We may earn an affiliate commission when you visit our partners.
Course image
Mohamed Galal

سيساعدك هذا المشروع علي تأسيس مهارات استغلال الثغرات واختراق نظم التشغيل من خلال إطار عمل Metasploit

كذلك سيساعدك علي اكتساب المهارات الاساسية في مجال اختبار الاختراق والاختراق الاخلاقي.

Read more

سيساعدك هذا المشروع علي تأسيس مهارات استغلال الثغرات واختراق نظم التشغيل من خلال إطار عمل Metasploit

كذلك سيساعدك علي اكتساب المهارات الاساسية في مجال اختبار الاختراق والاختراق الاخلاقي.

من خلال التدريب العملي على السيناريوهات الواقعية والممارسة الفعلية باستخدام Metasploit، ستتعلم كيفية اكتشاف الثغرات البرمجية والاستفادة منها بطريقة فعالة, وستتعرف على الادوات والطرق المتبعة من مختبري الاختراق والهاكرز المحترفين في اكتشاف الخدمات والبحث عن ثغرات متعلقة بهذه الخدمات وانظمة التشغيل لاستغلالها و اختراق الأنظمة والخوادم والتحكم فيها بطرق أخلاقية وقانونية.

ايضا سنتعلم كل ما يتعلق بإطار عمل Metasploit وادواته المساعدة مثل Msfvenom. وكذلك سنتعلم فحص انظمة التشغيل والمنافذ للأجهزة باستخدام Namp.

بتعلم هذة المهارات ستتمكن من البداء في مجال اكتشاف الثغرات والاختراق الاخلاقي.

Enroll now

What's inside

Syllabus

للمبتدئين Metasploit: أساسيات الاستغلال
للمبتدئين و أساسيات الاستغلال Metasploit آهلا بك في مشروع metasploit خلال هذا المشروع سنقوم بشكل عملي بالتدرب علي اكتشاف الثغرات واستغلالها باستخدام اطار عمل وسنتعرف علي المراحل المكونة لعملية الاختراق و سنقوم بتنفيذها علي جهاز الهدف المخصص لغرض الاستغلال بعد تجهيز بيئة العمل المكونة من جهاز المهاجم و جهاز الهدف. سنتدرب سويا علي كل من هذة العمليات بشكل عملي وسننفذها سويا للوصل لمرحلة الاخير وهي اختراق جهاز الهدف والتحكم فيه من بشكل كامل NMAP كذلك سنتعرف علي اطار عمل Metasploit ومكوناته وهي الاداة المخصصة لعملية الاستغلال وكذلك سنتعرف علي وهي اداة مساعدة مخصصة لعملية الفحص. المشروع سيكون اضافة جيدة لمهاراتك و بداية لأكتشاف الثغرات البرمجية و استغلالها ومدخل لعالم اختبار الاختراق. التدريب عملي بالكامل مليئ بالسيناريوهات الواقعية و الامثلة المختلفة لأستغلال الثغرات.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops penetration testing and ethical hacking skills
Taught by Mohamed Galal, who are recognized for their work in exploitation frameworks
Suitable for individuals new to exploitation frameworks
Covers Metasploit and related tools including Nmap
Focuses on real-world scenarios and hands-on practice
Useful for both industry professionals and individuals seeking personal growth in ethical hacking

Save this course

Save للمبتدئين Metasploit: أساسيات الاستغلال to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in للمبتدئين Metasploit: أساسيات الاستغلال with these activities:
تعلم أساسيات Metasploit
يعتبر Metasploit أحد أدوات اختبار الاختراق الأكثر استخدامًا، لذا فإن اكتساب فهم متين لأساسياته سيساعدك على بناء أساس متين لمزيد من التعلم في هذا المجال.
Browse courses on Metasploit
Show steps
  • اقرأ وثائق Metasploit الرسمية
  • شاهد مقاطع فيديو تعليمية حول المفاهيم الأساسية لـ Metasploit
  • تمرن على استخدام Metasploit من خلال متابعة الدروس الأساسية
ممارسة استغلال الثغرات باستخدام Metasploit
تعد الممارسة المستمرة ضرورية لإتقان استغلال الثغرات. ستساعدك هذه النشاطات على تطوير مهاراتك في اكتشاف الثغرات واستغلالها باستخدام Metasploit.
Browse courses on Metasploit
Show steps
  • استخدام Metasploit لفحص الأهداف الشائعة عن بعد
  • محاولة استغلال الثغرات المعروفة في أنظمة التشغيل وأهداف الويب
  • إطلاق حمولات متعددة على أنظمة مستهدفة مختلفة
  • كتابة وحدات نمطية مخصصة لـ Metasploit
Show all two activities

Career center

Learners who complete للمبتدئين Metasploit: أساسيات الاستغلال will develop knowledge and skills that may be useful to these careers:
Ethical Hacker
An Ethical Hacker, also known as a Penetration Tester, is an information security professional who uses their knowledge of hacking techniques to assess an organization's network security and identify vulnerabilities. They may also work with an organization's security team to develop and implement security measures. This course may be an excellent way to build a foundation in ethical hacking techniques and principles for those seeking to enter this in-demand field.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for an organization's overall security strategy and operations. They may also lead an organization's security team and work with vendors to procure and implement security solutions. This course may be helpful for those seeking to advance to a CISO role by providing a foundation in security principles and practices.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains cybersecurity systems for an organization. They also develop and implement cybersecurity policies and train employees in cybersecurity best practices. A background in IT is commonly preferred for this position. However, this course may be helpful for those seeking to enter this field by introducing foundational cybersecurity concepts and practical skills.
Information Security Auditor
An Information Security Auditor performs security audits and assessments to identify and mitigate security risks. They also work with an organization's security team to develop and implement security measures. This course may be helpful for building a foundation in security auditing principles and practices that are applicable to the role of an Information Security Auditor.
Security Analyst
A Security Analyst monitors and analyzes an organization's security systems and data for suspicious activity. They also investigate security incidents and work with other teams to resolve them. This course may be helpful for building a foundation in security principles and practices that are applicable to the role of a Security Analyst.
Data Protection Officer (DPO)
A Data Protection Officer (DPO) is responsible for ensuring that an organization complies with data protection laws and regulations. They also develop and implement data protection policies and train employees on data protection best practices. This course may be helpful for building a foundation in data protection principles and practices that are applicable to the role of a DPO.
Information Security Manager
An Information Security Manager is responsible for planning, implementing, and managing an organization's security program. They also develop and implement security policies and train employees in security best practices. This course may be helpful for building foundational knowledge in security principles and practices that are applicable to the role of an Information Security Manager.
Security Architect
A Security Architect designs, implements, and maintains security architectures for an organization. They also oversee an organization's security strategy and work with vendors to procure and implement security solutions. This course may be helpful for building foundational knowledge in security principles and practices that are applicable to the role of a security architect.
Red Team Operator
A Red Team Operator leads and conducts penetration tests and security assessments for an organization. They work to identify vulnerabilities in an organization's security systems and develop strategies to exploit them. This course may be beneficial for building a foundation in the tools and techniques used in red team operations.
Cloud Security Engineer
A Cloud Security Engineer designs, implements, and maintains security for cloud computing environments. They also work with cloud providers to ensure that cloud services are secure. This course may be helpful for building a foundation in cloud security principles and practices.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains network security infrastructure for an organization. They may also lead network security investigations and work with vendors to configure and maintain network security devices. This course may be helpful for building a foundation in network security principles and techniques.
Security Consultant
A Security Consultant provides independent security advice and services to organizations. They may assess an organization's security posture, develop and implement security plans, and train employees on security best practices. This course may be helpful for building a foundation in security principles and practices that are applicable to a role as a Security Consultant.
Software Security Engineer
A Software Security Engineer designs, implements, and tests software to ensure it is secure. They also work with developers to identify and fix security vulnerabilities in software. This course may be helpful for building a foundation in software security principles and practices.
Threat Intelligence Analyst
A Threat Intelligence Analyst researches and analyzes cybersecurity threats and develops strategies to mitigate them. They also monitor threat intelligence sources and communicate threat information within an organization. A background in computer science and data security is commonly preferred for this position. However, this course may be helpful for those seeking to enter this field by introducing foundational security concepts and practical skills.
Information Security Analyst
An Information Security Analyst designs, deploys, and maintains security systems and configurations, including access control, intrusion detection, and data encryption. They also develop and implement security policies and procedures as well as train employees in security best practices. A background in computer science and data security is commonly preferred for this position. However, this course may be useful for those seeking to enter the field by introducing foundational security concepts and practical skills.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in للمبتدئين Metasploit: أساسيات الاستغلال .
Is the definitive guide to using Metasploit, one of the most popular penetration testing frameworks available. It covers everything from basic to advanced topics, making it a valuable resource for both beginners and experienced users.
Provides a practical guide to memory forensics, with a focus on detecting malware and threats.
Provides a comprehensive overview of cloud security, with a focus on the practical aspects of securing your cloud environment.
Provides a comprehensive overview of security engineering, with a focus on building dependable distributed systems.
Provides a comprehensive overview of cryptography and network security, with a focus on the principles and practice of these disciplines.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to للمبتدئين Metasploit: أساسيات الاستغلال .
مشروع كابستون لشهادة تحليلات البيانات من Google: الانتهاء...
Most relevant
مهارات Excel للأعمال: المستوى "المتوسط I"
Most relevant
Odoo development [Arabic] برمجة أودو بالعربي
Most relevant
ETL مع Python : استخراج وتحويل وتحميل البيانات
Most relevant
أنت وأنظمة التشغيل: كيف تصبح مستخدمًا محترفًا
Most relevant
Python في Pygame تصميم و تطوير لعبة العقبات باستخدام
Most relevant
امازون Redshift للمبتدئين: مقدمة عن تخزين البيانات
Most relevant
نشر تطبيق ويب باستخدام Docker و Kubernetes
Most relevant
لغة الجسد | Body Language
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser