







السمعة:
السلام عليكم ورحمة الله وبركاته
وهذا كان مكتوباً في وصف القناة.
لم نكن يوماً متكبرين بفضل الله، بذلنا كل ما نستطيع بتلك الظروف حتى وصلنا إلى هنا بفضل الله.
أعلن لكم بأن قناة اليوتيوب سوف يتم حذفها بشكل كامل بتاريخ 3/4/2024 بعد 7 أيام من تاريخ هذه اللحظة، بقرار من اليوتيوب بسبب بلاغات على فيديوهات القناة من أكبر شركات العالم، وتم حذف 30 فيديو من القناة وأخذنا 6 سترايكات دفعة وحدة.
لن أعلن عن الجهة التي قامت بالبلاغات لأسباب شخصية، ولكن مع قادم الأيام نسأل الله حسن التصرف والتدبير.
هذا الايميل وصلني الساعه 3:32 بتاريخ 27/3/2024 وأنا قمت بحذف معلومات الشركة التي قامت بالبلاغات متعمداً.
Hi Jordan Shield | درع الأردن,
We received a copyright removal request for your video. Based on applicable copyright law, we removed your video from YouTube:
Video title: #7 Encryption | CyberSecurity
Video url:
Content used:***************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network ( OSI 7 Layers ) - Part4 | CyberSecurity
Video url:
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #8 HTTPS | CyberSecurity
Video url:
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network - Part1 | CyberSecurity
Video url:
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network ( Switch , HUB , Repeater , Router ) - Part6 | CyberSecurity
Video url:
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #4 Basic Linux Commands - Part 7 | CyberSecurity
Video url:
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #4 Basic Linux Commands - Part 3 | CyberSecurity
Video url:
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #4 Basic Linux Commands - Part 4 | CyberSecurity
Video url:
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #2 Introduction To Computer | Cyber Security
Video url: https://www.youtube.com/watch?v=X3V4V4mAVuE
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #4 Basic Linux Commands - Part 2 | Cyber Security
Video url: https://www.youtube.com/watch?v=gP4wc8uEMms
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #3 How to install Kali Linux N Virtual Box environment
Video url: https://www.youtube.com/watch?v=7JNw1lIgXhk
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #1 Introduction To Cyber Security - SpicalEdition
Video url: https://www.youtube.com/watch?v=8n1D5vAC9cs
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #4 Basic Linux Commands - Part 5 | CyberSecurity
Video url: https://www.youtube.com/watch?v=IqusOLhGwS8
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #4 Basic Linux Commands - Part 1 | Cyber Security
Video url: https://www.youtube.com/watch?v=IxWsknYyhuc
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #4 Basic Linux Commands - Part 6 | CyberSecurity
Video url: https://www.youtube.com/watch?v=zHrO4dQXlgQ
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #11 Introduction To Information Gathering - Part5 | CyberSecurity
Video url: https://www.youtube.com/watch?v=1KL32mhKzfs
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network ( IPv4 Subnet Mask) - Part8 | CyberSecurity
Video url: https://www.youtube.com/watch?v=698MNx1fM94
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #12 Introduction To BurpSuite - Part1 | CyberSecurity
Video url: https://www.youtube.com/watch?v=DLB8qBIYmLk
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network ( Firewall , Access Point ) - Part7 | CyberSecurity
Video url: https://www.youtube.com/watch?v=TosUzlLjXSo
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #11 Introduction To Information Gathering - Part4 | CyberSecurity
Video url: https://www.youtube.com/watch?v=x8Wb9QEH_jw
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #10 VPN vs Proxy | CyberSecurity
Video url: https://www.youtube.com/watch?v=OMiNoUDu8ck
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #11 Introduction To Information Gathering - Part1 | CyberSecurity
Video url: https://www.youtube.com/watch?v=XAz7RyO8hlQ
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #11 Introduction To Information Gathering - Part3 | CyberSecurity
Video url: https://www.youtube.com/watch?v=h3X-JM-Jv6s
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #11 Introduction To Information Gathering - Part6 | CyberSecurity
Video url: https://www.youtube.com/watch?v=k_PWOznyP_s
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #11 Introduction To Information Gathering - Part2 | CyberSecurity
Video url: https://www.youtube.com/watch?v=lOlUosTe760
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #6 Encoding | CyberSecurity
Video url: https://www.youtube.com/watch?v=3TOe9lra7Dg
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #5 Hashing | CyberSecurity
Video url: https://www.youtube.com/watch?v=k_4vjPd-wOw
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network ( Topolgies and OSI 7 Layers ) - Part3 | CyberSecurity
Video url: https://www.youtube.com/watch?v=mYcuX9PAHm8
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network ( IPv4 , ARP , NAT , MAC ) - Part2 | CyberSecurity
Video url: https://www.youtube.com/watch?v=ootUNh0hgjY
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
Video title: #9 Introduction To Network ( OSI , DNS , TCP and UDP ) - Part5 | CyberSecurity
Video url: https://www.youtube.com/watch?v=se-CSTZEcMk
Content used:******************
Content found in: Entire video
Removal request issued by:******************
Contact info: *****[email protected]
This means that your video can no longer be viewed on YouTube.
You received a copyright strike
You now have 6 copyright strikes. As a result, your channel is scheduled to be terminated in 7 days
وما علاقة الشبكات واللينكس وال0,1 والبيرب سويت والترميز وغيرها بهذه الشركة؟
لم نبتغي يوماً إلا رضى الله عز وجل ولم نطلب شكراً ولا حتى مال.
سوف نبقى على العهد والوعد بإذن الله.
قادمون بالأقوى.
أما فيديوهات القناة v1 و v2 تم ضغطهم ورفعهم على Mega مع دورة DFE ودورة البايثون بالعربي.
ملف Jorshield1.rar
يحتوي على:
2 Introduction To Computer Cyber Security
4 Basic Linux Commands - Part 1 Cyber Security
4 Basic Linux Commands - Part 2 Cyber Security
4 Basic Linux Commands - Part 3 Cyber Security
4 Basic Linux Commands - Part 4 Cyber Security
4 Basic Linux Commands - Part 5 Cyber Security
4 Basic Linux Commands - Part 6 Cyber Security
4 Basic Linux Commands - Part 7 Cyber Security
5 Hashing CyberSecurity
6 Encoding CyberSecurity
7 Encryption CyberSecurity
8 HTTPS CyberSecurity
9 Introduction To Network - Part1 CyberSecurity
9 Introduction To Network ( Firewall , Access Point ) - Part7 CyberSecurity
9 Introduction To Network ( IPv4 , ARP , NAT , MAC ) - Part2 CyberSecurity
9 Introduction To Network ( IPv4 Subnet Mask) - Part8 CyberSecurity
9 Introduction To Network ( OSI , DNS , TCP and UDP ) - Part5 CyberSecurity
9 Introduction To Network ( OSI 7 Layers ) - Part4 CyberSecurity
9 Introduction To Network ( Switch , HUB , Repeater , Router ) - Part6 CyberSecurity
9 Introduction To Network ( Topolgies and OSI 7 Layers ) - Part3 CyberSecurity
10 VPN vs Proxy CyberSecurity
11 Introduction To Information Gathering - Part1 CyberSecurity
11 Introduction To Information Gathering - Part2 CyberSecurity
11 Introduction To Information Gathering - Part3 CyberSecurity
11 Introduction To Information Gathering - Part4 CyberSecurity
11 Introduction To Information Gathering - Part5 CyberSecurity
11 Introduction To Information Gathering - Part6 CyberSecurity
12 Introduction To BurpSuite - Part1 CyberSecurity
12 Introduction To BurpSuite - Part2 CyberSecurity
12 Introduction To BurpSuite - Part3 CyberSecurity
13 SubList3r CyberSecurity
14 Subdomain TakeOver CyberSecurity
15 HTTP Methods,Request,Response CyberSecurity
16 Introduction To HTML - Part1 CyberSecurity
16 Introduction To HTML - Part2 CyberSecurity
17 XSS ( Cross Site Script ) - Part1 CyberSecurity
17 XSS ( Cross Site Script ) - Part2 CyberSecurity
17 XSS ( Cross Site Script ) - Part3 CyberSecurity
17 XSS ( Cross Site Script ) - Part4 CyberSecurity
وأما ملف JorShield2.rar فهو يحتوي على هذه الفيديوهات.
#18 RCE ( Remote Command Execution ) - Part1 CyberSecurity
#19 CORS & SOP ( Same-origin Policy ) CyberSecurity
#20 CSRF ( Cross Site Request Forgery ) CyberSecurity
#21 LFI ( Local File Inclusion ) CyberSecurity
#22 FU ( File Upload ) - Part1 CyberSecurity
#22 FU ( File Upload ) - Part2 CyberSecurity
#22 FU ( File Upload ) - Part3 CyberSecurity
#23 SQLi ( SQL injection ) - Part1 CyberSecurity
#23 SQLi ( SQL injection ) - Part2 CyberSecurity
#23 SQLi ( SQL injection #Automated ) - Part3 CyberSecurity
#24 Metasploit Attack Learn ( Metasploitable v2) - Part 1 CyberSecurity
#24 Metasploit Attack Learn ( Metasploitable v2) - Part 2 CyberSecurity
#24 Metasploit Attack Learn ( Metasploitable v2) - Part 3 CyberSecurity
#24 Metasploit Attack Learn ( Metasploitable v2) - Part 4 CyberSecurity
#26 CTF ( Capture The Flag ) Road Map For Beginners Cyber Security
#27 How to hack WebApps (CTF Learn) Part 1 Cyber Security
#27 How to hack WebApps (CTF Learn) Part 2 Cyber Security
#27 How to hack WebApps (CTF Learn) Part 3 Cyber Security
#27 How to hack WebApps (CTF Learn) Part 4 Cyber Security
#28 How to solve Digital Forensics challenges (CTF Learn) Part 1 Cybersecurity
#28 How to solve Digital Forensics challenges (CTF Learn) Part 2 Cybersecurity
#28 How to solve Digital Forensics challenges (CTF Learn) Part 3 Cybersecurity
#28 How to solve Digital Forensics challenges (CTF Learn) Part 4 Cybersecurity
#28 How to solve Digital Forensics challenges (CTF Learn) Part 5 Cybersecurity
#28 How to solve Digital Forensics challenges (CTF Learn) Part 6 Cybersecurity
#29 How to solve Cryptography challenges (CTF Learn) Part 1 Cyber security
#29 How to solve Cryptography challenges (CTF Learn) Part 2 Cyber security
#29 How to solve Cryptography challenges (CTF Learn) Part 3 Cyber security
Basic Knowledge Of Operating Systems | V2 | #2
Cyber Security Career Path | مجالات الأمن السيبراني | V2 | #3
How To Install Kali Linux | V2 | #4
HTML Injection - Reflected - Stored [ URL,BLOG ] | Penetration Testing | V2 | #9
HTML Injection - Reflected [ GET,POST ] | ALL Levels | Penetration Testing | V2 | #9
IFrame Injection - Mail Injection [ SMTP ] | Penetration Testing | V2 | #9
Install XAMPP and bWAPP | Penetration Testing | V2 | #9
Introduction To Cyber Security Course | Special Edition | V2 | #1
OS Injection - RCE [ Normal , Blind ] | Penetration Testing | V2 | #9
OverTheWire - Bandit 0-5 | V2 | #6
OverTheWire - Bandit 5-10 | V2 | #7
PHP Injection - Server Side Include [ Code , SSI ] | Penetration Testing | V2 | #9
Pre Kali Settings in Few Steps | V2 | #5
The End - النهاية ❤
رابط تنزيل دورة DFE تقديم الحبيب : JOR-GHOST

4.11 GB file on MEGA
رابط تنزيل دورة الأمن السيبراني تقديم : STORM
الجزء الأول :

4.78 GB file on MEGA

2.34 GB file on MEGA
دورة الامن السيبراني درع الاردن – Google Drive


881.65 MB file on MEGA
شكراً لكل من أحبنا وأحبنا لوجه الله، شكراً لكل من كتب لنا تعليقاً أدخل السرور إلى قلوبنا في القناة.
درع الأردن | Jordan Shield
قناة درع الأردن الجديدة، تم انشاءها بعد حذف القناة الاصلية. لا نُتاجر بالفقراء ولا نتجرأ على طلب المال مقابل العلم لوجه الله. المنتدى: https://sh3ll.cloud

ما طلبت من حدا يعمل اشتراك لا بالقناة الحالية ولا الجديدة لهيك رح ننشر علم لوجه الله وهي تجارة مع الله من أراد أن يشاركنا رحلة العلم ليتفضل مشكوراً إلى المنتدى حيث يشارك العشرات من الناس المحبة للخير والمعلومات القيّمة والمفيدة.
أنا مش يوتيوبر ولا ببحث عن مشاهدات وأرقام ولا فارق معي اللي حصل، ولا باخذ أرباح من القناة.
لهيك إن شاء الله رح نرجع بقوة جكر باللي سكر القناة
وفي النهاية ما نقول إلا ما يرضي الله وفي مصائبنا نقول إنا لله وإنا اليه راجعون.
سنعود أقوى من قبل إن شاء الله.
دمتم بخير.
التعديل الأخير بواسطة المشرف: