SOO DHAWOOW

COURSE CUSUB- CASHIRA

Bar amd Baro

Ethical Hacking

Qeexid: Erayga Hack waa in shaqa adag loo qabtaa qaab fudud oo qayaana farsameysan ku jirto, waa qof sida ganacsade ama qoraa lacag abuuris uga faa'iidaysta kartidiisa ama hal abuurkiisa, howl aan malo awaal ahayn oo hufan; mid soo saarta shaqo adag oo si fudud lagu qabta iyo si dhex dhexaad ah isaga oo rajaynaya in uu ku guulaysto howshaas culus, wax yar buu ku darayaa oo farsama qarsoon ah. .

Hacking guud ahaan waxaa loola jeedaa gelitaanka aan la fasaxin o la gala kombiyuuter ama shabakad. Qofka ku hawlan falal-jabinta waxaa loo yaqaanaa jabsade (Hacker)..

Hacking waa iskuday la doonayo in looga faa'iideysto nidaamka kumbuyuutarka ama shabakad gaar loo leeyahay si loo helo xogta ku dhexjirta kombiyuutarka. Marka si fudud loo dhigo, waa marin u helitaan aan la oggolaan karin ama lagu xakameynayo nidaamyada shabakadaha amniga kumbuyuutar ujeedo sharci darro ah..

Kusoo dhawoow Website-keena

member

Abdifatah Ugas Abdullahi is ICT Specialist and Consultant. He is a Supervisor and Lecturer at Jamhuriya University of Science and Technology. He is an expert in ICT and Management such as Cloud Computing, Networking, MIS, Servers.

Read More

Adeegyada

CASHIRADA UGU MUHIIMSAN

Networking

Network waa isku xirka laba device iyo ka badan meela isu dhawne yaalo, sida computers, servers, mainframes, network devices(Hub, Switch, Router), peripherals, or device-yada kale.Waxaa loo adeegsadaa Local Area Network, Wide Area Network, Campus Area Network, and Home Area Network.

Web Development

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Internet of Things

Internet of Things (IoT) wuxuu sharxayaa isku xerka walxaha jira - Things (Walxaha) - oo ay kuxiran yihiin dareemayaal "Sensor's", softiweer, iyo teknoolojiyad kale ujeeddadeeduna tahay isku xirka iyo isdhaafsiga xogta aaladaha iyo nidaamyada kale iyadoo la isticmaalaya internet-ka.

Cyber Security

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

COURSES BILAASH AH

HALKAAN WAXAAD KA BARAN KARTAA MAADOOYIN BILAASH AH KUWAASO LEH PRACTICAL LAB.

  • Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat

    Networking

    Personal Area Network (PAN) ... Local Area Network (LAN) ... Wireless Local Area Network (WLAN) ... Campus Area Network (CAN) ... Metropolitan Area Network (MAN) ... Wide Area Network (WAN) ... Storage-Area Network (SAN) ... System-Area Network (also known as SAN)

  • Lorem Ipsum is simply dummy text of the printing and typesetting ndustry.

    Cyber Security

    Cybersecurity can be categorized into five distinct types: Critical infrastructure security. Application security. Network security. Cloud security. Internet of Things (IoT) security.

  • Lorem Ipsum is simply dummy text of the printing and typesetting ndustry.

    Web Development

    What are the different types of web development? Front-end web development. Front-end web development is responsible for the look and feel of a website. ... Back-end web development. ... Full-stack web development. ... Web designer. ... Web programmer. ... Content developer. ... Webmaster.

  • Lorem Ipsum is simply dummy text of the printing and typesetting ndustry.

    Video Editing

    Different Types of Editing Software Linear vs. Non-Linear Video Editing. ... Node-based vs Layer-Based Editing. Both Node and Layer Based Editing software utilize Non-Linear methods, and each workflow is entirely different. ... HitFilm Free. ... iMovie. ... Filmora Wondershare. ... HitFilm Creator and Pro. ... Final Cut Pro X. ... Premiere Pro.

  • Lorem Ipsum is simply dummy text of the printing and typesetting ndustry.

    Computer Repairing

    we discuss different types of computer repair services that are commonly offered: Virus Removal: Hardware Repairs: Data Recovery & Backup: Troubleshooting and Networking Support: Tutoring/Training:

  • Lorem Ipsum is simply dummy text of the printing and typesetting ndustry.

    Ethical Hacking

    What are the Different Types of Ethical Hacking? Black-box Testing. ... White-box Testing. ... Gray-box Testing. ... Web Application Hacking. ... Hacking Wireless Networks. ... Social engineering. ... System hacking. ... Web server hacking.

ARDAYDA MAXAAN U HEYNAA

Our Clients
USTAAD ABDIFATAH UGAS

Waxaan kugu soo dhaweyneynaa gacma furan iyo aqoon hufan, si aad u hormarisid xirfadahaaga dhinaca ICT ku xirnaaw halkaan. Mahadsanid

Our Clients
SHAQAALEYSIINTA HACKERSA-KA

Shirkadaha qaar waxay shaqaaleeyaan haakarisku waane qayb kamid ah ka hortaga Hakariska kale waa halka Soomaalida eey tiraahda “Tuug tuug ma gaado”. Arintaan ma ahan mid sharci-darrada ah waxay u isticmaalaan xirfadahooda si ay u ogaadaan cillad ku timaadda nidaamka amniga shirkadda u shaqeeyaan, sidaa darteed waxay ka hortagaan dhibaata walba oo ka imaan karta banaanka Shabakada Shirkada iyo Gudahaha..

Our Clients
Aaladaha Hacking Loo Isticmaala

Si eey u helaan xog haakarisku waxay hirgeliyaan ama sameeyaan farsamooyin fara badan oo kala duwan sida: Rootkits- Rootkit waa barnaamij kombiyuutar oo qarsoodi ah oo loogu talagalay in lagu siyaadiyo sii wadista mudnaanta leh ee kombiyuutarka. Maanta rootkit guud ahaan waxay la xiriiraan khalkhalka gelinta aalada - sida Trojans, Worms, Viruses - kuwaaso qariya jiritaankooda iyo ficilladooda isticmaalayaasha iyo hababka kale ee nidaamka.

QIIMAHA

QIIMA KU RAALI GELIYA

Silver
$ 7
month
  • No Bonus Points
  • No Bonus Points
  • No Bonus Points
  • No Bonus Points
  • sign up
Diamond
$ 15
month
  • All Bonus Points
  • All Bonus Points
  • All Bonus Points
  • All Bonus Points
  • sign up

FOLLOW US

Beautifully simple follow buttons to help you get followers on

Contact

Leave a Message

Nagala Soo Xiriir

Wadajir, Mogadishu Somalia


Phone: (613) 158686

info@abdifatahugas.com