جستجو
دسته بندی ها
    منو بسته

    دانلود Udemy Cyber Security - Python and Web Applications

    تولید کننده: Udemy
    امنیت سایبری را بیاموزید ، ابزارهای آنالیز را با پایتون بسازید، از سیستم ها و برنامه های وب در برابر آسیب پذیری ها و دیگر موارد محافظت کنید!
    8,300 تومان
    مشخصات محصول
    طول مدت آموزش10 ساعت و 30 دقیقه
    زبان آموزشانگلیسی روان و ساده
    محصول موسسه آموزشیUdemy
    نحوه ارائه آموزشقابل دانلود و ارسال (جهت ارسال DVD تماس حاصل فرمائید.)
    حجم دانلود2.5 گیگابایت

    پیش نیازها:

    • هیچ تجربه قبلی با امنیت سایبری لازم نیست
    • درک اساسی در مورد چگونگی کارکرد وب مفید خواهد بود
    • هیچ تجربه قبلی با برنامه نویسی لازم نیست - البته دوره پایتون در این دوره گنجانده شده است!
    • این دوره برای چه کسی است؟
    • مبتدیان در دنیای امنیت سایبری و / یا فناوری اطلاعات
    • متخصصانی که به دنبال بهبود دانش خود در استفاده از پایتون برای امنیت سایبری هستند
    • مبتدیان در امنیت برنامه های وب
    • دانشجویانی که نسبت به امنیت در فناوری اطلاعات و کاربردهای عملی آن کنجکاو هستند
    • دانشجویی که به دنبال یادگیری برنامه نویسی پایتون و نحوه کاربرد آن در امنیت سایبر است

    در ادامه با برخی از سرفصل های درسی این مجموعه آموزش آشنا می شویم :

    Introduction

    Course Work Overview

    Sample Tool - Log Analyzer

    Sample Tool - Text Instructions

    Sample Tool - Password Checker

    Sample Tool - Text Instructions

    Development Environment Overview

    Important course updates (don't skip)

    Cyber Security

    Cyber Security Introduction to Section

    What is Cyber Security?

    Cyber Security Introduction Quiz

    Explaining the methodology

    Methodology Quiz

    Intro to Python and Python crash course for beginners

    repl.it Introduction

    Basics Review

    Penetration Testing - Overview

    Penetration Testing Quiz

    Penetration Testing - Code Example

    Penetration Testing - Text Instructions

    Penetration Testing - Remediation

    Port Scanning - Overview

    Port Scanning Quiz

    Port Scanning - Code Example

    Port Scanning - Text Instructions

    Port Scanning - Remediation

    Botnets - Overview

    Botnets - Code Example

    Botnets - Code Example Continued

    Botnets - Text Instructions

    Botnets - Remediation

    Cyber Security Topics Review

    Code Exploits - Overview

    Code Exploits - Code Example

    Code Exploits - Text Instructions

    Code Exploits - Remediation

    Forensic Investigation - Overview

    Forensic Investigation - Code Example

    Forensic Investigation - Text Instructions

    Forensic Investigation - Remediation

    Network Traffic Analysis - Overview

    Network Traffic Analysis - Code Example

    Network Traffic Analysis - Text Instructions

    Network Traffic Analysis - Remediation

    Cyber Security Topics Review

    Wireless - Overview

    Wireless - Code Example

    Wireless - Text Instructions

    Wireless - Remediation

    Web Reconnaissance - Overview

    Web Reconnaissance - Code Example

    Web Reconnaissance - Text Instructions

    Web Reconnaissance - Remediation

    Antivirus Evasion - Overview

    Antivirus Evasion - Code Example

    Antivirus Evasion - Text Instructions

    Antivirus Evasion - Remediation

    Social Engineering - Overview

    Social Engineering - Code Example

    Social Engineering - Text Instructions

    Social Engineering - Remediation

    Cyber Security Topics Review

    Assignment - Log Analysis

    Building a Security Tool

    Introduction to Section - Building your own tool with Python

    Installing Python Locally

    Tool Development with Python - Overview

    Introduction to Pip

    Introduction to Pip - Text Instructions

    Basic Python Script

    Basic Python Script - Text Instructions

    Command Line Arguments

    Command Line Arguments - Text Instructions

    Argument Parsing

    Argument Parsing - Text Instructions

    Python Tools Review

    Validating Input

    Validating Input - Text Instructions

    Sending Requests to the Web

    Sending Requests to the Web - Text Instructions

    Parsing Results

    Parsing Results - Text Instructions

    Checking Forms

    Checking Forms - Text Instructions

    Python Tools Review

    Generating the Report

    Generating the Report - Text Instructions

    Checking Comments

    Checking Comments - Text Instructions

    Checking Inputs

    Checking Inputs - Text Instructions

    Improving the Report

    Improving the Report - Text Instructions

    Configuration from File

    Configuration from File - Text Instructions

    Using Config Settings

    Using Config Settings - Text Instructions

    Merging the Configs

    Merging the Configs - Text Instructions

    Outputting the Report

    Outputting the Report - Text Instructions

    Python Tools Review

    Pushing to GitHub

    Pushing to GitHub - Text Instructions

    Testing the Tool

    Writing the Documentation

    Distributing Your Tool

    Python Tools Review

    Vulnerability Report for a Website


    Web Application Security

    Section Introduction

    Web Application Security Introduction

    OWASP Overview

    Introduction to the OWASP Top

    OWASP and Vulnerabilities Review

    Rails Overview

    PHP Overview

    Installing Rails and PHP

    OWASP Top Vulnerabilities Example Code - Where to get it

    Command Injection - Overview

    Command Injection - Rails Example

    Command Injection - Rails example - Text Instructions

    Command Injection - PHP Example

    Command Injection - PHP example - Text Instructions

    SQL Injection - Overview

    SQL Injection - Rails Example

    SQL Injection - Rails example - Text Instructions

    SQL Injection - PHP Example

    SQL Injection Remediation - PHP Example

    SQL Injection - PHP example - Text Instructions

    Password Complexity - Overview

    Password Complexity - Rails Example

    Password Complexity - Rails example - Text Instructions

    Password Complexity - PHP Example

    Password Complexity - PHP example - Text Instructions

    Information Leakage - Overview

    Information Leakage - Rails Example

    Information Leakage - Rails example - Text Instructions

    Information Leakage - PHP Example

    Information Leakage - PHP example - Text Instructions

    Sensitive Data Exposure - Overview

    Sensitive Data Exposure - Rails Example

    Sensitive Data Exposure - Rails example - Text Instructions

    Sensitive Data Exposure - PHP Example

    Sensitive Data Exposure - PHP example - Text Instructions

    Web Application Security Review

    XML External Entities (XXE) - Overview

    XML External Entities (XXE) - Rails Example

    XML External Entities (XXE) - Rails example - Text Instructions

    XML External Entities (XXE) - PHP Example

    XML External Entities (XXE) - PHP example - Text Instructions

    Broken Access Control - Overview

    Broken Access Control - Rails Example

    Broken Access Control - Rails example - Text Instructions

    Broken Access Control - PHP Example

    Broken Access Control - PHP example - Text Instructions

    Security Misconfiguration - Overview

    Security Misconfiguration - Rails Example

    Security Misconfiguration - Rails example - Text Instructions

    Security Misconfiguration - PHP Example

    Security Misconfiguration - PHP example - Text Instructions

    Web Application Security Review

    Cross-Site Scripting (XSS) - Overview

    Cross-Site Scripting (XSS) - Rails Example

    Cross-Site Scripting (XSS) - Rails example - Text Instructions

    Cross-Site Scripting (XSS) - PHP Example

    Cross-Site Scripting (XSS) - PHP example - Text Instructions

    Insecure Deserialization - Overview

    Insecure Deserialization - Rails Example

    Insecure Deserialization - Rails example - Text Instructions

    Insecure Deserialization - PHP Example

    Insecure Deserialization - PHP example - Text Instructions

    Using Components with Known Vulnerabilities - Overview

    Using Components with Known Vulnerabilities - Rails Example

    Using Components with Known Vulnerabilities - Rails example - Text Instructions

    Using Components with Known Vulnerabilities - PHP Example

    Using Components with Known Vulnerabilities - PHP example - Text Instructions

    Insufficient Logging and Monitoring - Overview

    Insufficient Logging Monitoring - Rails example

    Insufficient Logging and Monitoring - Rails Example - Text Instructions

    Insufficient Logging Monitoring - PHP example - Text Instructions

    Insufficient Logging and Monitoring - PHP Example - Text Instructions

    Web Application Security Review

    Web Security Analysis Tool

    Check for Vulnerabilities in a Webapp


    Topics in Cyber Security

    Multi-Factor Authentication

    Ethical Hacking

    Password Complexity

    Physical Security

    Data Breaches

    Cloud Security


    Python Password Encryption Tool

    Password Encryption Tool Introduction

    Password Encryption Overview

    Creating the Tool

    Command Line Arguments

    Adding Encryption

    Check If Encryption Works

    Password Encryption Tool - Source Code


    Python Crash Course

    Installation and expectations

    Strings

    Numbers

    Strings and Numbers recap

    Lists, Tuples, Sets

    Dictionaries

    Branching and Functions/Methods

    Standard library and imports

    Object Oriented Programming Classes

    Summary

    Thank You!

    Appendix A Acknowledgements

    Appendix B Glossary

    https://www.danacenter.ir/pe/instagram

    آموزش رشد فالوور در اینستاگرام