  • 40-Antivirus Evasion - Text Instructions.txt
  • 41-Antivirus-Evasion---Remediation-(3-33-)
  • 42-Social-Engineering---Overview-(6-57-)
  • 43-Social-Engineering---Code-Example-(4-30-)
  • 44-Social Engineering - Text Instructions.txt
  • 45-Social-Engineering---Remediation-(2-56-)

  • 04-Building-a-Security-Tool
  • 01-Introduction-to-Section-3---Building-your-own-tool-with-Python-(1-15-)
  • 02-Installing-Python-Locally.html
  • 03-Tool-Development-with-Python---Overview-(4-54-)
  • 04-Introduction-to-Pip-(3-55-)
  • 05-Introduction-to-Pip---Text-instructions.html
  • 06-Basic-Python-Script-(3-24-)
  • 07-Basic-Python-Script---Text-Instructions.html
  • 08-Command-Line-Arguments-(3-16-)
  • 09-Command-Line-Arguments---Text-Instructions.html
  • 10-Argument-Parsing-(6-29-)
  • 11-Argument-Parsing---Text-Instructions.html
  • 12-Validating-Input-(3-37-)
  • 13-Validating-Input---Text-Instructions.html
  • 14-Sending-Requests-to-the-Web-(2-40-)
  • 15-Sending-Requests-to-the-Web---Text-Instructions.html
  • 16-Parsing-Results-(6-43-)
  • 17-Parsing-Results---Text-Instructions.html
  • 18-Checking-Forms-(4-31-)
  • 19-Checking-Forms---Text-Instructions.html
  • 20-Generating-the-Report-(2-19-)
  • 21-Generating-the-Report---Text-Instructions.html
  • 22-Checking-Comments-(6-32-)
  • 23-Checking-Comments---Text-Instructions.html
  • 24-Checking-Inputs-(5-12-)
  • 25-Checking-Inputs---Text-Instructions.html
  • 26-Improving-the-Report-(2-57-)
  • 27-Improving-the-Report---Text-Instructions.html
  • 28-Configuration-from-File-(3-42-)
  • 29-Configuration-from-File---Text-Instructions.html
  • 30-Using-Config-Settings-(7-16-)
  • 31-Using-Config-Settings---Text-Instructions.html
  • 32-Merging-the-Configs-(2-09-)
  • 33-Merging-the-Configs---Text-Instructions.html
  • 34-Outputting-the-Report-(8-36-)
  • 35-Outputting-the-Report---Text-Instructions.html
  • 36-Pushing-to-GitHub-(4-29-)
  • 37-Pushing-to-GitHub---Text-Instructions.html
  • 38-Testing-the-Tool-(6-05-)
  • 39-Writing-the-Documentation-(6-24-)
  • 40-Distributing-Your-Tool-(5-48-)

  • 05-Web-Application-Security
  • 01-Section-4-Introduction-(1-17-)
  • 02-Web-Application-Security-Introduction-(6-00-)
  • 03-OWASP-Overview-(4-37-)
  • 04-Introduction-to-the-OWASP-Top-10-(1-27-)
  • 05-Rails-Overview-(3-14-)
  • 06-PHP-Overview-(5-08-)
  • 07-Installing-Rails-and-PHP.html
  • 08-OWASP-Top-10-Vulnerabilities-Example-Code---Where-to-get-it.html
  • 09-Command-Injection---Overview-(4-48-)
  • 10-Command-Injection---Rails-Example-(6-44-)
  • 11-Command-Injection---Rails-example---Text-Instructions.html
  • 12-Command-Injection---PHP-Example-(4-10-)
  • 13-Command-Injection---PHP-example---Text-Instructions.html
  • 14-SQL-Injection---Overview-(6-25-)
  • 15-SQL-Injection---Rails-Example-(3-59-)
  • 16-SQL-Injection---Rails-example---Text-Instructions.html
  • 17-SQL-Injection---PHP-Example-(3-31-)
  • 18-SQL-Injection-Remediation---PHP-Example-(2-26-)
  • 19-SQL-Injection---PHP-example---Text-Instructions.html
  • 20-Password-Complexity---Overview-(6-46-)
  • 21-Password-Complexity---Rails-Example-(6-50-)
  • 22-Password-Complexity---Rails-example---Text-Instructions.html
  • 23-Password-Complexity---PHP-Example-(6-28-)
  • 24-Password-Complexity---PHP-example---Text-Instructions.html
  • 25-Information-Leakage---Overview-(4-56-)
  • 26-Information-Leakage---Rails-Example-(3-07-)
  • 27-Information-Leakage---Rails-example---Text-Instructions.html
  • 28-Information-Leakage---PHP-Example-(7-13-)
  • 29-Information-Leakage---PHP-example---Text-Instructions.html
  • 30-Sensitive-Data-Exposure---Overview-(4-53-)
  • 31-Sensitive-Data-Exposure---Rails-Example-(4-23-)
  • 32-Sensitive-Data-Exposure---Rails-example---Text-Instructions.html
  • 33-Sensitive-Data-Exposure---PHP-Example-(2-54-)
  • 34-Sensitive-Data-Exposure---PHP-example---Text-Instructions.html
  • 35-XML-External-Entities-(XXE)---Overview-(4-40-)
  • 36-XML-External-Entities-(XXE)---Rails-Example-(4-36-)
  • 37-XML-External-Entities-(XXE)---Rails-example---Text-Instructions.html
  • 38-XML-External-Entities-(XXE)---PHP-Example-(4-28-)
  • 39-XML-External-Entities-(XXE)---PHP-example---Text-Instructions.html
  • 40-Broken-Access-Control---Overview-(5-12-)
  • 41-Broken-Access-Control---Rails-Example-(11-56-)
  • 42-Broken-Access-Control---Rails-example---Text-Instructions.html
  • 43-Broken-Access-Control---PHP-Example-(3-39-)
  • 44-Broken-Access-Control---PHP-example---Text-Instructions.html
  • 45-Security-Misconfiguration---Overview-(5-50-)
  • 46-Security-Misconfiguration---Rails-Example-(3-46-)
  • 47-Security-Misconfiguration---Rails-example---Text-Instructions.html
  • 48-Security-Misconfiguration---PHP-Example-(3-28-)
  • 49-Security-Misconfiguration---PHP-example---Text-Instructions.html
  • 50-Cross-Site-Scripting-(XSS)---Overview-(1-34-)
  • 51-Cross-Site-Scripting-(XSS)---Rails-Example-(5-09-)
  • 52-Cross-Site-Scripting-(XSS)---Rails-example---Text-Instructions.html
  • 53-Cross-Site-Scripting-(XSS)---PHP-Example-(5-50-)
  • 54-Cross-Site-Scripting-(XSS)---PHP-example---Text-Instructions.html
  • 55-Insecure-Deserialization---Overview-(3-46-)
  • 56-Insecure-Deserialization---Rails-Example-(5-18-)
  • 57-Insecure-Deserialization---Rails-example---Text-Instructions.html
  • 58-Insecure-Deserialization---PHP-Example-(7-22-)
  • 59-Insecure-Deserialization---PHP-example---Text-Instructions.html
  • 60-Using-Components-with-Known-Vulnerabilities---Overview-(5-28-)
  • 61-Using-Components-with-Known-Vulnerabilities---Rails-Example-(11-01-)
  • 62-Using-Components-with-Known-Vulnerabilities---Rails-example---Text-Instructions.html
  • 63-Using-Components-with-Known-Vulnerabilities---PHP-Example-(4-38-)
  • 64-Using-Components-with-Known-Vulnerabilities---PHP-example---Text-Instructions.html
  • 65-Insufficient-Logging-and-Monitoring---Overview-(4-06-)
  • 66-Insufficient-Logging-Monitoring---Rails-example-(5-49-)
  • 67-Insufficient-Logging-and-Monitoring---Rails-Example---Text-Instructions.html
  • 68-Insufficient-Logging-Monitoring---PHP-example-(6-14-)
  • 69-Insufficient-Logging-and-Monitoring---PHP-Example---Text-Instructions.html
  • 70-Web-Security-Analysis-Tool-(9-17-)

  • 06-Topics-in-Cyber-Security
  • 01-Multi-Factor-Authentication-(16-35-)
  • 02-Ethical-Hacking-(5-08-)
  • 03-Password-Complexity-(11-18-)
  • 04-Physical-Security-(10-31-)
  • 05-Data-Breaches-(9-34-)
  • 06-Cloud-Security-(11-44-)

  • 07-Python-Password-Encryption-Tool
  • 01-Password-Encryption-Tool-Introduction-(0-56-)
  • 02-Password-Encryption-Overview-(2-35-)
  • 03-Creating-the-Tool-(2-48-)
  • 04-Command-Line-Arguments-(4-15-)
  • 05-Adding-Encryption-(4-45-)
  • 06-Check-If-Encryption-Works-(2-32-)
  • 07-Password-Encryption-Tool---Source-Code.html

  • 08-Python-Crash-Course
  • 01-Installation-and-expectations.html
  • 02-Strings.html
  • 03-Numbers.html
  • 04-Lists,-Tuples,-Sets.html
  • 05-Dictionaries.html
  • 06-Branching-and-Functions-Methods.html
  • 07-Standard-library-and-imports.html
  • 08-Object-Oriented-Programming--Classes.html

  • 09-Summary
  • 01-Thank-You!-(1-07-)
  • 02-Appendix-A--Acknowledgements.html
  • 03-Appendix-B--Glossary.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42955
    حجم: 1392 مگابایت
    مدت زمان: 640 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید