Our website uses necessary cookies to enable basic functions and optional cookies to help us to enhance your user experience. Learn more about our cookie policy by clicking "Learn More".
Accept All Only Necessary Cookies
Защита информации icon

10 by Talipov S.N.


Sep 13, 2023

About Защита информации

Author's materials on the subject "Information Security" and "Cyber ​​Security"

Basic lectures:

Lecture 1. Information security of network surfing

Lecture 2. Crypto-protected distributed networks

Lecture3. Crypto-protected self-organizing networks and technologies

Lecture 4. Protected cloud storage

Lecture 5. Information Security of Instant Messaging

Lecture 6. Email Information Security

Lecture 7. Information security of data storage on physical media

Lecture 8. Security of information interactions in mobile devices and gadgets

Lecture 9. Integrated Security Against Malicious Software

Lecture 10. Means of protection and security against malicious software.

Lecture 11. Safe and open operating systems

Lecture 12. Information Security and Software Audit

Lecture 13. Information security of data in the network

Lecture 14. Information security policy in enterprises and organizations

Lecture 15. Information Security Systems

Mobile module:

Topic 01. Basic methods and ways to ensure security in smartphones

Topic 02. Android Protection Mechanisms

Topic 03. iOS Security Methods

Topic 04. Security in VK

Topic 05.Faceebook Security

Module for iron vulnerabilities:

Topic 01. Vulnerabilities of RAM, hard drives, motherboard, BIOS, video cards

Topic 02. USB and Thunderbolt Vulnerabilities

Topic 03. Vulnerabilities, amplifiers, silencers, WiFi testing. Network hardware spies

Topic 04: Mobile Vulnerabilities. Frequency Scanners for Radio and Digital Communications Analysis

Topic 05. Vulnerabilities of NFC, Bluetooth, IrDA, eToken, chips and RFID tags

Topic 06. Equipment for the protection, recovery and destruction of information

Theme 07. Vulnerabilities of "smart home", IoT, printers. Vulnerabilities of root-rights in devices

Theme 08. Vulnerabilities of surveillance, protection, alarm systems

Topic 09. Pentest Operating Systems

Topic 10. Vulnerabilities of automated process control systems

Theme 11. Vulnerabilities of the banking system, payment terminals

Topic 12. Attacks on billboards (billboards) and boxes for receiving mail

Theme 13. Attacks on quadrocopters and drones

Topic 14. Linux and Windows vulnerabilities

Topic 15. Vulnerabilities of Android and iOS

Linux Cybersecurity:

01. Introduction to Linux. PC installation

02. Linux software

03. Cinnamon Linux Mint environment overview

04. System Settings in Linux Mint

05. Hardware Settings in Linux Mint

06. Configure Login, Users and Console in Linux Mint

07. Branded Linux Mint Toolkit

08. Command Basics in Linux Mint

09. Packages, dependencies, libraries in Linux Mint

10. Basic Linux commands

11. Setting up a local network in Linux

12. Cleaning up unnecessary files and Linux viruses.

13. Partitioning and mounting in Linux

14. Using and configuring Wine on Linux

15. Pentesting tools in Kali Linux

The program works only when installing from an official store.

What's New in the Latest Version 10

Last updated on Sep 13, 2023

Minor bug fixes and improvements. Install or update to the newest version to check it out!

Translation Loading...

Additional APP Information

Latest Version

Request Защита информации Update 10

Requires Android

4.0.3

Available on

Get Защита информации on Google Play

Show More

Защита информации Screenshots

Comment Loading...
Subscribe to APKPure
Be the first to get access to the early release, news, and guides of the best Android games and apps.
No thanks
Sign Up
Subscribed Successfully!
You're now subscribed to APKPure.
Subscribe to APKPure
Be the first to get access to the early release, news, and guides of the best Android games and apps.
No thanks
Sign Up
Success!
You're now subscribed to our newsletter.