لك جزيل الشكر والاجر من الله على نشر العلم
بسم الله الرحمن الرحيم
أحب أقدم لكم CD من شركة VTC يشرح استخدام ادوات السيكورتي
VTC-Security Tools Tutorials
وهذا ملخص لما يحتويه الـCD :
Introduction
Course Introduction
General Utilities
Secure Shell (ssh)
VNC
NX Client
VMware pt. 1
VMware pt. 2
Host Security
Anti-Virus pt. 1
Anti-Virus pt. 2
Anti-Malware
Linux Host Lockdown Tools
Windows Host Lockdown Tools (SCAT) pt. 1
Windows Host Lockdown Tools (SCAT) pt. 2
Windows Utilities
Windows Command-Line Tools pt. 1
Windows Command-Line Tools pt. 2
Windows Firewall pt. 1
Windows Firewall pt. 2
MBSA
MSConfig
Linux Tools
User Tools pt. 1
User Tools pt. 2
tcpdump
Inetd/TCP Wrappers & Xinetd pt. 1
Inetd/TCP Wrappers & Xinetd pt. 2
md5sum
File Security Tools
su & sudo
Scanning & Reconnaisance Tools
Nmap pt. 1
Nmap pt. 2
Nessus pt. 1
Nessus pt. 2
Hping3
Look-at-Lan
nslookup & dig
Ping & Traceroute pt. 1
Ping & Traceroute pt. 2
Superscan pt. 1
Superscan pt. 2
Fing
Network Security Tools
SmoothWall Firewall pt. 1
SmoothWall Firewall pt. 2
SmoothWall Firewall pt. 3
SmoothWall Firewall pt. 4
Linux Firewalls pt. 1
Linux Firewalls pt. 2
3rd Party Windows Firewalls pt. 1
3rd Party Windows Firewalls pt. 2
Wireshark pt. 1
Wireshark pt. 2
Wireless Security
Net Stumbler
inSSIDer
Wireless Capture Tools pt. 1
Wireless Capture Tools pt. 2
Web Tools
Google Hacking Techniques pt. 1
Google Hacking Techniques pt. 2
Nikto/Wikto
NetCraft
whois
Paros Proxy
Encryption Tools
TrueCrypt
Encrypting Files in Linux pt. 1
Encrypting Files in Linux pt. 2
Microsoft Windows EFS
Using Encrypted Email - PGP pt. 1
Using Encrypted Email - PGP pt. 2
Penetration Testing tools
Metasploit Framework pt. 1
Metasploit Framework pt. 2
Netcat
John the Ripper pt. 1
John the Ripper pt. 2
Cain & Abel pt. 1
Cain & Abel pt. 2
Colasoft Packet Builder
Computer Forensics Tools
Adepto
Adepto Demonstration
Ghost
Autopsy
Forensics Tool Kit pt. 1
Forensics Tool Kit pt. 2
Live Linux Distros
Backtrack 4
Helix
Damn Vulnerable Linux
Building a Security Toolbox
Creating a Security Toolbox
Dual-Booting a Security Laptop pt. 1
Dual-Booting a Security Laptop pt. 2
Creating a Security USB Stick pt. 1
Creating a Security USB Stick pt. 2
Creating Your Own Live Security CD pt. 1
Creating Your Own Live Security CD pt. 2
Conclusion
Using Security Tools - Conclusion
Resources
للتحميل :
Hotfile
https://hotfile.com/dl/19567709/e31d...part1.rar.html
https://hotfile.com/dl/19567710/5634...part2.rar.html
https://hotfile.com/dl/19567712/a2ed...part3.rar.html
https://hotfile.com/dl/19567706/7fae....VUST.sfv.html
Rapidshare
https://rapidshare.com/files/3164839...VUST.part1.rar
https://rapidshare.com/files/3164839...VUST.part2.rar
https://rapidshare.com/files/3164839...VUST.part3.rar
https://rapidshare.com/files/316483971/KiemCun.VUST.sfv
بالتوفيق..
لك جزيل الشكر والاجر من الله على نشر العلم
جزاك الله خيرا
جزاك الله خير
ممكن اعرف اماكن الشركات الى بتطلب مهندس فى هذا المجال
جزاك الله خيرا
الملفات ليست موجودة فى اللينك
المفضلات