Защита информации

100+
Downloads
Content rating
Everyone
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image
Screenshot image

About this app

Basic lectures:
Lecture 1. Information security of network surfing
Lecture 2. Crypto-protected distributed networks
Lecture3. Crypto-protected self-organizing networks and technologies
Lecture 4. Protected cloud storage
Lecture 5. Information Security of Instant Messaging
Lecture 6. Email Information Security
Lecture 7. Information security of data storage on physical media
Lecture 8. Security of information interactions in mobile devices and gadgets
Lecture 9. Integrated Security Against Malicious Software
Lecture 10. Means of protection and security against malicious software.
Lecture 11. Safe and open operating systems
Lecture 12. Information Security and Software Audit
Lecture 13. Information security of data in the network
Lecture 14. Information security policy in enterprises and organizations
Lecture 15. Information Security Systems

Mobile module:
Topic 01. Basic methods and ways to ensure security in smartphones
Topic 02. Android Protection Mechanisms
Topic 03. iOS Security Methods
Topic 04. Security in VK
Topic 05.Faceebook Security

Module for iron vulnerabilities:
Topic 01. Vulnerabilities of RAM, hard drives, motherboard, BIOS, video cards
Topic 02. USB and Thunderbolt Vulnerabilities
Topic 03. Vulnerabilities, amplifiers, silencers, WiFi testing. Network hardware spies
Topic 04: Mobile Vulnerabilities. Frequency Scanners for Radio and Digital Communications Analysis
Topic 05. Vulnerabilities of NFC, Bluetooth, IrDA, eToken, chips and RFID tags
Topic 06. Equipment for the protection, recovery and destruction of information
Theme 07. Vulnerabilities of "smart home", IoT, printers. Vulnerabilities of root-rights in devices
Theme 08. Vulnerabilities of surveillance, protection, alarm systems
Topic 09. Pentest Operating Systems
Topic 10. Vulnerabilities of automated process control systems
Theme 11. Vulnerabilities of the banking system, payment terminals
Topic 12. Attacks on billboards (billboards) and boxes for receiving mail
Theme 13. Attacks on quadrocopters and drones
Topic 14. Linux and Windows vulnerabilities
Topic 15. Vulnerabilities of Android and iOS

Linux Cybersecurity:
01. Introduction to Linux. PC installation
02. Linux software
03. Cinnamon Linux Mint environment overview
04. System Settings in Linux Mint
05. Hardware Settings in Linux Mint
06. Configure Login, Users and Console in Linux Mint
07. Branded Linux Mint Toolkit
08. Command Basics in Linux Mint
09. Packages, dependencies, libraries in Linux Mint
10. Basic Linux commands
11. Setting up a local network in Linux
12. Cleaning up unnecessary files and Linux viruses.
13. Partitioning and mounting in Linux
14. Using and configuring Wine on Linux
15. Pentesting tools in Kali Linux

The program works only when installing from an official store.
Updated on
Sep 13, 2023

Data safety

Safety starts with understanding how developers collect and share your data. Data privacy and security practices may vary based on your use, region, and age. The developer provided this information and may update it over time.
No data shared with third parties
Learn more about how developers declare sharing
No data collected
Learn more about how developers declare collection

What's new

* обновление 2023