المحاضر : المهندس علاء أمين Web Application Firewall (WAF) How WAF’s works Cybersecurity Architecture Free Cybersecurity Courses Roadmap to Begin in Cybersecurity
Did you know that the adoption of machine learning results in 2x more data-driven decisions, 5x faster decision-making, and 3x faster execution?1 Learn how to implement the latest machine learning and artificial intelligence technology with courses on Vertex AI, BigQuery, …
المحاضر : المهندس سعيد عبدالحيلم Fortinet certifications Install FortiManager VM on VMware workstation دورات مجانية بالعربي لشرح الفورتي جيت بالعربي كتاب بالعربي لشرح الفورتي جيت كورسات مجانية من فورتى نت
المحاضر : المهندس عمرو أمين RAID (Redundant Array of Independent Disks) RAID (Redundant Array of Independent Disks) is a data storage virtualization technology that combines multiple physical disk drives into a single logical unit for the purposes of data …
Server form factors refer to the physical size, shape, and configuration of a server. These form factors determine how servers are designed, installed, and maintained. The choice of form factor depends on factors such as space availability, scalability, power consumption, …
Veeam Backup & Replication – Arabic Veeam Backup & Replication Book High AvailabilityVeeam للحصول على مئات الكورسات المجانية إضغط هنا للمزيد من الكورسات المجانية إضغط هنا
المحاضر : المهندس مصطفي يحيي Security Operation Center (SOC) Cyber Security Foundation SOC Investigation Learn to pass EH Exam, CISM, CISA and CISSP in one bundle! Digital Forensics and Incident Response (DFIR) Free Cyber Security Courses Blue Team Fundamentals …
كيف أبدأ فى مجال الكلاود؟ Cloud Computing Azure Certifications Roadmap How To Pass Any Azure Exam الدورة الشاملة للشبكات وأمن المعلومات للحصول على مئات الكورسات المجانية إضغط هنا
Free Cybersecurity Courses Cybersecurity from Zero to Hero Free Cyber Security Courses كيف ابدأ في مجال أمن المعلومات الدورة الشاملة للشبكات وأمن المعلومات للحصول على مئات الكورسات المجانية إضغط هنا
المحاضر المهندس خالد الدسوقي High Availability A cluster is a group of interconnected computers or servers that work together as a single system to perform tasks, share resources, and provide high availability, scalability, or fault tolerance. Clusters are commonly used in …
Free Cyber Security Courses 1. Vulnerability A vulnerability is a weakness or flaw in a system, network, application, or process that can be exploited by a threat actor to gain unauthorized access, cause damage, or disrupt operations. Examples of vulnerabilities: Software bugs or …