categories: Soft Skills
Level: General
Course Language: Arabic
Understand what cybersecurity is and its importance in the digital era, while exploring the types of cyberattacks and the various stages of a cyberattack.
Discover tools like Harvester, WHOIS, WhatWeb, and Google hacking techniques.
Learn how to segment and analyze networks to assess risks and vulnerabilities, and gain an understanding of the OSI layers, TCP and UDP protocols, and IP addresses.
Apply methodologies and techniques for network and application scanning. Understand the significance of DNS, NetBIOS, SMB, SMTP, and SNMP enumeration in uncovering vulnerabilities.
Gain knowledge on evaluating and analyzing security vulnerabilities and delve into password-cracking theories while practicing penetration testing techniques.
Free lessons
Hacking Overview and Hacking Phases
Enumeration Overview
IP Address
1. Tools and Techniques for Hacking and Incident Response
Hacking Overview and Hacking Phases
IR, Vulnerability Assessment, and Pentest
Reconnaissance Overview
What Do you Know about the Harvester?
WHOIS, WhatWeb & Google Hacking
GHDB, WayBack & OSINT
What Do You know about Maltego?
2. Concepts: OSI Layers, TCP/UDP, IP Addressing
OSI, TCP & UDP Layers
IP Address
Subnetting
3. Methodology and Testing Techniques
Scanning Methodology
Scanning Technique 1
Scanning Technique 2
Scanning Technique 3
4. SMTP، SNMPExploration and Enumeration Techniques: DNS, NetBIOS, SMB, SMTP, SNMP
Enumeration Overview
DNS Enumeration
NetBIOS Enumeration
SMB Enum
SMTP Enum
SNMP Enum
5. Assessment and Password Cracking Techniques
Vulnerability Assessment
In an era where individuals and organizations increasingly rely on technology, the need to protect data and systems has become indispensable. Cybersecurity serves as the first line of defense against evolving digital threats that target privacy breaches, data theft, or the disruption of critical infrastructure. To address these challenges, the "Basics of Cybersecurity" course has been designed to help you understand the fundamentals of this vital field and develop the skills needed to confidently and efficiently tackle the challenges of the digital age. The course begins with a comprehensive overview of cybersecurity, including its types and its importance in safeguarding digital assets. You will also explore hacking and its stages, starting with reconnaissance and information gathering, and progressing to exploitation and control. Additionally, the course covers essential techniques like WHOIS, WhatWeb, and GHDB enabling you to understand how to access and analyze public data. Tools such as Harvester and Maltego will be introduced to analyze information and uncover relationships between various elements. We will then delve into advanced technical aspects, such as network protocols (TCP, UDP) and the OSI layers, as well as managing IP addresses and network segmentation. You will learn various scanning methodologies and techniques to understand network infrastructure and identify vulnerabilities. Furthermore, you will gain insight into Enumeration and its multiple phases, including DNS, NetBIOS, SMTP, and more, opening the door to methods for discovering system weaknesses. Moreover, the course will guide you through vulnerability assessment and penetration testing, allowing you to experiment with and test security strategies effectively. You'll also learn password-cracking methods and protective measures, enhancing your understanding of attacker tools and techniques and enabling you to build robust defenses. In summary, this course offers a balanced mix of theoretical foundations and practical experience, making it an ideal choice for anyone looking to enter the field of cybersecurity or enhance their existing skills.
There are no requirements for this course. Your interest in the topic and your commitment to learning are all you need to achieve the utmost benefit from this course.
Cyber Security Assurance TechLead
511 Learners
2 Course