Professional Documents
Culture Documents
محتوي دبلومة الاختراق الاخلاقي
محتوي دبلومة الاختراق الاخلاقي
Content
Cybersecurity
Network security is critical for protecting sensitive data and
systems from cyber attacks and other security threats.
CHAPTER 1 :
NETWORK
Network security involves a variety of
technologies, policies, and practices
designed to prevent or mitigate the
risks associated with cyber attacks,
malware, and other security threats.
Content
- What is Network
- Network Devices
- Network Architecture
- Servers
- IPv4 & Subnetting
- MAC Address
- ARP & RARP
- OSI Model
- TCP/IP
- Firewall and IDS/IPS
- Intro to routing & Switching
- STP & DHCP & DNS Main concept
Chapter 2 :
Ethical Hacking
Content
- What is cybersecurity ?
- Jobs in cybersecurity
- What is hacking & Cracking
- Hackers Types
- Hacking Proccess
- Enumration
- Intro to malwares
- Virus & Worms
- Trojen
- Botnet
- Spyware
- Ransomware
- Social Engineering
- Reverse Engineering
- Kali Linux Basics
- and more !!!
NOVEL ACADEMY
Content
- Introduction to Wireless Networks
- Wireless Standards and Protocols
- Wireless Network Components
- Wireless Network Security (Antena - SSID -
BSSID - WEP - WEP Cracking )
- Evil Twin Attack
<BASH>
Content
What is BASH
BASH Scripting
( Printing - var - if - looping - set -
functions )
Sign in page by BASH ( Practical )
Automate Gathering information
Script ( Practical )
and more
NOVEL ACADMEY
INTERNET OF THINGS
Content
- Intro to IoT
- IoT Security
- IoT Pentesting
CLOUD
Content
- Introduction to Cloud Computing
- Cloud Security
- Cloud Service Models
- Cloud Deployment Models
- Cloud Penetration Testing & Tools
Novel Academy
Content
What is VPN
What is Proxy
What is Tor & Dark web
Go into Dark Web Websites
What is password cracking
What is Brute force & Wordlist
What is Dictionary attack
what is John The Ripper
Crack Password Using John The Ripper
What is steganography
steganography uses & technology
Hide file into photo
NOVEL ACADEMY
Online Security Diploma
Content
"An Introduction to Security Operations Centers (SOCs)"
"Understanding the Role and Importance of SOC in Cybersecurity"
"What is a SOC and Why Do We Need It?"
"The Evolution of SOC: From Reactive to Proactive Security Operations"
"The Benefits of Having a SOC: Improved Threat Detection and Response"
Defensive technics
Network defense