{"id":121011,"date":"2023-06-29T06:03:19","date_gmt":"2024-12-11T11:54:33","guid":{"rendered":"https:\/\/gfssite.local\/product\/%d8%ac%d8%af%d8%a7%d8%b1-%d8%ad%d9%85%d8%a7%d9%8a%d8%a9-%d8%b4%d8%a8%d9%83%d8%a7%d8%aa-%d8%a8%d8%a7%d9%84%d9%88-%d8%a3%d9%84%d8%aa%d9%88-%d8%af%d9%88%d8%b1%d8%a9-%d8%b9%d9%85%d9%84%d9%8a%d8%a9\/"},"modified":"2024-12-11T11:54:33","modified_gmt":"2024-12-11T11:54:33","slug":"%d8%ac%d8%af%d8%a7%d8%b1-%d8%ad%d9%85%d8%a7%d9%8a%d8%a9-%d8%b4%d8%a8%d9%83%d8%a7%d8%aa-%d8%a8%d8%a7%d9%84%d9%88-%d8%a3%d9%84%d8%aa%d9%88-%d8%af%d9%88%d8%b1%d8%a9-%d8%b9%d9%85%d9%84%d9%8a%d8%a9","status":"publish","type":"product","link":"https:\/\/globalfinanceschool.com\/ar\/product\/%d8%ac%d8%af%d8%a7%d8%b1-%d8%ad%d9%85%d8%a7%d9%8a%d8%a9-%d8%b4%d8%a8%d9%83%d8%a7%d8%aa-%d8%a8%d8%a7%d9%84%d9%88-%d8%a3%d9%84%d8%aa%d9%88-%d8%af%d9%88%d8%b1%d8%a9-%d8%b9%d9%85%d9%84%d9%8a%d8%a9\/","title":{"rendered":"\u062c\u062f\u0627\u0631 \u062d\u0645\u0627\u064a\u0629 \u0634\u0628\u0643\u0627\u062a \u0628\u0627\u0644\u0648 \u0623\u0644\u062a\u0648 &#8211; \u062f\u0648\u0631\u0629 \u0639\u0645\u0644\u064a\u0629 \u062d\u0648\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"},"content":{"rendered":"\n<p>\u0647\u0644 \u0623\u0646\u062a \u0642\u0644\u0642 \u0628\u0634\u0623\u0646 \u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0639\u0644\u0649 \u0634\u0628\u0643\u062a\u0643\u061f \u0647\u0644 \u062a\u0628\u062d\u062b \u0639\u0646 \u062f\u0648\u0631\u0629 \u0634\u0627\u0645\u0644\u0629 \u0633\u062a\u0632\u0648\u062f\u0643 \u0628\u0627\u0644\u0645\u0639\u0631\u0641\u0629 \u0648\u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a \u0627\u0644\u0644\u0627\u0632\u0645\u0629 \u0644\u062a\u0623\u0645\u064a\u0646 \u0623\u0635\u0648\u0644\u0643 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Palo Alto Networks Firewall\u061f \u0644\u0627 \u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0628\u062d\u062b! \u062a\u0639\u062f \u062f\u0648\u0631\u0629 Palo Alto Networks Firewall &#8211; Hands-On Cyber Security Course \u0647\u064a \u0627\u0644\u062f\u0648\u0631\u0629 \u0627\u0644\u0648\u062d\u064a\u062f\u0629 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0627\u062c\u0647\u0627 \u0639\u0644\u0649 Udemy \u0644\u0645\u0633\u0627\u0639\u062f\u062a\u0643 \u0639\u0644\u0649 \u0627\u0644\u0645\u0636\u064a \u0642\u062f\u0645\u0627 \u0641\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a.   <\/p>\n<p> <img decoding=\"async\" src=\"https:\/\/img-c.udemycdn.com\/course\/480x270\/3995094_0f56_3.jpg\" alt=\"\u0635\u0648\u0631\u0629 \u0627\u0644\u0639\u0646\u0635\u0631\" title=\"\"><\/p>\n<p>\u0627\u0644\u062f\u0648\u0631\u0629 \u0645\u0648\u062c\u0647\u0629 \u0646\u062d\u0648 \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0627\u0644\u0623\u062e\u0644\u0627\u0642\u064a\u0629 \u0628\u0646\u0633\u0628\u0629 100\u066a \u060c \u0648\u0647\u064a \u0645\u0635\u0645\u0645\u0629 \u0644\u062a\u0632\u0648\u064a\u062f\u0643 \u0628\u0645\u0642\u062f\u0645\u0629 \u0639\u0646 \u0633\u0644\u0633\u0644\u0629 \u0627\u0644\u0642\u062a\u0644 \u0627\u0644\u062a\u064a \u064a\u0633\u062a\u062e\u062f\u0645\u0647\u0627 \u0627\u0644\u0645\u062a\u0633\u0644\u0644\u0648\u0646 \u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0627\u0644\u0634\u0628\u0643\u0627\u062a. \u0633\u0648\u0641 \u062a\u062a\u0639\u0644\u0645 \u0644\u0645\u0627\u0630\u0627 \u0648\u0643\u064a\u0641 \u062a\u0633\u062a\u0647\u062f\u0641 \u0647\u0630\u0647 \u0627\u0644\u062c\u0647\u0627\u062a \u0627\u0644\u0641\u0627\u0639\u0644\u0629 \u0627\u0644\u0633\u064a\u0626\u0629 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u0643\u064a\u0641 \u064a\u0645\u0643\u0646\u0643 \u062d\u0645\u0627\u064a\u0629 \u0623\u0635\u0648\u0644\u0643 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062c\u062f\u0627\u0631 \u062d\u0645\u0627\u064a\u0629 Palo Alto Networks. \u062a\u062a\u0639\u0631\u0636 \u0622\u0644\u0627\u0641 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0644\u0644\u062e\u0637\u0631 \u0643\u0644 \u0639\u0627\u0645 \u0648\u0641\u064a \u0643\u062b\u064a\u0631 \u0645\u0646 \u0627\u0644\u0623\u062d\u064a\u0627\u0646 \u060c \u062a\u0642\u0644\u0644 \u0645\u0646 \u0645\u062e\u0627\u0637\u0631 \u0648\u0623\u0636\u0631\u0627\u0631 \u0627\u0644\u0627\u0646\u062a\u0647\u0627\u0643. \u0625\u0646\u0647\u0645 \u064a\u0639\u062a\u0642\u062f\u0648\u0646 \u0623\u0646 \u062a\u0642\u0646\u064a\u0627\u062a \u0645\u062b\u0644 \u062c\u062f\u0631\u0627\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0648\u0623\u0646\u0638\u0645\u0629 \u0645\u0646\u0639 \u0627\u0644\u062a\u0633\u0644\u0644 (IPS) \u0644\u064a\u0633\u062a \u0636\u0631\u0648\u0631\u064a\u0629 \u0641\u064a \u0634\u0628\u0643\u062a\u0647\u0645. \u0641\u064a \u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0629 \u060c \u0633\u062a\u0641\u0647\u0645 \u0645\u0627\u0647\u064a\u0629 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0648\u0623\u0636\u0631\u0627\u0631\u0647\u0627 \u0627\u0644\u0645\u062d\u062a\u0645\u0644\u0629 \u0639\u0644\u0649 \u0634\u0628\u0643\u062a\u0643. \u062a\u063a\u0637\u064a \u0627\u0644\u062f\u0648\u0631\u0629 \u0645\u064a\u0632\u0627\u062a \u0645\u062e\u062a\u0644\u0641\u0629 \u0644\u062c\u062f\u0627\u0631 \u062d\u0645\u0627\u064a\u0629 Palo Alto Networks \u0645\u062b\u0644 Wildfire \u0648 Vulnerability Profiles \u0648 DNS Security. \u0633\u0648\u0641 \u062a\u062a\u0639\u0644\u0645 \u0623\u064a\u0646 \u0648\u0643\u064a\u0641 \u062a\u0633\u062a\u062e\u062f\u0645 \u0647\u0630\u0647 \u0627\u0644\u0645\u064a\u0632\u0627\u062a \u0628\u0634\u0643\u0644 \u0641\u0639\u0627\u0644 \u0644\u0645\u0646\u0639 \u0643\u0644 \u0645\u0631\u062d\u0644\u0629 \u0645\u0646 \u0645\u0631\u0627\u062d\u0644 \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062c\u062f\u0631\u0627\u0646 \u062d\u0645\u0627\u064a\u0629 Palo Alto Networks. \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0630\u0644\u0643 \u060c \u062a\u062a\u0636\u0645\u0646 \u0627\u0644\u062f\u0648\u0631\u0629 \u0639\u0631\u0648\u0636\u0627 \u062a\u0648\u0636\u064a\u062d\u064a\u0629 \u0644\u0623\u0646\u0634\u0637\u0629 \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0627\u0644\u0623\u062e\u0644\u0627\u0642\u064a\u0629 \u0648\u062a\u0643\u0648\u064a\u0646 \u062c\u062f\u0627\u0631 \u062d\u0645\u0627\u064a\u0629 Palo Alto Networks \u0627\u0644\u062e\u0627\u0635 \u0628\u0643. \u062a\u0645 \u062a\u0635\u0645\u064a\u0645 \u0647\u0630\u0647 \u0627\u0644\u0623\u0646\u0634\u0637\u0629 \u0644\u062a\u0645\u0646\u062d\u0643 \u062a\u062f\u0631\u064a\u0628\u0627 \u0639\u0644\u0649 \u0627\u0644\u0646\u0637\u0627\u0642 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0623\u0648 \u062a\u0645\u0631\u064a\u0646 \u0627\u0644\u0641\u0631\u064a\u0642 \u0627\u0644\u0623\u0632\u0631\u0642 \/ \u0627\u0644\u0641\u0631\u064a\u0642 \u0627\u0644\u0623\u062d\u0645\u0631 \u060c \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0635\u0648\u0631\u0629 \u0643\u0628\u064a\u0631\u0629 \u0644\u0645\u0627 \u064a\u062f\u0648\u0631 \u062d\u0648\u0644\u0647 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a. <\/p>\n<h2>\u0645\u0627\u0630\u0627 \u064a\u0642\u0648\u0644 \u0627\u0644\u0637\u0644\u0627\u0628 \u0627\u0644\u0622\u062e\u0631\u0648\u0646<\/h2>\n<p>\u0643\u0627\u0646\u062a \u0647\u0630\u0647 \u062f\u0648\u0631\u0629 \u062a\u0645\u0647\u064a\u062f\u064a\u0629 \u0631\u0627\u0626\u0639\u0629 \u0644\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a! \u062a\u0628\u062f\u0623 \u0627\u0644\u062f\u0648\u0631\u0629 \u0628\u0646\u0638\u0631\u0629 \u0639\u0627\u0645\u0629 \u0639\u0627\u0644\u064a\u0629 \u0627\u0644\u0645\u0633\u062a\u0648\u0649 \u0639\u0644\u0649 \u0633\u0644\u0633\u0644\u0629 \u0627\u0644\u0642\u062a\u0644 \u0639\u0628\u0631 \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0645\u062a\u0628\u0648\u0639\u0629 \u0628\u0648\u062d\u062f\u0629 \u0644\u0643\u0644 \u062e\u0637\u0648\u0629 \u0645\u0646 \u062e\u0637\u0648\u0627\u062a \u0633\u0644\u0633\u0644\u0629 \u0627\u0644\u0642\u062a\u0644. \u064a\u062a\u0636\u0645\u0646 \u0643\u0644 \u0645\u0646\u0647\u0627 \u0646\u0638\u0631\u0629 \u0639\u0627\u0645\u0629 \u0645\u0641\u0627\u0647\u064a\u0645\u064a\u0629 \u0623\u0643\u062b\u0631 \u062a\u0639\u0645\u0642\u0627 \u0648\u0639\u0631\u0636\u0627 \u0639\u0645\u0644\u064a\u0627 \u060c \u0648\u062e\u0637\u0648\u0627\u062a \u0644\u0645\u0646\u0639 \u0647\u0630\u0647 \u0627\u0644\u062e\u0637\u0648\u0629 \u0645\u0646 \u0633\u0644\u0633\u0644\u0629 \u0627\u0644\u0642\u062a\u0644 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062c\u062f\u0631\u0627\u0646 \u062d\u0645\u0627\u064a\u0629 Palo Alto Networks \u060c \u0648\u0623\u0641\u0636\u0644 \u0645\u0645\u0627\u0631\u0633\u0627\u062a \u0627\u0644\u062a\u0646\u0641\u064a\u0630. \u0623\u0648\u062f \u0628\u0627\u0644\u062a\u0623\u0643\u064a\u062f \u0623\u0646 \u0623\u0648\u0635\u064a \u0628\u0647\u0630\u0647 \u0627\u0644\u062f\u0648\u0631\u0629 \u0644\u0644\u0622\u062e\u0631\u064a\u0646 \u0643\u0645\u0642\u062f\u0645\u0629 \u0645\u0648\u062c\u0632\u0629 \u0644\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a (\u0648\u0633\u0644\u0633\u0644\u0629 \u0627\u0644\u0642\u062a\u0644 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a) \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062a\u0642\u0646\u064a\u0627\u062a Palo Alto Networks. \u0628\u0633\u0639\u0631 49.99 \u062f\u0648\u0644\u0627\u0631\u0627 \u0641\u0642\u0637 \u060c \u0633\u062a\u062a\u0645\u0643\u0646 \u0645\u0646 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u062f\u0648\u0631\u0629 \u062a\u062f\u0631\u064a\u0628\u064a\u0629 \u062a\u0645\u0646\u062d\u0643 \u0627\u0644\u0645\u0639\u0631\u0641\u0629 \u0648\u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0627\u062c\u0647\u0627 \u0644\u062a\u062d\u0633\u064a\u0646 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u062e\u0627\u0635 \u0628\u0643. \u0644\u0627 \u062a\u0646\u062a\u0638\u0631 \u0623\u0643\u062b\u0631 \u0645\u0646 \u0630\u0644\u0643 \u060c \u0642\u0645 \u0628\u0645\u0639\u0627\u064a\u0646\u0629 \u0627\u0644\u062f\u0648\u0631\u0629 \u0627\u0644\u062a\u062f\u0631\u064a\u0628\u064a\u0629 \u0639\u0644\u0649 Udemy \u0648\u0642\u0645 \u0628\u0627\u0644\u062a\u0633\u062c\u064a\u0644 \u0627\u0644\u064a\u0648\u0645!   <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0647\u0644 \u0623\u0646\u062a \u0642\u0644\u0642 \u0628\u0634\u0623\u0646 \u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u0639\u0644\u0649 \u0634\u0628\u0643\u062a\u0643\u061f \u0647\u0644 \u062a\u0628\u062d\u062b \u0639\u0646 \u062f\u0648\u0631\u0629 \u0634\u0627\u0645\u0644\u0629 \u0633\u062a\u0632\u0648\u062f\u0643 \u0628\u0627\u0644\u0645\u0639\u0631\u0641\u0629 \u0648\u0627\u0644\u0645\u0647\u0627\u0631\u0627\u062a \u0627\u0644\u0644\u0627\u0632\u0645\u0629 \u0644\u062a\u0623\u0645\u064a\u0646 \u0623\u0635\u0648\u0644\u0643 \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Palo Alto Networks Firewall\u061f \u0644\u0627 \u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0628\u062d\u062b! \u062a\u0639\u062f \u062f\u0648\u0631\u0629 Palo Alto Networks Firewall &#8211; Hands-On Cyber Security Course \u0647\u064a \u0627\u0644\u062f\u0648\u0631\u0629 \u0627\u0644\u0648\u062d\u064a\u062f\u0629 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0627\u062c\u0647\u0627 \u0639\u0644\u0649 Udemy \u0644\u0645\u0633\u0627\u0639\u062f\u062a\u0643 \u0639\u0644\u0649 \u0627\u0644\u0645\u0636\u064a \u0642\u062f\u0645\u0627 \u0641\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a. \u0627\u0644\u062f\u0648\u0631\u0629 [&hellip;]<\/p>\n","protected":false},"featured_media":121013,"template":"","meta":{"_acf_changed":false},"course-author":[],"course-level":[],"course-type":[],"product_brand":[],"product_cat":[11185],"product_tag":[11186],"class_list":{"0":"post-121011","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-11185","7":"product_tag-11186","9":"first","10":"instock","11":"shipping-taxable","12":"product-type-simple"},"acf":[],"_links":{"self":[{"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/product\/121011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/types\/product"}],"version-history":[{"count":0,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/product\/121011\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/media\/121013"}],"wp:attachment":[{"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/media?parent=121011"}],"wp:term":[{"taxonomy":"course-author","embeddable":true,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/course-author?post=121011"},{"taxonomy":"course-level","embeddable":true,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/course-level?post=121011"},{"taxonomy":"course-type","embeddable":true,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/course-type?post=121011"},{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/product_brand?post=121011"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/product_cat?post=121011"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/globalfinanceschool.com\/ar\/wp-json\/wp\/v2\/product_tag?post=121011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}