Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Computer Network

أمن شبكات الحاسبات والمعلومات بالعربية

كيفية تأمين شبكات الحاسبات والمعلومات ومواجهة الهجمات التى يمكن أن تتعرض لها وحمايتها منها
Rating: 4.4 out of 54.4 (341 ratings)
12,170 students
Created by Mohammad Adly
Last updated 12/2018
Arabic
30-Day Money-Back Guarantee

What you'll learn

  • تأمين شبكات الحاسبات والمعلومات بمختلف التقنيات والأجهزة

Requirements

  • مبادئ تكنولوجيا المعلومات
  • مبادئ شبكات الحاسبات والمعلومات

Description

تم تسجيل الشرح الصوتى للمادة العلمية لهذه الدورة عن أمن شبكات الحاسبات والمعلومات باللغة العربية بينما تمت كتابة نصوص المادة العلمية ذاتها باللغة الإنجليزية وذلك حفاظاً على المصطلحات المستخدمة عالمياً فى مجال شبكات الحاسبات والمعلومات وهو ما يسمح للدارس بالاستماع إلى الشرح بالعربية مع التعرف على المصطلحات المكتوبة بلغتها الإنجليزية الأصلية فى الوقت نفسه

يتعرف الدارس على أهم تكنولوجيات ومصطلحات وأجهزة تأمين الشبكات من حيث طبيعة عملها وطريقة استخدامها وأهمها ما يلى:

التصميم الآمن لشبكات الحاسبات والمعلومات

تأمين الشبكات الافتراضية للحاسبات والمعلومات

الجدار النارى لحماية الشبكات

مسح مخارج الشبكات والأجهزة الموجودة عليها

التنصت على شبكات الحاسبات والمعلومات

كاشفات الاختراق لشبكات الحاسبات والمعلومات

كما يكتسب القدرة على ما يلى:

وضع وتنفيذ تصميم آمن لشبكات الحاسبات والمعلومات

ضبط وتشغيل الجدر النارية على شبكات الحاسبات والمعلومات

التعامل مع ثغرات الشبكات ونقاط الضعف لشبكات الحاسبات والمعلومات

مواجهة التنصت على شبكات الحاسبات والمعلومات

معالجة الاختراقات لشبكات الحاسبات والمعلومات

Who this course is for:

  • المبتدؤون فى مجال أمن شبكات الحاسبات والمعلومات
  • المحترفون فى مجال أمن شبكات الحاسبات والمعلومات
  • المتخصصون فى البرمجة وتكنولوجيا المعلومات

Course content

1 section • 18 lectures • 1h 25m total length

  • Preview03:12
  • مفاهيم وأهداف تأمين شبكات الحاسبات والمعلومات
    07:52
  • Preview03:43
  • Preview05:48
  • ضبط الجدار النارى
    05:07
  • أنواع الجدار النارى
    05:21
  • تخطى الجدار النارى
    03:00
  • تشفير الشبكات اللاسلكية
    04:22
  • التشفير المتقدم للشبكات اللاسلكية
    03:05
  • مفاهيم هامة لأمن الشبكات اللاسلكية
    03:24
  • هجمات الشبكات اللاسلكية
    05:51
  • تأمين الشبكات اللاسلكية
    03:30
  • مسح مخارج الشبكات
    04:49
  • التنصت على الشبكات
    04:15
  • أجهزة كشف الاختراق
    07:31
  • كشف اختراقات الشبكة
    04:20
  • تحديات كشف اختراقات الشبكة
    03:42
  • أهم أنواع الهجمات على شبكات الحاسبات والمعلومات
    07:05

Instructor

Mohammad Adly
Ph. D. Computer Networks
Mohammad Adly
  • 4.1 Instructor Rating
  • 4,750 Reviews
  • 124,454 Students
  • 5 Courses

Education

Ph. D., “Enhanced Congestion Control for Internet Media Traffic”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2006 - 2013.   

M. Sc., “Video Services for Distant Work in an IP Environment”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2002 - 2005.   

Researcher, IRISA Institute, Rennes I University, France, 2001 - 2002.   

Information Technology Diploma, Information Technology Institute ITI, Computer Networks Dept., 1998 - 1999.   

B. Sc., Communications and Electronics Dept., Faculty of Engineering, Cairo University, 1993 - 1998.   

Certificates

Lean Six Sigma Green Belt, SECC/ITIDA, April 2016.   

Dale Carnegie Certified Instructor, 2015   

GIAC Assessing Wireless Networks GAWN 617, SysAdmin, Audit, Network, Security SANS, 2010.   

GIAC Certified Firewall Analyst GCFW 502, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Certified Incident Handler GCIH 504, SysAdmin, Audit, Network, Security SANS, 2009.   

GIAC Security Essentials GSEC 401, SysAdmin, Audit, Network, Security SANS, 2009.   

RITI Advanced Management Program RAMP, Regional Information Technology Institute RITI, 2008.   

Publications

“Enhanced TCP-Friendly Rate Control for Supporting Video Traffic over Internet”, Mohammad A. Talaat, Gamal M. Attiya, and Magdi A. Koutb, Canadian Journal of Electrical and Computer Engineering CJECE, vol. 36, no. 4, 2013.   

“ETFRC: Enhanced TFRC for Media Traffic over Internet”, International Journal of Computer Networks, IJCN, vol. 3, no. 3, pp. 167-177, August 2011.   

“ETFRC: Enhanced TFRC for Media Traffic”, International Journal of Computer Applications, IJCA, vol. 18, no. 6, pp. 1-8, March 2011.   

“PSNR Evaluation for Media Traffic over TFRC”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Networks & Communications IJCNC, vol. 1, no. 3, pp. 71-76, October 2009.   

“A Survey on Unicast Congestion Control Protocols for Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, International Journal of Computer Science and Network Security IJCSNS, vol. 9, no. 3, pp. 254-261, March 2009.   

“Congestion Control for Internet Media Traffic”, Mohammad A. Talaat, Magdi A. Koutb, and Hoda S. Sorour, World Academy of Science, Engineering, and Technology WASET Proceedings, vol. 44, pp. 208-212, Venice, Italy, August 2008.   

“Content-Aware Adaptive Video Streaming System”, Mohammad A. Talaat, Magdi A. Koutb, Hamdy M. Kelash, and Reda H. Aboelez. Published in the proceedings of the following conferences:   

Information and Communications Technologies ICT 2005, Cape Town, South Africa, May 2005.   

International Conference on Information and Communications Technologies ICICT 2005, Cairo, Egypt, Dec. 2005.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.