بسم الله الرحمن الرحيم
أحب أقدم لكم CD من شركة VTC يشرح استخدام ادوات السيكورتي
VTC-Security Tools Tutorials
وهذا ملخص لما يحتويه الـCD :
Introduction
Course Introduction
General Utilities
Secure Shell (ssh)
VNC
NX Client
VMware pt. 1
VMware pt. 2
Host Security
Anti-Virus pt. 1
Anti-Virus pt. 2
Anti-Malware
Linux Host Lockdown Tools
Windows Host Lockdown Tools (SCAT) pt. 1
Windows Host Lockdown Tools (SCAT) pt. 2
Windows Utilities
Windows Command-Line Tools pt. 1
Windows Command-Line Tools pt. 2
Windows Firewall pt. 1
Windows Firewall pt. 2
MBSA
MSConfig
Linux Tools
User Tools pt. 1
User Tools pt. 2
tcpdump
Inetd/TCP Wrappers & Xinetd pt. 1
Inetd/TCP Wrappers & Xinetd pt. 2
md5sum
File Security Tools
su & sudo
Scanning & Reconnaisance Tools
Nmap pt. 1
Nmap pt. 2
Nessus pt. 1
Nessus pt. 2
Hping3
Look-at-Lan
nslookup & dig
Ping & Traceroute pt. 1
Ping & Traceroute pt. 2
Superscan pt. 1
Superscan pt. 2
Fing
Network Security Tools
SmoothWall Firewall pt. 1
SmoothWall Firewall pt. 2
SmoothWall Firewall pt. 3
SmoothWall Firewall pt. 4
Linux Firewalls pt. 1
Linux Firewalls pt. 2
3rd Party Windows Firewalls pt. 1
3rd Party Windows Firewalls pt. 2
Wireshark pt. 1
Wireshark pt. 2
Wireless Security
Net Stumbler
inSSIDer
Wireless Capture Tools pt. 1
Wireless Capture Tools pt. 2
Web Tools
Google Hacking Techniques pt. 1
Google Hacking Techniques pt. 2
Nikto/Wikto
NetCraft
whois
Paros Proxy
Encryption Tools
TrueCrypt
Encrypting Files in Linux pt. 1
Encrypting Files in Linux pt. 2
Microsoft Windows EFS
Using Encrypted Email - PGP pt. 1
Using Encrypted Email - PGP pt. 2
Penetration Testing tools
Metasploit Framework pt. 1
Metasploit Framework pt. 2
Netcat
John the Ripper pt. 1
John the Ripper pt. 2
Cain & Abel pt. 1
Cain & Abel pt. 2
Colasoft Packet Builder
Computer Forensics Tools
Adepto
Adepto Demonstration
Ghost
Autopsy
Forensics Tool Kit pt. 1
Forensics Tool Kit pt. 2
Live Linux Distros
Backtrack 4
Helix
Damn Vulnerable Linux
Building a Security Toolbox
Creating a Security Toolbox
Dual-Booting a Security Laptop pt. 1
Dual-Booting a Security Laptop pt. 2
Creating a Security USB Stick pt. 1
Creating a Security USB Stick pt. 2
Creating Your Own Live Security CD pt. 1
Creating Your Own Live Security CD pt. 2
Conclusion
Using Security Tools - Conclusion
Resources
للتحميل :
Hotfile
https://hotfile.com/dl/19567709/e31d...part1.rar.html
https://hotfile.com/dl/19567710/5634...part2.rar.html
https://hotfile.com/dl/19567712/a2ed...part3.rar.html
https://hotfile.com/dl/19567706/7fae....VUST.sfv.html
Rapidshare
https://rapidshare.com/files/3164839...VUST.part1.rar
https://rapidshare.com/files/3164839...VUST.part2.rar
https://rapidshare.com/files/3164839...VUST.part3.rar
https://rapidshare.com/files/316483971/KiemCun.VUST.sfv
بالتوفيق..