[{"Name":"מבוא לאבטחת מידע וסייבר","Videos":[{"Watched":false,"Name":"הקדמה","Duration":0,"VideoQuestionQueItems":[],"ID":49201},{"Watched":false,"Name":"מושגים חשובים","Duration":0,"VideoQuestionQueItems":[],"ID":49202},{"Watched":false,"Name":"המשך מושגים חשובים","Duration":0,"VideoQuestionQueItems":[],"ID":49203},{"Watched":false,"Name":"הישויות הפועלות בעולם הסייבר","Duration":0,"VideoQuestionQueItems":[],"ID":49204}],"ID":9102},{"Name":"קריפטוגרפיה","Videos":[{"Watched":false,"Name":"הקדמה","Duration":0,"VideoQuestionQueItems":[],"ID":49205},{"Watched":false,"Name":"Hash","Duration":0,"VideoQuestionQueItems":[],"ID":49206},{"Watched":false,"Name":"שיטות הצפנה - הצפנה סימטרית","Duration":0,"VideoQuestionQueItems":[],"ID":49207},{"Watched":false,"Name":"שיטות הצפנה - הצפנה אסימטרית","Duration":0,"VideoQuestionQueItems":[],"ID":49208},{"Watched":false,"Name":"שיטות הצפנה - הצפנה היברידית","Duration":0,"VideoQuestionQueItems":[],"ID":49209}],"ID":9103},{"Name":"הנדסה חברתית","Videos":[{"Watched":false,"Name":"Phishing","Duration":0,"VideoQuestionQueItems":[],"ID":49210},{"Watched":false,"Name":"שיטוי, פתיונות, והונאת הנסיך הניגרי","Duration":0,"VideoQuestionQueItems":[],"ID":49211}],"ID":9104},{"Name":"חולשות","Videos":[{"Watched":false,"Name":"הקדמה","Duration":0,"VideoQuestionQueItems":[],"ID":49212},{"Watched":false,"Name":"דיווח ותיקון חולשות","Duration":0,"VideoQuestionQueItems":[],"ID":49213},{"Watched":false,"Name":"דיווח ותיקון חולשות - המשך","Duration":0,"VideoQuestionQueItems":[],"ID":49214},{"Watched":false,"Name":"איך מוצאים חולשות","Duration":0,"VideoQuestionQueItems":[],"ID":49215},{"Watched":false,"Name":"דוגמאות לחולשות - HeartBleed","Duration":0,"VideoQuestionQueItems":[],"ID":49216},{"Watched":false,"Name":"דוגמאות לחולשות - ShellShock","Duration":0,"VideoQuestionQueItems":[],"ID":49217}],"ID":9105},{"Name":"נוזקות ומתקפות סייבר","Videos":[{"Watched":false,"Name":"סוגי נוזקות - סוס טרויאני, תולעת ווירוס","Duration":0,"VideoQuestionQueItems":[],"ID":49218},{"Watched":false,"Name":"סוגי נוזקות - כופרה, רוגלה ועוד","Duration":0,"VideoQuestionQueItems":[],"ID":49219},{"Watched":false,"Name":"מתקפות סייבר הקשורות לכריית מטבעות","Duration":0,"VideoQuestionQueItems":[],"ID":49220},{"Watched":false,"Name":"בוטים","Duration":0,"VideoQuestionQueItems":[],"ID":49221},{"Watched":false,"Name":"ניצול רכיבי IoT","Duration":0,"VideoQuestionQueItems":[],"ID":49222},{"Watched":false,"Name":"שליטה בנוזקות","Duration":0,"VideoQuestionQueItems":[],"ID":49223},{"Watched":false,"Name":"סוגי מתקפות סייבר","Duration":0,"VideoQuestionQueItems":[],"ID":49224},{"Watched":false,"Name":"שלבי מתקפת סייבר איכותית","Duration":0,"VideoQuestionQueItems":[],"ID":49225}],"ID":9106},{"Name":"תקיפת סייבר ברשתות","Videos":[{"Watched":false,"Name":"Man in the middle","Duration":0,"VideoQuestionQueItems":[],"ID":49226},{"Watched":false,"Name":"ARP spoofing","Duration":0,"VideoQuestionQueItems":[],"ID":49227},{"Watched":false,"Name":"DNS poisoning","Duration":0,"VideoQuestionQueItems":[],"ID":49228},{"Watched":false,"Name":"DoS and DDoS","Duration":0,"VideoQuestionQueItems":[],"ID":49229},{"Watched":false,"Name":"שיטות לביצוע מתקפת DoS ו-DDoS","Duration":0,"VideoQuestionQueItems":[],"ID":49230},{"Watched":false,"Name":"איסוף מידע ברשתות מחשבים - סריקה","Duration":0,"VideoQuestionQueItems":[],"ID":49231},{"Watched":false,"Name":"איסוף מידע ברשתות מחשבים- כלי CMD","Duration":0,"VideoQuestionQueItems":[],"ID":49232},{"Watched":false,"Name":"איסוף מידע ברשתות מחשבים - הסנפה","Duration":0,"VideoQuestionQueItems":[],"ID":49233},{"Watched":false,"Name":"איסוף מידע ברשתות מחשבים - פתרון בית ספר","Duration":0,"VideoQuestionQueItems":[],"ID":49234}],"ID":9107},{"Name":"הגנת סייבר","Videos":[{"Watched":false,"Name":"לוגים ואיסוף מידע","Duration":0,"VideoQuestionQueItems":[],"ID":49235},{"Watched":false,"Name":"לוגים ואיסוף מידע - המשך","Duration":0,"VideoQuestionQueItems":[],"ID":49236},{"Watched":false,"Name":"הגנה על מחשב קצה","Duration":0,"VideoQuestionQueItems":[],"ID":49237},{"Watched":false,"Name":"הגנה על מחשב קצה - המשך","Duration":0,"VideoQuestionQueItems":[],"ID":49238},{"Watched":false,"Name":"הגנה על רשתות מחשבים - Firewall","Duration":0,"VideoQuestionQueItems":[],"ID":49239},{"Watched":false,"Name":"הגנה על רשתות מחשבים - IDS, IPS","Duration":0,"VideoQuestionQueItems":[],"ID":49240},{"Watched":false,"Name":"הגנה על רשתות מחשבים - Honeypot","Duration":0,"VideoQuestionQueItems":[],"ID":49241},{"Watched":false,"Name":"הגנה על רשתות מחשבים - SIEM","Duration":0,"VideoQuestionQueItems":[],"ID":49242},{"Watched":false,"Name":"הגנת סייבר בחברות ואירגונים","Duration":0,"VideoQuestionQueItems":[],"ID":49243}],"ID":9108}]