categories: Technology & Innovation
Level: General
Course Language: Arabic
Learn the techniques used for password cracking and implement them practically to assess system strength.
Understand how to remain undetected within systems, avoid attack detection, and erase activity traces.
Explore different types of malware, such as viruses and Trojans, learn how to create them, and gain insights into social engineering strategies and their applications.
Comprehend network attack mechanisms, including eavesdropping, ARP poisoning, MAC flooding, and Denial-of-Service (DoS) attacks, while designing practical labs to understand these techniques.
Get familiar with various protection systems, methods to bypass them, and the importance of virtual traps (Honeypots).
Free lessons
Password cracking practical
Malware Overview
Introduction to DoS Attacks
1. Basics of System hacking and Penetration Testing
Password cracking theoretical
Password cracking practical
Steganography
Covering Tracks
Malware Overview
Trojan, Viruses & Worms
Create a Malware
Sniffing Overview
MAC Flooding
ARP Poisoning
Social Engineering Overview
Social Engineering LAB
Introduction to DoS Attacks
DoS Categories
BotNet
DoS LAB
IDS & IPS Overview
Detection Ways
Types of IDS-IPS
Firewall
FW Arch and Types
Honeypots
IDS Bypassing
Acquiring the necessary skills to protect digital systems and secure sensitive information has become more crucial than ever. That’s why we present to you the course "Basics of System hacking and Penetration Testing" which provides you with a comprehensive and practical understanding of penetration testing and the basics of cybersecurity, enabling you to identify and effectively address system vulnerabilities. The course begins by explaining hacking techniques and password cracking fundamentals, starting with theoretical concepts to understand how encryption and protection techniques work, and moving on to applying practical strategies for password cracking. This helps you grasp how to strengthen password security. Additionally, you will learn about Steganography techniques and Covering Tracks— essential tools for ethical hacking to ensure these activities remain undetected during testing operations. The course also includes an in-depth study of malware such as viruses, Trojans, and worms, along with how to design and use these in testing environments. Furthermore, you will gain hands-on experience in network attacks like eavesdropping, ARP poisoning, and Denial-of-Service (DoS) attacks, with practice in virtual environments that simulate real-world scenarios. To deepen your understanding of defensive systems, the course covers Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), firewalls, and honeypots. You will also learn bypassing strategies and detection methods, equipping you to analyze and evaluate the security architecture of any system. By the end of the course, you will be equipped with the foundational knowledge and skills that prepare you to confidently enter the field of cybersecurity.
This course requires basic computer knowledge, and a keen interest in cybersecurity.
Cyber Security Assurance TechLead
228 Learners
2 Course