وبلاگ یک برنامه نویس

وبلاگ مهندسی برق و علوم کامپیوتر

وبلاگ یک برنامه نویس

وبلاگ مهندسی برق و علوم کامپیوتر

وبلاگ مهندسی برق و علوم کامپیوتر

آخرین نظرات
  • ۱۰ ارديبهشت ۹۷، ۱۷:۰۷ - حامد
    ممنونم

۲ مطلب با موضوع «فیلم آموزشی :: هک و امنیت شبکه» ثبت شده است


در این کورس آموزشی با مجموعه ای از ابزارها ، نرم افزارها و تکنیک ها آشنا می شوید که به کمک آن ها می توانید IP و دیگر ویژگی های هویتی و شناسایی خود را مخفی کرده و به صورت ناشناس وب و شبکه را مرور کنید


لینک دانلود این ویدیو (حجم :3گیگ)



مشاهده انلاین و دانلود فیلم به صورت فایل های جداگانه




ر ادامه با برخی از سرفصل های درسی این مجموعه آموزش آشنا می شویم :

Introduction :
Welcome to Volume III
Introduction to the Instructor!
Security Quick Win!
Target Audience
Study Recommendations
Course updates



Goals and Objectives for Volume III :
Goals and Learning Objectives



OPSEC (Operational Security) :
Goals and Learning Objectives
Introduction to OPSEC
Identities, pseudonyms and aliases (Identity Strategies)
Establishing Cover
Identify Cross Contamination
10 Rules of OPSEC
Authorship Recognition and Evasion Methods
The knock
Case Studies of OPSEC Failures



Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu :
Goals and Learning Objectives
Introduction to live operating systems
Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go
Tails
Tails Demo



Virtual Private Networks (VPNs) :
Goals and Learning Objectives
Introduction to VPNs
Which VPN protocol is best to use? and why?
VPN Weaknesses
Can you trust VPN providers?
VPNs and Domain Name System (DNS) Leaks
Setting up an OpenVPN client in Windows, Mac, iPhone and Android
Setting up an OpenVPN client on Linux
Preventing VPN Leaks - Firewalls and kill switches
Choosing the right VPN provider
Setting up an OpenVPN server Part 1 - The fast and easy way
Setting up an OpenVPN server Part 2 - Debian client
Setting up an OpenVPN server Part 3 - Home VPN



Tor :
Goals and Learning Objectives
What is Tor?
The Tor Network and Browser
What should Tor be used for?
Directory Authorities and Relays
Tor Bridges
Tor Pluggable Transports and Traffic Obfuscation
Torrc Configuration File
Running other applications through Tor
Tor Weaknesses Part 1
Tor Weaknesses Part 2
Conclusions on Tor and mitigation to reduce risk
Attacking Tor: how the NSA targets users' online anonymity
Hidden services – The Tor darknet
Finding Tor hidden services
Other Tor Apps



VPN and Tor Routers :
Goals and Learning Objectives
Introduction to VPN and Tor Routers
Custom Router Firmware for VPN & TOR Tunneling
Off the shelf VPN and TOR Routers
DIY Hardware TOR Routers
TOR and VPN Gateway Virtual Machines



Proxies – HTTP, HTTPS, SOCKs and Web :
Goals and Learning Objectives
Proxies – HTTP, HTTPS and SOCKS Part 1
Proxies – HTTP, HTTPS and SOCKS Part 2
CGI proxies - Web proxy or web form proxy



SSH Secure Shell :
Goals and Learning Objectives
Introduction & How to Login
SSH Remote Port Forwarding
SSH Local Port Forwarding
SSH Socks5 Proxy Tunneling with Dynamic Ports
SSH Public private key authentication
SSH Hardening



I2P - The Invisible Internet Project :
Goals and Learning Objectives
I2P - Introduction
I2P Installing and Secure Configuration Part 1
I2P Installing and Secure Configuration Part 2
I2P Strengths and Weaknesses

۰ نظر موافقین ۰ مخالفین ۰ ۲۵ اسفند ۹۵ ، ۱۱:۰۰
سعید ایمانی

در این مجموعه آموزش بسیار ارزشمند از Udemy با مفهوم هک آشنا شده و راهکارهای سطح بالای پیشگیری از هک ، متوقف کردن هکرها ، جلوگیری از ترک شدن کارهایتان در فضای سایبر و نحوه حضور در وب به صورت ناشناس را یاد می گیرید.



لینک دانلود کامل فیلم  (حجم تقریبا 9گیگ) 



مشاهده و دانلود فیلم به صورت فایل های جداگانه


در ادامه با برخی از سرفصل های درسی این مجموعه آموزش آشنا می شویم :

 

Section 1: Introduction
Welcome and Introduction to the Instructor!
Goals and Learning Objectives - Volume 1
Target Audience
Study Recommendations
Course updates

Section 2: know Yourself - The Threat and Vulnerability Landscape
Goals and Learning Objectives
Protect What You Value
What is Privacy, Anonymity and Pseudonymity
Security, Vulnerabilities, Threats and Adversaries
Threat Modeling and Risk Assessments
Security vs Privacy vs Anonymity - Can we have it all?
Defense In Depth
The Zero Trust Model

Section 3: Know Your Enemy - The Current Threat and Vulnerability Landscape
Goals and Learning Objectives
Why You Need Security The Value Of A Hack
The Top 3 Things You Need To Stay Safe Online
Security Bugs and Vulnerabilities - The Vulnerability Landscape
Hackers, crackers and cyber criminals
Malware, viruses, rootkits and RATs
Spyware, Adware, Scareware, PUPs & Browser hijacking
What is Phishing, Vishing and SMShing
Spamming & Doxing
Social engineering - Scams, cons, tricks and fraud
Darknets, Dark Markets and Exploit kits
Governments, spies and secret stuff part I
Governments, spies and secret stuff part II
Regulating encryption, mandating insecurity & legalizing spying
Trust & Backdoors
Censorship
Security News and Alerts Stay Informed

Section 4: Encryption Crash Course
Goals and Learning Objectives
Symmetric Encryption
Asymmetric Encryption
Hash Functions
Digital Signatures
Secure Sockets Layer (SSL) and Transport layer security (TLS)
SSL Stripping
HTTPS (HTTP Secure)
Digital Certificates
Certificate Authorities and HTTPS
End-to-End Encryption (E2EE)
Steganography
How Security and Encryption is Really Attacked

Section 5: Setting up a Testing Environment Using Virtual Machines
Goals and Learning Objectives
Introduction to Setting up a Testing Environment Using Virtual Machines
Vmware
Virtual box
Kali Linux 2016

Section 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
Goals and Learning Objectives
Security Features and Functionality
Security Bugs and Vulnerabilities
Usage Share
Windows 10 - Privacy & Tracking
Windows 10 - Disable tracking automatically
Windows 10 - Tool : Disable Windows 10 Tracking
Windows 10 Cortana
Windows 10 Privacy Settings
Windows 10 - WiFi Sense
Windows 7, 8 and 8.1 - Privacy & Tracking
Mac - Privacy & Tracking
Linux and Unix like Operating systems
Linux - Debian
Linux - Debian 8 Jessie - Virtual box guest additions Issue
Linux - OpenBSD and Archlinux
Linux - Ubuntu

Section 7: Security Bugs and Vulnerabilities
Goals and Learning Objectives
The Importance of Patching
Windows 7 - Auto Update
Windows 8 & 8.1 - Auto Update
Windows 10 - Auto Update
Windows - Criticality and Patch Tuesday
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
Linux - Debian - Patching
Mac - Patching
Firefox - Browser and extension updates
Chrome - Browser and extension updates
IE and Edge - Browser and extention updates
Auto updates - The Impact to privacy and anonymity

Section 8: Reducing Threat Privilege
Goals and Learning Objectives + Removing Privilege
Windows 7 - Not using admin
Windows 8 and 8.1 - Not using admin
Windows 10 - Not using admin

Section 9: Social Engineering and Social Media Offence and Defence
Goals and Learning Objectives
Information Disclosure and Identity Strategies for Social Media
Identify Verification and Registration
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)

Section 10: Security Domains
Goals and Learning Objectives
Security Domains
۰ نظر موافقین ۰ مخالفین ۰ ۲۵ اسفند ۹۵ ، ۱۰:۵۶
سعید ایمانی