
{"id":318839,"date":"2025-12-04T17:28:29","date_gmt":"2025-12-04T18:28:29","guid":{"rendered":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/"},"modified":"2025-12-21T10:06:35","modified_gmt":"2025-12-21T11:06:35","slug":"supercourse-0000016436","status":"publish","type":"product","link":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/","title":{"rendered":"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc"},"content":{"rendered":"<div style=\"background: linear-gradient(135deg, #667eea 0%, #764ba2 100%); padding: 30px; border-radius: 15px; color: white; margin-bottom: 30px;\">\n<h2 style=\"color: white; text-align: center; margin-bottom: 20px;\">\ud83c\udf93 \u062f\u0648\u0631\u0647 \u0622\u0645\u0648\u0632\u0634\u06cc \u062c\u0627\u0645\u0639<\/h2>\n<\/p><\/div>\n<div style=\"margin-bottom: 30px;\">\n<h3 style=\"color: #333; margin-bottom: 15px;\">\ud83d\udcda \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062f\u0648\u0631\u0647<\/h3>\n<p style=\"font-size: 16px; line-height: 1.8;\"><strong>\u0639\u0646\u0648\u0627\u0646 \u062f\u0648\u0631\u0647:<\/strong> \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc<\/p>\n<p style=\"font-size: 16px; line-height: 1.8;\"><strong>\u0645\u0648\u0636\u0648\u0639 \u06a9\u0644\u06cc:<\/strong> \u0622\u0645\u0648\u0632\u0634 \u0632\u0628\u0627\u0646\u200c\u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc<\/p>\n<p style=\"font-size: 16px; line-height: 1.8;\"><strong>\u0645\u0648\u0636\u0648\u0639 \u0645\u06cc\u0627\u0646\u06cc:<\/strong> \u0632\u0628\u0627\u0646 \u062f\u0631 \u062d\u0648\u0632\u0647 \u0645\u0647\u0646\u062f\u0633\u06cc<\/p>\n<\/div>\n<div style=\"margin-bottom: 30px;\">\n<h3 style=\"color: #333; margin-bottom: 15px;\">\ud83d\udccb \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062f\u0648\u0631\u0647 (100 \u0645\u0648\u0636\u0648\u0639)<\/h3>\n<ul style=\"list-style-type: none; padding: 0;\">\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">1.<\/span> Introduction to Technical English for Engineers\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">2.<\/span> Reading Technical Documentation Effectively\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">3.<\/span> Understanding Engineering Diagrams and Schematics\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">4.<\/span> Key Grammar Structures for Technical Writing\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">5.<\/span> Vocabulary for General Engineering Concepts\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">6.<\/span> Essential Verbs for Describing Processes and Actions\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">7.<\/span> Adjectives and Nouns in Technical Descriptions\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">8.<\/span> Making Professional Presentations in Engineering Contexts\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">9.<\/span> Participating Effectively in Technical Discussions\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">10.<\/span> Writing Clear and Concise Engineering Reports\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">11.<\/span> Introduction to Cybersecurity: Core Definitions\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">12.<\/span> Understanding Cyber Threat Actors and Their Motives\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">13.<\/span> The CIA Triad: Confidentiality, Integrity, Availability\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">14.<\/span> Basic Cybersecurity Terminology Explained\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">15.<\/span> Overview of Engineering Systems and Their Vulnerabilities\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">16.<\/span> Types of Cyber Threats: An Introduction\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">17.<\/span> Malware: Viruses, Worms, Trojans, and Ransomware\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">18.<\/span> Phishing and Social Engineering Attacks\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">19.<\/span> Denial of Service (DoS) and Distributed DoS (DDoS)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">20.<\/span> Man-in-the-Middle Attacks Explained\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">21.<\/span> Zero-Day Exploits: Concepts and Impact\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">22.<\/span> Understanding Vulnerabilities and Exploits\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">23.<\/span> The Concept of Attack Surface and Its Reduction\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">24.<\/span> Introduction to Security Controls\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">25.<\/span> Firewalls: Principles and Types\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">26.<\/span> Intrusion Detection and Prevention Systems (IDPS)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">27.<\/span> Basic Cryptography Concepts for Engineers\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">28.<\/span> Encryption Algorithms: Symmetric and Asymmetric\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">29.<\/span> Hashing and Digital Signatures Explained\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">30.<\/span> Authentication Methods: Passwords, MFA, Biometrics\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">31.<\/span> Authorization and Access Control Models\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">32.<\/span> Principles of Least Privilege in System Design\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">33.<\/span> Security Policies and Procedures Development\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">34.<\/span> Asset Management in Cybersecurity Contexts\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">35.<\/span> Risk Assessment Fundamentals for Engineering Systems\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">36.<\/span> Threat Modeling for Engineering Applications\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">37.<\/span> Security by Design Principles in Practice\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">38.<\/span> Defense in Depth Strategy Explained\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">39.<\/span> Incident Response Fundamentals for Engineers\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">40.<\/span> Understanding the Cyber Kill Chain Model\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">41.<\/span> Networking Basics for Cybersecurity Professionals\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">42.<\/span> TCP\/IP Protocol Suite: Layers and Functions\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">43.<\/span> Common Network Protocols and Their Security Concerns\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">44.<\/span> Network Segmentation and VLANs for Security\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">45.<\/span> Wireless Network Security (Wi-Fi, Bluetooth, Zigbee)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">46.<\/span> Virtual Private Networks (VPNs): Types and Uses\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">47.<\/span> Common Network Attacks and Countermeasures\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">48.<\/span> Operating System Security Fundamentals\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">49.<\/span> Hardening Operating Systems for Engineering Use\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">50.<\/span> Patch Management and Updates Strategies\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">51.<\/span> Application Security Principles\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">52.<\/span> Secure Software Development Lifecycle (SSDLC) Introduction\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">53.<\/span> Common Web Application Vulnerabilities (OWASP Top 10)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">54.<\/span> Secure Coding Practices for Engineers\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">55.<\/span> Database Security Essentials\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">56.<\/span> Cloud Security Concepts for Engineers\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">57.<\/span> SaaS, PaaS, IaaS Security Considerations\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">58.<\/span> Container Security (Docker, Kubernetes Basics)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">59.<\/span> Serverless Computing Security Challenges\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">60.<\/span> Virtualization Security Best Practices\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">61.<\/span> Introduction to Industrial Control Systems (ICS) Security\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">62.<\/span> SCADA Systems: Architecture and Vulnerabilities\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">63.<\/span> Operational Technology (OT) vs. Information Technology (IT) Security\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">64.<\/span> Securing Programmable Logic Controllers (PLCs)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">65.<\/span> Cybersecurity for Critical Infrastructure Sectors\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">66.<\/span> IoT Security Challenges in Engineering Applications\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">67.<\/span> Securing IoT Devices and Gateways\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">68.<\/span> Firmware Security in Embedded Systems\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">69.<\/span> Hardware Security Fundamentals and Attacks\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">70.<\/span> Supply Chain Security for Engineering Components\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">71.<\/span> Automotive Cybersecurity: In-vehicle Networks (CAN bus, Ethernet)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">72.<\/span> Securing Connected Vehicles and Autonomous Systems\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">73.<\/span> Aerospace and Avionics Cybersecurity Challenges\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">74.<\/span> Medical Device Cybersecurity Standards and Risks\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">75.<\/span> Building Management Systems (BMS) Security\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">76.<\/span> Energy Sector Cybersecurity Considerations\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">77.<\/span> Smart Grid Security and Resilience\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">78.<\/span> Robotics and Automation Security Implications\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">79.<\/span> Drone and UAV Cybersecurity\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">80.<\/span> Ethical Considerations in Engineering Cybersecurity\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">81.<\/span> Cybersecurity Frameworks: NIST CSF Overview\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">82.<\/span> ISO\/IEC 27001 Standard: Information Security Management Systems\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">83.<\/span> Compliance and Regulatory Requirements (GDPR, HIPAA basics)\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">84.<\/span> Cybersecurity Auditing and Assessment Methodologies\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">85.<\/span> Penetration Testing: Methodologies and Tools\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">86.<\/span> Vulnerability Scanning and Management Processes\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">87.<\/span> Threat Intelligence: Sources and Application in Engineering\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">88.<\/span> Security Information and Event Management (SIEM) Systems\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">89.<\/span> Digital Forensics Basics for Incident Response\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">90.<\/span> Business Continuity and Disaster Recovery Planning for Engineering Operations\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">91.<\/span> Artificial Intelligence and Machine Learning in Cybersecurity\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">92.<\/span> AI\/ML for Threat Detection and Analysis\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">93.<\/span> Security Challenges of AI\/ML Systems\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">94.<\/span> Quantum Computing and Post-Quantum Cryptography Basics\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">95.<\/span> Legal Aspects of Cybersecurity: An Overview\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">96.<\/span> Reporting Cybersecurity Incidents Effectively\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">97.<\/span> Writing Security Requirements and Specifications\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">98.<\/span> Communicating Risk to Non-Technical Stakeholders\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">99.<\/span> Presenting Cybersecurity Solutions to Management\n                    <\/li>\n<li style=\"padding: 8px 0; border-bottom: 1px solid #eee;\">\n                        <span style=\"color: #667eea; font-weight: bold;\">100.<\/span> Staying Updated with Emerging Cybersecurity Threats and Technologies\n                    <\/li>\n<\/ul>\n<\/div>\n<div style=\"margin-bottom: 30px;\"><!DOCTYPE html><br \/>\n<html lang=\"fa\" dir=\"rtl\"><br \/>\n<head><br \/>\n    <meta charset=\"UTF-8\"><br \/>\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\"><br \/>\n    <title>\u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646: \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc<\/title><br \/>\n<\/head><br \/>\n<body><\/p>\n<h2>\u067e\u0644 \u0648\u0631\u0648\u062f \u0628\u0647 \u062f\u0646\u06cc\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062c\u0647\u0627\u0646\u06cc: \u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646<\/h2>\n<h3>\u0634\u06a9\u0627\u0641 \u0632\u0628\u0627\u0646\u06cc \u0631\u0627 \u067e\u0631 \u06a9\u0646\u06cc\u062f \u0648 \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u062f\u0631 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u062a\u0628\u062f\u06cc\u0644 \u0634\u0648\u06cc\u062f!<\/h3>\n<p>\u062f\u0631 \u062f\u0646\u06cc\u0627\u06cc \u0627\u0645\u0631\u0648\u0632\u060c \u0645\u0631\u0632\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u0648 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062f\u0631 \u0647\u0645 \u062a\u0646\u06cc\u062f\u0647 \u0634\u062f\u0647\u200c\u0627\u0646\u062f. \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc (ICS)\u060c \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u0627\u0634\u06cc\u0627\u0621 (IoT)\u060c \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u200c\u0647\u0627\u06cc \u062d\u06cc\u0627\u062a\u06cc \u0648 \u062e\u0637\u0648\u0637 \u062a\u0648\u0644\u06cc\u062f \u0647\u0648\u0634\u0645\u0646\u062f\u060c \u0647\u0645\u06af\u06cc \u062f\u0631 \u0645\u0639\u0631\u0636 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u067e\u06cc\u0686\u06cc\u062f\u0647\u200c\u0627\u06cc \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f. \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0645\u062f\u0631\u0646 \u062f\u06cc\u06af\u0631 \u0646\u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0647 \u062f\u0627\u0646\u0634 \u0641\u0646\u06cc \u062e\u0648\u062f \u0627\u06a9\u062a\u0641\u0627 \u06a9\u0646\u0646\u062f\u061b \u0622\u0646\u200c\u0647\u0627 \u0628\u0627\u06cc\u062f \u0628\u0647 \u0632\u0628\u0627\u0646 \u0645\u0634\u062a\u0631\u06a9 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062c\u0647\u0627\u0646\u06cc\u060c \u06cc\u0639\u0646\u06cc \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc\u060c \u0645\u0633\u0644\u0637 \u0628\u0627\u0634\u0646\u062f \u062a\u0627 \u0628\u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 \u062c\u062f\u06cc\u062f\u062a\u0631\u06cc\u0646 \u0645\u062a\u062f\u0648\u0644\u0648\u0698\u06cc\u200c\u0647\u0627\u060c \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 \u0648 \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627\u06cc \u062f\u0641\u0627\u0639\u06cc \u0628\u0647\u0631\u0647\u200c\u0645\u0646\u062f \u0634\u0648\u0646\u062f.<\/p>\n<p>\u062f\u0648\u0631\u0647 &#8220;\u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc&#8221; \u0641\u0642\u0637 \u06cc\u06a9 \u06a9\u0644\u0627\u0633 \u0632\u0628\u0627\u0646 \u0645\u0639\u0645\u0648\u0644\u06cc \u0646\u06cc\u0633\u062a. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u06cc\u06a9 \u062c\u0639\u0628\u0647 \u0627\u0628\u0632\u0627\u0631 \u062a\u062e\u0635\u0635\u06cc \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647 \u0637\u0648\u0631 \u0648\u06cc\u0698\u0647 \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0627\u06cc\u0631\u0627\u0646\u06cc \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u062a\u0627 \u0634\u06a9\u0627\u0641 \u0645\u06cc\u0627\u0646 \u062f\u0627\u0646\u0634 \u0641\u0646\u06cc \u0648 \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u0632\u0628\u0627\u0646\u06cc \u0631\u0627 \u0627\u0632 \u0628\u06cc\u0646 \u0628\u0628\u0631\u062f. \u0645\u0627 \u0628\u0647 \u0634\u0645\u0627 \u06a9\u0645\u06a9 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u0645 \u062a\u0627 \u0628\u0627 \u0627\u0639\u062a\u0645\u0627\u062f \u0628\u0647 \u0646\u0641\u0633 \u06a9\u0627\u0645\u0644\u060c \u0645\u0633\u062a\u0646\u062f\u0627\u062a \u0641\u0646\u06cc \u0631\u0627 \u0628\u062e\u0648\u0627\u0646\u06cc\u062f\u060c \u062f\u0631 \u062c\u0644\u0633\u0627\u062a \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u0634\u0631\u06a9\u062a \u06a9\u0646\u06cc\u062f\u060c \u06af\u0632\u0627\u0631\u0634\u200c\u0647\u0627\u06cc \u062d\u0631\u0641\u0647\u200c\u0627\u06cc \u0628\u0646\u0648\u06cc\u0633\u06cc\u062f \u0648 \u062f\u0631 \u062e\u0637 \u0645\u0642\u062f\u0645 \u062f\u0641\u0627\u0639 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0642\u0631\u0627\u0631 \u0628\u06af\u06cc\u0631\u06cc\u062f. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647\u060c \u0633\u0631\u0645\u0627\u06cc\u0647\u200c\u06af\u0630\u0627\u0631\u06cc \u0645\u0633\u062a\u0642\u06cc\u0645 \u0631\u0648\u06cc \u0622\u06cc\u0646\u062f\u0647 \u0634\u063a\u0644\u06cc \u0634\u0645\u0627 \u0648 \u06a9\u0644\u06cc\u062f \u0648\u0631\u0648\u062f \u0628\u0647 \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0628\u0632\u0631\u06af \u062c\u0647\u0627\u0646\u06cc \u0627\u0633\u062a.<\/p>\n<h2>\u062f\u0631\u0628\u0627\u0631\u0647 \u062f\u0648\u0631\u0647: \u0641\u0631\u0627\u062a\u0631 \u0627\u0632 \u0644\u063a\u0627\u062a\u060c \u062f\u0631\u06a9 \u0639\u0645\u06cc\u0642 \u0645\u0641\u0627\u0647\u06cc\u0645<\/h2>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0628\u0627 \u062a\u0645\u0631\u06a9\u0632 \u0628\u0631 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u062f\u0631 \u062f\u0646\u06cc\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc\u060c \u0634\u0645\u0627 \u0631\u0627 \u0628\u0627 \u0648\u0627\u0698\u06af\u0627\u0646\u060c \u0627\u0635\u0637\u0644\u0627\u062d\u0627\u062a \u0648 \u0633\u0627\u062e\u062a\u0627\u0631\u0647\u0627\u06cc \u0632\u0628\u0627\u0646\u06cc \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u0628\u0631\u0627\u06cc \u0641\u0639\u0627\u0644\u06cc\u062a \u062f\u0631 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0645\u0627 \u0628\u0647 \u062c\u0627\u06cc \u062a\u062f\u0631\u06cc\u0633 \u06af\u0631\u0627\u0645\u0631 \u062e\u0634\u06a9 \u0648 \u0644\u063a\u0627\u062a \u0628\u06cc\u200c\u0631\u0628\u0637\u060c \u0645\u0633\u062a\u0642\u06cc\u0645\u0627\u064b \u0628\u0647 \u0633\u0631\u0627\u063a \u0645\u0648\u0636\u0648\u0639\u0627\u062a\u06cc \u0645\u06cc\u200c\u0631\u0648\u06cc\u0645 \u06a9\u0647 \u0647\u0631 \u0631\u0648\u0632 \u0628\u0627 \u0622\u0646\u200c\u0647\u0627 \u0633\u0631 \u0648 \u06a9\u0627\u0631 \u062f\u0627\u0631\u06cc\u062f: \u0627\u0632 \u062a\u062d\u0644\u06cc\u0644 \u06af\u0632\u0627\u0631\u0634\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc (Vulnerability Reports) \u0648 \u062f\u0631\u06a9 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc NIST \u0648 ISO \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u0646\u0648\u0634\u062a\u0646 \u06cc\u06a9 \u0637\u0631\u062d \u067e\u0627\u0633\u062e \u0628\u0647 \u0631\u062e\u062f\u0627\u062f (Incident Response Plan) \u0648 \u0645\u06a9\u0627\u0644\u0645\u0647 \u062f\u0631\u0628\u0627\u0631\u0647 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc SCADA. \u0645\u062d\u062a\u0648\u0627\u06cc \u062f\u0648\u0631\u0647 \u06a9\u0627\u0645\u0644\u0627\u064b \u067e\u0631\u0648\u0698\u0647-\u0645\u062d\u0648\u0631 \u0628\u0648\u062f\u0647 \u0648 \u0634\u0645\u0627 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0645\u0648\u0627\u062c\u0647\u0647 \u0628\u0627 \u0686\u0627\u0644\u0634\u200c\u0647\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u0622\u0645\u0627\u062f\u0647 \u0645\u06cc\u200c\u0633\u0627\u0632\u062f.<\/p>\n<h2>\u0645\u0648\u0636\u0648\u0639\u0627\u062a \u06a9\u0644\u06cc\u062f\u06cc \u062f\u0648\u0631\u0647<\/h2>\n<ul>\n<li>\u0627\u0635\u0637\u0644\u0627\u062d\u0627\u062a \u0648 \u0648\u0627\u0698\u06af\u0627\u0646 \u0628\u0646\u06cc\u0627\u062f\u06cc\u0646 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc (Threats, Vulnerabilities, Risks, Exploits)<\/li>\n<li>\u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647 \u0648 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0635\u0646\u0639\u062a\u06cc (TCP\/IP, Modbus, DNP3, Profinet)<\/li>\n<li>\u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc (ICS) \u0648 SCADA<\/li>\n<li>\u0627\u0645\u0646\u06cc\u062a \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u0627\u0634\u06cc\u0627\u0621 \u0635\u0646\u0639\u062a\u06cc (IIoT) \u0648 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u062a\u0639\u0628\u06cc\u0647\u200c\u0634\u062f\u0647 (Embedded Devices)<\/li>\n<li>\u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 (Encryption, Hashing, Digital Signatures)<\/li>\n<li>\u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u062f\u0631 \u0645\u062d\u06cc\u0637\u200c\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc\u0627\u062a\u06cc (OT)<\/li>\n<li>\u062e\u0648\u0627\u0646\u062f\u0646\u060c \u062f\u0631\u06a9 \u0648 \u062a\u0641\u0633\u06cc\u0631 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc (ISO 27001, IEC 62443)<\/li>\n<li>\u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u0646\u0648\u0634\u062a\u0627\u0631\u06cc: \u062a\u0647\u06cc\u0647 \u06af\u0632\u0627\u0631\u0634\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc\u060c \u0633\u06cc\u0627\u0633\u062a\u200c\u0646\u0627\u0645\u0647\u200c\u0647\u0627 \u0648 \u0645\u0633\u062a\u0646\u062f\u0627\u062a \u0641\u0646\u06cc<\/li>\n<li>\u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u06af\u0641\u062a\u0627\u0631\u06cc: \u0627\u0631\u0627\u0626\u0647 \u06cc\u0627\u0641\u062a\u0647\u200c\u0647\u0627\u060c \u0634\u0631\u06a9\u062a \u062f\u0631 \u062c\u0644\u0633\u0627\u062a \u0641\u0646\u06cc \u0648 \u062f\u0641\u0627\u0639 \u0627\u0632 \u0637\u0631\u062d\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc<\/li>\n<\/ul>\n<h2>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0628\u0631\u0627\u06cc \u0686\u0647 \u06a9\u0633\u0627\u0646\u06cc \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a\u061f<\/h2>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u06cc\u06a9 \u0641\u0631\u0635\u062a \u0628\u06cc\u200c\u0646\u0638\u06cc\u0631 \u0628\u0631\u0627\u06cc \u062a\u0645\u0627\u0645 \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0648 \u0645\u062a\u062e\u0635\u0635\u0627\u0646\u06cc \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc\u200c\u062e\u0648\u0627\u0647\u0646\u062f \u062f\u0631 \u0633\u0637\u062d \u062c\u0647\u0627\u0646\u06cc \u0641\u0639\u0627\u0644\u06cc\u062a \u06a9\u0646\u0646\u062f \u0648 \u062f\u0627\u0646\u0634 \u062e\u0648\u062f \u0631\u0627 \u0628\u0647\u200c\u0631\u0648\u0632 \u0646\u06af\u0647 \u062f\u0627\u0631\u0646\u062f. \u0645\u062e\u0627\u0637\u0628\u0627\u0646 \u0627\u0635\u0644\u06cc \u0645\u0627 \u0639\u0628\u0627\u0631\u062a\u0646\u062f \u0627\u0632:<\/p>\n<ul>\n<li><strong>\u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0628\u0631\u0642\u060c \u06a9\u0646\u062a\u0631\u0644 \u0648 \u0627\u0628\u0632\u0627\u0631 \u062f\u0642\u06cc\u0642:<\/strong> \u06a9\u0647 \u0628\u0627 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc PLC\u060c DCS \u0648 SCADA \u06a9\u0627\u0631 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.<\/li>\n<li><strong>\u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631\u060c \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0648 IT:<\/strong> \u06a9\u0647 \u0645\u0633\u0626\u0648\u0644\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647\u200c\u0647\u0627 \u0648 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0635\u0646\u0639\u062a\u06cc \u0631\u0627 \u0628\u0631 \u0639\u0647\u062f\u0647 \u062f\u0627\u0631\u0646\u062f.<\/li>\n<li><strong>\u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0645\u06a9\u0627\u0646\u06cc\u06a9 \u0648 \u0645\u06a9\u0627\u062a\u0631\u0648\u0646\u06cc\u06a9:<\/strong> \u06a9\u0647 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647 \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0635\u0646\u0639\u062a\u06cc \u0648 \u0631\u0628\u0627\u062a\u06cc\u06a9 \u0641\u0639\u0627\u0644\u06cc\u062a \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.<\/li>\n<li><strong>\u0645\u062f\u06cc\u0631\u0627\u0646 \u067e\u0631\u0648\u0698\u0647 \u0648 \u0645\u062f\u06cc\u0631\u0627\u0646 \u0641\u0646\u06cc:<\/strong> \u06a9\u0647 \u0646\u06cc\u0627\u0632 \u0628\u0647 \u062f\u0631\u06a9 \u0639\u0645\u06cc\u0642 \u0631\u06cc\u0633\u06a9\u200c\u0647\u0627\u06cc \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0635\u0646\u0639\u062a\u06cc \u0648 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u06cc \u062f\u0627\u0631\u0646\u062f.<\/li>\n<li><strong>\u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc:<\/strong> \u06a9\u0647 \u0642\u0635\u062f \u062f\u0627\u0631\u0646\u062f \u062a\u062e\u0635\u0635 \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u062d\u0648\u0632\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u0639\u0645\u0644\u06cc\u0627\u062a\u06cc (OT) \u06af\u0633\u062a\u0631\u0634 \u062f\u0647\u0646\u062f.<\/li>\n<li><strong>\u062f\u0627\u0646\u0634\u062c\u0648\u06cc\u0627\u0646 \u062a\u062d\u0635\u06cc\u0644\u0627\u062a \u062a\u06a9\u0645\u06cc\u0644\u06cc \u0631\u0634\u062a\u0647\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc:<\/strong> \u06a9\u0647 \u0645\u06cc\u200c\u062e\u0648\u0627\u0647\u0646\u062f \u0628\u0631\u0627\u06cc \u0622\u06cc\u0646\u062f\u0647 \u0634\u063a\u0644\u06cc \u062e\u0648\u062f \u062f\u0631 \u0634\u0631\u06a9\u062a\u200c\u0647\u0627\u06cc \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u0622\u0645\u0627\u062f\u0647 \u0634\u0648\u0646\u062f.<\/li>\n<\/ul>\n<h2>\u0686\u0631\u0627 \u0628\u0627\u06cc\u062f \u062f\u0631 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0634\u0631\u06a9\u062a \u06a9\u0646\u06cc\u062f\u061f<\/h2>\n<h3>\u06f1. \u067e\u06cc\u0634\u0631\u0641\u062a \u0634\u063a\u0644\u06cc \u0648 \u062a\u0645\u0627\u06cc\u0632 \u062f\u0631 \u0628\u0627\u0632\u0627\u0631 \u06a9\u0627\u0631<\/h3>\n<p>\u062a\u0631\u06a9\u06cc\u0628 \u062a\u062e\u0635\u0635 \u0645\u0647\u0646\u062f\u0633\u06cc \u0628\u0627 \u062a\u0633\u0644\u0637 \u0628\u0631 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc\u060c \u0634\u0645\u0627 \u0631\u0627 \u0628\u0647 \u06cc\u06a9 \u0646\u06cc\u0631\u0648\u06cc \u06a9\u0645\u06cc\u0627\u0628 \u0648 \u0627\u0631\u0632\u0634\u0645\u0646\u062f \u062a\u0628\u062f\u06cc\u0644 \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0627\u06cc\u0646 \u0645\u0647\u0627\u0631\u062a \u0628\u0647 \u0634\u0645\u0627 \u0627\u0645\u06a9\u0627\u0646 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u0628\u0631\u0627\u06cc \u0645\u0648\u0642\u0639\u06cc\u062a\u200c\u0647\u0627\u06cc \u0634\u063a\u0644\u06cc \u0628\u0647\u062a\u0631 \u062f\u0631 \u0634\u0631\u06a9\u062a\u200c\u0647\u0627\u06cc \u0628\u0632\u0631\u06af \u062f\u0627\u062e\u0644\u06cc \u0648 \u062e\u0627\u0631\u062c\u06cc \u0627\u0642\u062f\u0627\u0645 \u06a9\u0646\u06cc\u062f \u0648 \u062f\u0631\u0622\u0645\u062f \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0634\u06a9\u0644 \u0686\u0634\u0645\u06af\u06cc\u0631\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u06cc\u062f.<\/p>\n<h3>\u06f2. \u062f\u0633\u062a\u0631\u0633\u06cc \u0645\u0633\u062a\u0642\u06cc\u0645 \u0628\u0647 \u0645\u0646\u0627\u0628\u0639 \u062f\u0627\u0646\u0634 \u062c\u0647\u0627\u0646\u06cc<\/h3>\n<p>\u062f\u06cc\u06af\u0631 \u0645\u0646\u062a\u0638\u0631 \u062a\u0631\u062c\u0645\u0647 \u0645\u0642\u0627\u0644\u0627\u062a\u060c \u06a9\u062a\u0627\u0628\u200c\u0647\u0627 \u0648 \u0645\u0633\u062a\u0646\u062f\u0627\u062a \u0641\u0646\u06cc \u0646\u0645\u0627\u0646\u06cc\u062f. \u0628\u0627 \u062a\u0633\u0644\u0637 \u0628\u0631 \u0632\u0628\u0627\u0646 \u062a\u062e\u0635\u0635\u06cc \u0627\u06cc\u0646 \u062d\u0648\u0632\u0647\u060c \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u0628\u0647 \u0637\u0648\u0631 \u0645\u0633\u062a\u0642\u06cc\u0645 \u0627\u0632 \u062c\u062f\u06cc\u062f\u062a\u0631\u06cc\u0646 \u062a\u062d\u0642\u06cc\u0642\u0627\u062a\u060c \u06af\u0632\u0627\u0631\u0634\u200c\u0647\u0627\u06cc \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u0647 \u062a\u0648\u0633\u0637 \u063a\u0648\u0644\u200c\u0647\u0627\u06cc \u0641\u0646\u0627\u0648\u0631\u06cc \u0648 \u0631\u0627\u0647\u0646\u0645\u0627\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0647\u062a\u0631\u06cc\u0646 \u0628\u0647\u0631\u0647 \u0631\u0627 \u0628\u0628\u0631\u06cc\u062f \u0648 \u0647\u0645\u06cc\u0634\u0647 \u06cc\u06a9 \u0642\u062f\u0645 \u0627\u0632 \u062f\u06cc\u06af\u0631\u0627\u0646 \u062c\u0644\u0648\u062a\u0631 \u0628\u0627\u0634\u06cc\u062f.<\/p>\n<h3>\u06f3. \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u06a9\u0627\u0645\u0644\u0627\u064b \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648 \u0645\u062a\u0645\u0631\u06a9\u0632<\/h3>\n<p>\u0627\u06cc\u0646\u062c\u0627 \u0648\u0642\u062a \u0634\u0645\u0627 \u0628\u0631\u0627\u06cc \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0644\u063a\u0627\u062a \u063a\u06cc\u0631\u0645\u0631\u062a\u0628\u0637 \u062a\u0644\u0641 \u0646\u0645\u06cc\u200c\u0634\u0648\u062f. \u0647\u0631 \u062f\u0631\u0633\u060c \u0647\u0631 \u062a\u0645\u0631\u06cc\u0646 \u0648 \u0647\u0631 \u067e\u0631\u0648\u0698\u0647 \u062f\u0642\u06cc\u0642\u0627\u064b \u0628\u0631\u0627\u06cc \u0646\u06cc\u0627\u0632\u0647\u0627\u06cc \u06cc\u06a9 \u0645\u0647\u0646\u062f\u0633 \u062f\u0631 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a. \u0634\u0645\u0627 \u0632\u0628\u0627\u0646 \u0631\u0627 \u062f\u0631 \u0628\u0633\u062a\u0631 \u06a9\u0627\u0631\u06cc \u062e\u0648\u062f \u06cc\u0627\u062f \u0645\u06cc\u200c\u06af\u06cc\u0631\u06cc\u062f \u0648 \u0628\u0644\u0627\u0641\u0627\u0635\u0644\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u0627\u0632 \u0622\u0646 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u06cc\u062f.<\/p>\n<h3>\u06f4. \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0639\u062a\u0645\u0627\u062f \u0628\u0647 \u0646\u0641\u0633 \u062f\u0631 \u0645\u062d\u06cc\u0637\u200c\u0647\u0627\u06cc \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc<\/h3>\n<p>\u062a\u0635\u0648\u0631 \u06a9\u0646\u06cc\u062f \u0628\u0627 \u0686\u0647 \u0627\u0637\u0645\u06cc\u0646\u0627\u0646\u06cc \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u062f\u0631 \u06cc\u06a9 \u06a9\u0646\u0641\u0631\u0627\u0646\u0633 \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u0634\u0631\u06a9\u062a \u06a9\u0646\u06cc\u062f\u060c \u0628\u0627 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u062e\u0627\u0631\u062c\u06cc \u062f\u0631\u0628\u0627\u0631\u0647 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0641\u0646\u06cc \u0628\u062d\u062b \u06a9\u0646\u06cc\u062f \u06cc\u0627 \u06cc\u0627\u0641\u062a\u0647\u200c\u0647\u0627\u06cc \u062a\u06cc\u0645 \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0645\u062f\u06cc\u0631\u0627\u0646 \u0627\u0631\u0634\u062f \u06cc\u06a9 \u0634\u0631\u06a9\u062a \u0686\u0646\u062f\u0645\u0644\u06cc\u062a\u06cc \u0627\u0631\u0627\u0626\u0647 \u062f\u0647\u06cc\u062f. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0627\u0639\u062a\u0645\u0627\u062f \u0628\u0647 \u0646\u0641\u0633 \u0644\u0627\u0632\u0645 \u0628\u0631\u0627\u06cc \u062f\u0631\u062e\u0634\u0634 \u062f\u0631 \u0686\u0646\u06cc\u0646 \u0645\u0648\u0642\u0639\u06cc\u062a\u200c\u0647\u0627\u06cc\u06cc \u0631\u0627 \u0628\u0647 \u0634\u0645\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f.<\/p>\n<h3>\u06f5. \u062a\u0636\u0645\u06cc\u0646 \u0622\u06cc\u0646\u062f\u0647 \u0634\u063a\u0644\u06cc \u062f\u0631 \u0635\u0646\u0639\u062a\u06cc \u0631\u0648 \u0628\u0647 \u0631\u0634\u062f<\/h3>\n<p>\u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u06cc\u06af\u0631 \u06cc\u06a9 \u0627\u0646\u062a\u062e\u0627\u0628 \u0646\u06cc\u0633\u062a\u060c \u06cc\u06a9 \u0636\u0631\u0648\u0631\u062a \u0627\u0633\u062a. \u0628\u0627 \u0633\u0631\u0645\u0627\u06cc\u0647\u200c\u06af\u0630\u0627\u0631\u06cc \u0631\u0648\u06cc \u0627\u06cc\u0646 \u0645\u0647\u0627\u0631\u062a \u06a9\u0644\u06cc\u062f\u06cc\u060c \u0646\u0647 \u062a\u0646\u0647\u0627 \u062c\u0627\u06cc\u06af\u0627\u0647 \u0641\u0639\u0644\u06cc \u062e\u0648\u062f \u0631\u0627 \u0645\u0633\u062a\u062d\u06a9\u0645 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u062f\u060c \u0628\u0644\u06a9\u0647 \u062e\u0648\u062f \u0631\u0627 \u0628\u0631\u0627\u06cc \u0641\u0631\u0635\u062a\u200c\u0647\u0627\u06cc \u0622\u06cc\u0646\u062f\u0647 \u062f\u0631 \u06cc\u06a9\u06cc \u0627\u0632 \u062d\u06cc\u0627\u062a\u06cc\u200c\u062a\u0631\u06cc\u0646 \u0648 \u067e\u0631\u062f\u0631\u0622\u0645\u062f\u062a\u0631\u06cc\u0646 \u062d\u0648\u0632\u0647\u200c\u0647\u0627\u06cc \u0641\u0646\u0627\u0648\u0631\u06cc \u0622\u0645\u0627\u062f\u0647 \u0645\u06cc\u200c\u0633\u0627\u0632\u06cc\u062f.<\/p>\n<h2>\u0646\u06af\u0627\u0647\u06cc \u0628\u0647 \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062c\u0627\u0645\u0639 \u062f\u0648\u0631\u0647<\/h2>\n<p>\u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0634\u0627\u0645\u0644 \u0628\u06cc\u0634 \u0627\u0632 <strong>\u06f1\u06f0\u06f0 \u0633\u0631\u0641\u0635\u0644 \u062f\u0642\u06cc\u0642 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc<\/strong> \u0627\u0633\u062a \u06a9\u0647 \u062a\u0645\u0627\u0645 \u062c\u0646\u0628\u0647\u200c\u0647\u0627\u06cc \u0632\u0628\u0627\u0646\u06cc \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u06cc\u06a9 \u0645\u0647\u0646\u062f\u0633 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0631\u0627 \u067e\u0648\u0634\u0634 \u0645\u06cc\u200c\u062f\u0647\u062f. \u0645\u0627 \u0627\u0632 \u0645\u0641\u0627\u0647\u06cc\u0645 \u067e\u0627\u06cc\u0647 \u0634\u0631\u0648\u0639 \u06a9\u0631\u062f\u0647 \u0648 \u0642\u062f\u0645 \u0628\u0647 \u0642\u062f\u0645 \u0634\u0645\u0627 \u0631\u0627 \u0628\u0647 \u0633\u0637\u062d \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0645\u06cc\u200c\u0631\u0633\u0627\u0646\u06cc\u0645. \u062f\u0631 \u0632\u06cc\u0631\u060c \u062a\u0646\u0647\u0627 \u0646\u0645\u0648\u0646\u0647\u200c\u0627\u06cc \u0627\u0632 \u0645\u0648\u0636\u0648\u0639\u0627\u062a \u0645\u062a\u0646\u0648\u0639\u06cc \u06a9\u0647 \u062f\u0631 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0628\u0647 \u0622\u0646\u200c\u0647\u0627 \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0631\u0627 \u0645\u0634\u0627\u0647\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u062f:<\/p>\n<h3>\u0628\u062e\u0634 \u0627\u0648\u0644: \u0645\u0628\u0627\u0646\u06cc \u0648 \u0648\u0627\u0698\u06af\u0627\u0646 \u06a9\u0644\u06cc\u062f\u06cc (Foundations &#038; Core Vocabulary)<\/h3>\n<ul>\n<li>The CIA Triad (Confidentiality, Integrity, Availability) in Engineering Contexts<\/li>\n<li>Differentiating between Threats, Vulnerabilities, and Risks<\/li>\n<li>Vocabulary of Access Control: Authentication vs. Authorization<\/li>\n<li>Understanding Malware Types Targeting Industrial Systems (e.g., Stuxnet)<\/li>\n<li>Essential Acronyms: OT, IT, ICS, SCADA, PLC, RTU<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u062f\u0648\u0645: \u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647 \u0648 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627 (Network &#038; Protocol Security)<\/h3>\n<ul>\n<li>Discussing Network Segmentation and Firewalls for OT Environments<\/li>\n<li>Technical Language for Analyzing TCP\/IP Packet Captures<\/li>\n<li>Comparing IT Protocols (HTTP, FTP) with OT Protocols (Modbus, DNP3)<\/li>\n<li>Describing Secure Remote Access Solutions (VPNs)<\/li>\n<li>Vocabulary for Intrusion Detection Systems (IDS) and Prevention Systems (IPS)<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u0633\u0648\u0645: \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 (Risk Assessment &#038; Management)<\/h3>\n<ul>\n<li>Language for Conducting a Vulnerability Assessment<\/li>\n<li>How to Write a Professional Penetration Testing Report<\/li>\n<li>Presenting a Risk Matrix: Likelihood vs. Impact<\/li>\n<li>Reading and Interpreting NIST Cybersecurity Framework (CSF) Documents<\/li>\n<li>Vocabulary of Compliance and Auditing (e.g., ISO 27001)<\/li>\n<\/ul>\n<h3>\u0628\u062e\u0634 \u0686\u0647\u0627\u0631\u0645: \u0645\u0647\u0627\u0631\u062a\u200c\u0647\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u06cc \u0648 \u062d\u0631\u0641\u0647\u200c\u0627\u06cc (Professional Communication Skills)<\/h3>\n<ul>\n<li>Writing Formal Emails to Report a Security Incident<\/li>\n<li>Developing and Presenting an Incident Response Plan (IRP)<\/li>\n<li>Participating in a Technical Debate: Security vs. Operational Availability<\/li>\n<li>Creating Clear and Concise Security Policy Documentation<\/li>\n<li>Communicating Technical Risks to a Non-Technical (Management) Audience<\/li>\n<\/ul>\n<p>&#8230; \u0648 \u062f\u0647\u200c\u0647\u0627 \u0633\u0631\u0641\u0635\u0644 \u062a\u062e\u0635\u0635\u06cc \u062f\u06cc\u06af\u0631 \u06a9\u0647 \u0634\u0645\u0627 \u0631\u0627 \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u062a\u0645\u0627\u0645\u200c\u0639\u06cc\u0627\u0631 \u062a\u0628\u062f\u06cc\u0644 \u062e\u0648\u0627\u0647\u062f \u06a9\u0631\u062f.<\/p>\n<p><strong>\u0647\u0645\u06cc\u0646 \u0627\u0645\u0631\u0648\u0632 \u0627\u0648\u0644\u06cc\u0646 \u0642\u062f\u0645 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0634\u06a9\u0633\u062a\u0646 \u0645\u0631\u0632\u0647\u0627\u06cc \u0632\u0628\u0627\u0646\u06cc \u0648 \u062a\u0628\u062f\u06cc\u0644 \u0634\u062f\u0646 \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0646\u062f\u0633 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u0637\u062d \u062c\u0647\u0627\u0646\u06cc \u0628\u0631\u062f\u0627\u0631\u06cc\u062f. \u0622\u06cc\u0646\u062f\u0647 \u0645\u0646\u062a\u0638\u0631 \u0634\u0645\u0627\u0633\u062a!<\/strong><\/p>\n<p><\/body><br \/>\n<\/html><\/div>\n<div\r\n    style=\"border: 2px dashed #4CAF50; border-radius: 16px; padding: 20px; background: #f9fff9; font-family: 'IRANSans', sans-serif;\">\r\n    <h2 style=\"color: #2E7D32; margin-top: 0;\">\ud83d\udcda \u0645\u062d\u062a\u0648\u0627\u06cc \u0627\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u0622\u0645\u0648\u0632\u0634\u06cc (\u067e\u06a9\u06cc\u062c \u06a9\u0627\u0645\u0644)<\/h2>\r\n    <div\r\n        style=\"background: #E8F5E9; border-radius: 12px; padding: 15px 20px; margin-bottom: 20px; border: 1px solid #A5D6A7;\">\r\n        <h3 style=\"color: #1B5E20; margin-top: 0;\">\ud83d\udca1 \u0627\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u06cc\u06a9 \u0646\u0633\u062e\u0647\u0654 \u06a9\u0627\u0645\u0644 \u0648 \u062c\u0627\u0645\u0639 \u0627\u0633\u062a<\/h3>\r\n        <p style=\"font-size:16px; line-height:1.8; color:#2E7D32; margin:0;\"> \u062a\u0645\u0627\u0645\u06cc \u0645\u062d\u062a\u0648\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc \u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628 \u062f\u0631 \u0642\u0627\u0644\u0628 \u06cc\u06a9\r\n            \u0628\u0633\u062a\u0647\u200c\u06cc \u06a9\u0627\u0645\u0644 \u0648 \u06cc\u06a9\u067e\u0627\u0631\u0686\u0647 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0634\u0627\u0645\u0644 \u062a\u0645\u0627\u0645 \u0646\u0633\u062e\u0647\u200c\u0647\u0627 \u0648 \u0641\u0627\u06cc\u0644\u200c\u0647\u0627\u06cc \u0645\u0648\u0631\u062f\u0646\u06cc\u0627\u0632 \u0628\u0631\u0627\u06cc \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0627\u0633\u062a. <\/p>\r\n    <\/div>\r\n    <h3 style=\"color: #2E7D32;\">\ud83c\udf81 \u0645\u062d\u062a\u0648\u06cc\u0627\u062a \u06a9\u0627\u0645\u0644 \u0628\u0633\u062a\u0647 \u062f\u0627\u0646\u0644\u0648\u062f\u06cc<\/h3>\r\n\r\n\t\r\n<ul style=\"list-style-type: '\u2705 '; padding-left: 20px; font-size: 16px; line-height: 1.8;\">\r\n    <li><strong>\u0648\u06cc\u062f\u06cc\u0648\u0647\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc \u0641\u0627\u0631\u0633\u06cc<\/strong> \u2014 \u0622\u0645\u0648\u0632\u0634 \u0642\u062f\u0645\u200c\u0628\u0647\u200c\u0642\u062f\u0645\u060c \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648 \u0642\u0627\u0628\u0644 \u0641\u0647\u0645<\/li>\r\n    <li><strong>\u067e\u0627\u062f\u06a9\u0633\u062a\u200c\u0647\u0627\u06cc \u0635\u0648\u062a\u06cc \u0641\u0627\u0631\u0633\u06cc<\/strong> \u2014 \u062a\u0648\u0636\u06cc\u062d \u0645\u0641\u0627\u0647\u06cc\u0645 \u06a9\u0644\u06cc\u062f\u06cc \u0648 \u0646\u06a9\u0627\u062a \u062a\u06a9\u0645\u06cc\u0644\u06cc<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 PDF \u0641\u0627\u0631\u0633\u06cc<\/strong> \u2014 \u0634\u0627\u0645\u0644 \u06a9\u0644\u06cc\u0647\u0654 \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627 \u0648 \u0645\u062d\u062a\u0648\u0627\u06cc \u0622\u0645\u0648\u0632\u0634\u06cc<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 \u062e\u0644\u0627\u0635\u0647 \u0646\u06a9\u0627\u062a \u0648\u06cc\u062f\u06cc\u0648\u0647\u0627 \u0648 \u067e\u0627\u062f\u06a9\u0633\u062a\u200c\u0647\u0627 \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong> \u2014 \u0645\u0646\u0627\u0633\u0628 \u0645\u0631\u0648\u0631 \u0633\u0631\u06cc\u0639 \u0648 \u062c\u0645\u0639\u200c\u0628\u0646\u062f\u06cc \u0645\u0628\u0627\u062d\u062b<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u0646\u06a9\u062a\u0647 \u0641\u0627\u0631\u0633\u06cc (\u062e\u0648\u062f\u0645\u0648\u0646\u06cc) \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong> \u2014 \u0632\u0628\u0627\u0646 \u0633\u0627\u062f\u0647 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc<\/li>\r\n    <li><strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u0646\u06a9\u062a\u0647 \u0631\u0633\u0645\u06cc \u0641\u0627\u0631\u0633\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong> \u2014 \u0646\u06af\u0627\u0631\u0634 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u060c \u0639\u0644\u0645\u06cc \u0648 \u0645\u0646\u0627\u0633\u0628 \u0686\u0627\u067e<\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u067e\u0631\u0633\u0634 \u0648 \u067e\u0627\u0633\u062e \u062a\u0634\u0631\u06cc\u062d\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong><br>\r\n        \u2014 \u0647\u0631 \u0633\u0624\u0627\u0644 \u0628\u0644\u0627\u0641\u0627\u0635\u0644\u0647 \u0647\u0645\u0631\u0627\u0647 \u0628\u0627 \u067e\u0627\u0633\u062e \u06a9\u0627\u0645\u0644 \u0648 \u0634\u0641\u0627\u0641 \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a\u061b \u0645\u0646\u0627\u0633\u0628 \u062f\u0631\u06a9 \u0639\u0645\u06cc\u0642 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0648 \u0631\u0641\u0639 \u0627\u0628\u0647\u0627\u0645.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u067e\u0631\u0633\u0634 \u0648 \u067e\u0627\u0633\u062e \u0686\u0647\u0627\u0631\u06af\u0632\u06cc\u0646\u0647\u200c\u0627\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF (\u0646\u0633\u062e\u0647 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0633\u0631\u06cc\u0639)<\/strong><br>\r\n        \u2014 \u067e\u0627\u0633\u062e\u200c\u0647\u0627 \u0628\u0644\u0627\u0641\u0627\u0635\u0644\u0647 \u067e\u0633 \u0627\u0632 \u0633\u0624\u0627\u0644 \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f\u061b \u0645\u0646\u0627\u0633\u0628 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0633\u0631\u06cc\u0639 \u0648 \u062a\u062b\u0628\u06cc\u062a \u0645\u0637\u0627\u0644\u0628.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u0635\u062f\u0647\u0627 \u067e\u0631\u0633\u0634 \u0648 \u067e\u0627\u0633\u062e \u0686\u0647\u0627\u0631\u06af\u0632\u06cc\u0646\u0647\u200c\u0627\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF (\u0646\u0633\u062e\u0647 \u062e\u0648\u062f\u0622\u0632\u0645\u0627\u06cc\u06cc \u067e\u0627\u06cc\u0627\u0646\u200c\u0628\u062e\u0634)<\/strong><br>\r\n        \u2014 \u067e\u0627\u0633\u062e\u200c\u0647\u0627 \u062f\u0631 \u0627\u0646\u062a\u0647\u0627\u06cc \u0647\u0631 \u0628\u062e\u0634 \u0622\u0645\u062f\u0647\u200c\u0627\u0646\u062f\u061b \u0645\u0646\u0627\u0633\u0628 \u0622\u0632\u0645\u0648\u0646 \u0648\u0627\u0642\u0639\u06cc \u0648 \u0633\u0646\u062c\u0634 \u0645\u06cc\u0632\u0627\u0646 \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627\u06cc \u062f\u0631\u0633\u062a \/ \u0646\u0627\u062f\u0631\u0633\u062a (True \/ False) \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong><br>\r\n        \u2014 \u0645\u0646\u0627\u0633\u0628 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0642\u062a \u0645\u0641\u0647\u0648\u0645\u06cc \u0648 \u062a\u0634\u062e\u06cc\u0635 \u0635\u062d\u06cc\u062d \u06cc\u0627 \u0646\u0627\u062f\u0631\u0633\u062a \u0628\u0648\u062f\u0646 \u06af\u0632\u0627\u0631\u0647\u200c\u0647\u0627.\r\n    <\/li>\r\n\r\n    <li>\r\n        <strong>\u06a9\u062a\u0627\u0628 \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627\u06cc \u062c\u0627\u06cc \u062e\u0627\u0644\u06cc \u2013 \u0646\u0633\u062e\u0647 PDF<\/strong><br>\r\n        \u2014 \u062a\u0642\u0648\u06cc\u062a \u06cc\u0627\u062f\u06af\u06cc\u0631\u06cc \u0641\u0639\u0627\u0644 \u0648 \u062a\u0633\u0644\u0637 \u0628\u0631 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0648 \u0627\u0635\u0637\u0644\u0627\u062d\u0627\u062a \u06a9\u0644\u06cc\u062f\u06cc.\r\n    <\/li>\r\n<\/ul>\r\n\t\r\n\t\r\n\t\r\n\t\r\n    <p style=\"color: #388E3C; font-weight: bold; font-size: 18px; margin-top: 20px;\"> \ud83c\udfaf \u0627\u06cc\u0646 \u0628\u0633\u062a\u0647 \u06cc\u06a9 \u062f\u0648\u0631\u0647\u0654 \u0622\u0645\u0648\u0632\u0634\u06cc \u06a9\u0627\u0645\u0644 \u0648\r\n        \u0686\u0646\u062f\u0644\u0627\u06cc\u0647 \u0627\u0633\u062a\u061b \u0634\u0627\u0645\u0644 \u0622\u0645\u0648\u0632\u0634 \u062a\u0635\u0648\u06cc\u0631\u06cc\u060c \u0635\u0648\u062a\u06cc\u060c \u06a9\u062a\u0627\u0628\u200c\u0647\u0627\u060c \u062a\u0645\u0631\u06cc\u0646\u200c\u0647\u0627   \u0648 \u062e\u0648\u062f\u0622\u0632\u0645\u0627\u06cc\u06cc . <\/p>\r\n    <hr style=\"border: none; border-top: 1px dashed #81C784; margin: 20px 0;\">\r\n    <h3 style=\"color: #2E7D32;\">\u2139\ufe0f \u0646\u06a9\u0627\u062a \u0645\u0647\u0645 \u0647\u0646\u06af\u0627\u0645 \u062e\u0631\u06cc\u062f<\/h3>\r\n    <ul style=\"list-style-type: '\ud83d\udd38 '; padding-left: 20px; font-size: 15px; line-height: 1.9;\">\r\n        <li>\u0627\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u0628\u0647 \u0635\u0648\u0631\u062a <strong>\u0641\u0627\u06cc\u0644 \u062f\u0627\u0646\u0644\u0648\u062f\u06cc \u06a9\u0627\u0645\u0644<\/strong> \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0646\u0633\u062e\u0647\u0654 \u0686\u0627\u067e\u06cc \u0646\u062f\u0627\u0631\u062f.<\/li>\r\n        <li>\u062a\u0645\u0627\u0645\u06cc \u0641\u0627\u06cc\u0644\u200c\u0647\u0627 \u0648 \u06a9\u062a\u0627\u0628\u200c\u0647\u0627 <strong>\u06a9\u0627\u0645\u0644\u0627\u064b \u0641\u0627\u0631\u0633\u06cc<\/strong> \u0647\u0633\u062a\u0646\u062f.<\/li>\r\n        <li><strong>\u062a\u0648\u062c\u0647:<\/strong> \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627\u06cc \u0627\u062e\u062a\u0635\u0627\u0635\u06cc \u062f\u0648\u0631\u0647 \u0637\u06cc <strong>\u06f4\u06f8 \u0633\u0627\u0639\u062a<\/strong> \u067e\u0633 \u0627\u0632 \u062b\u0628\u062a \u0633\u0641\u0627\u0631\u0634 \u0627\u0631\u0633\u0627\u0644 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f.<\/li>\r\n        <li>\u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062f\u0631\u062c \u0634\u0645\u0627\u0631\u0647 \u0645\u0648\u0628\u0627\u06cc\u0644 \u0646\u06cc\u0633\u062a\u061b \u0627\u0645\u0627 \u0628\u0631\u0627\u06cc \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0633\u0631\u06cc\u0639\u200c\u062a\u0631 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.<\/li>\r\n        <li>\u062f\u0631 \u0635\u0648\u0631\u062a \u0628\u0631\u0648\u0632 \u0645\u0634\u06a9\u0644 \u062f\u0631 \u062f\u0627\u0646\u0644\u0648\u062f \u0628\u0627 \u0634\u0645\u0627\u0631\u0647 <strong>09395106248<\/strong> \u062a\u0645\u0627\u0633 \u0628\u06af\u06cc\u0631\u06cc\u062f.<\/li>\r\n        <li>\u0627\u06af\u0631 \u067e\u0631\u062f\u0627\u062e\u062a \u0627\u0646\u062c\u0627\u0645 \u0634\u062f\u0647 \u0648\u0644\u06cc \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627 \u0631\u0627 \u062f\u0631\u06cc\u0627\u0641\u062a \u0646\u06a9\u0631\u062f\u0647\u200c\u0627\u06cc\u062f\u060c \u0646\u0627\u0645 \u0648 \u0646\u0627\u0645 \u062e\u0627\u0646\u0648\u0627\u062f\u06af\u06cc \u0648 \u0646\u0627\u0645 \u0645\u062d\u0635\u0648\u0644 \u0631\u0627 \u067e\u06cc\u0627\u0645\u06a9 \u06a9\u0646\u06cc\u062f \u062a\u0627\r\n            \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627 \u062f\u0648\u0628\u0627\u0631\u0647 \u0627\u0631\u0633\u0627\u0644 \u0634\u0648\u0646\u062f.<\/li>\r\n    <\/ul>\r\n    <p style=\"font-size: 16px; line-height: 1.8; margin-top: 15px;\"> \ud83d\udcac \u0631\u0627\u0647\u200c\u0647\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637\u06cc \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc:<br> \u0648\u0627\u062a\u0633\u200c\u0627\u067e \u06cc\u0627 \u067e\u06cc\u0627\u0645\u06a9:\r\n        <strong>09395106248<\/strong><br> \u062a\u0644\u06af\u0631\u0627\u0645: <strong>@ma_limbs<\/strong> <\/p>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646: \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u067e\u0644 \u0648\u0631\u0648\u062f \u0628\u0647 \u062f\u0646\u06cc\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062c\u0647\u0627\u0646\u06cc: \u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0634\u06a9\u0627\u0641 \u0632\u0628\u0627\u0646\u06cc \u0631\u0627 \u067e\u0631 \u06a9\u0646\u06cc\u062f \u0648 \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u062f\u0631 \u0627\u0645\u0646\u06cc\u062a&#8230;<\/p>\n","protected":false},"featured_media":67493,"comment_status":"open","ping_status":"closed","template":"","meta":{"pmpro_default_level":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"product_cat":[223616,1221,231001],"product_tag":[630,34640,243734,231006,227957,3149,233985,501,6702,235091,77483,250288,34632,263019,263020],"class_list":{"0":"post-318839","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-223616","7":"product_cat-1221","8":"product_cat-231001","9":"product_tag-cybersecurity","10":"product_tag-engineering-systems","11":"product_tag-english-for-cybersecurity","12":"product_tag-english-for-engineers","13":"product_tag-technical-english","14":"product_tag-3149","15":"product_tag-233985","16":"product_tag-501","17":"product_tag-6702","18":"product_tag-235091","19":"product_tag-77483","20":"product_tag-250288","21":"product_tag-34632","22":"product_tag-263019","23":"product_tag-263020","24":"pmpro-has-access","25":"desktop-align-left","26":"tablet-align-left","27":"mobile-align-left","29":"first","30":"instock","31":"shipping-taxable","32":"purchasable","33":"product-type-variable"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/\" \/>\n<meta property=\"og:locale\" content=\"fa_IR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\" \/>\n<meta property=\"og:description\" content=\"\u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646: \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u067e\u0644 \u0648\u0631\u0648\u062f \u0628\u0647 \u062f\u0646\u06cc\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062c\u0647\u0627\u0646\u06cc: \u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0634\u06a9\u0627\u0641 \u0632\u0628\u0627\u0646\u06cc \u0631\u0627 \u067e\u0631 \u06a9\u0646\u06cc\u062f \u0648 \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u062f\u0631 \u0627\u0645\u0646\u06cc\u062a...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-21T11:06:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/express24.ir\/d\/wp-content\/uploads\/2025\/05\/Express24_ir.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 \u062f\u0642\u06cc\u0642\u0647\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/\",\"url\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/\",\"name\":\"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\",\"isPartOf\":{\"@id\":\"https:\/\/express24.ir\/d\/#website\"},\"datePublished\":\"2025-12-04T18:28:29+00:00\",\"dateModified\":\"2025-12-21T11:06:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/#breadcrumb\"},\"inLanguage\":\"fa-IR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u062e\u0627\u0646\u0647\",\"item\":\"https:\/\/express24.ir\/d\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647\",\"item\":\"https:\/\/express24.ir\/d\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/express24.ir\/d\/#website\",\"url\":\"https:\/\/express24.ir\/d\/\",\"name\":\"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/express24.ir\/d\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fa-IR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/","og_locale":"fa_IR","og_type":"article","og_title":"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","og_description":"\u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646: \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u067e\u0644 \u0648\u0631\u0648\u062f \u0628\u0647 \u062f\u0646\u06cc\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062c\u0647\u0627\u0646\u06cc: \u062f\u0648\u0631\u0647 \u062a\u062e\u0635\u0635\u06cc \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u0634\u06a9\u0627\u0641 \u0632\u0628\u0627\u0646\u06cc \u0631\u0627 \u067e\u0631 \u06a9\u0646\u06cc\u062f \u0648 \u0628\u0647 \u06cc\u06a9 \u0645\u062a\u062e\u0635\u0635 \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u062f\u0631 \u0627\u0645\u0646\u06cc\u062a...","og_url":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/","og_site_name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","article_modified_time":"2025-12-21T11:06:35+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/express24.ir\/d\/wp-content\/uploads\/2025\/05\/Express24_ir.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646":"4 \u062f\u0642\u06cc\u0642\u0647"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/","url":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/","name":"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc - \u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","isPartOf":{"@id":"https:\/\/express24.ir\/d\/#website"},"datePublished":"2025-12-04T18:28:29+00:00","dateModified":"2025-12-21T11:06:35+00:00","breadcrumb":{"@id":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/#breadcrumb"},"inLanguage":"fa-IR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/express24.ir\/d\/product\/supercourse-0000016436\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u062e\u0627\u0646\u0647","item":"https:\/\/express24.ir\/d\/"},{"@type":"ListItem","position":2,"name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647","item":"https:\/\/express24.ir\/d\/"},{"@type":"ListItem","position":3,"name":"\u06a9\u062a\u0627\u0628 \u0632\u0628\u0627\u0646 \u0627\u0646\u06af\u0644\u06cc\u0633\u06cc \u0628\u0631\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u0627\u0646 \u062f\u0631 \u062f\u0631\u06a9 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f \u0645\u0641\u0627\u0647\u06cc\u0645 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc"}]},{"@type":"WebSite","@id":"https:\/\/express24.ir\/d\/#website","url":"https:\/\/express24.ir\/d\/","name":"\u0641\u0631\u0648\u0634\u06af\u0627\u0647 \u0627\u06a9\u0633\u067e\u0631\u0633","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/express24.ir\/d\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fa-IR"}]}},"_links":{"self":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product\/318839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/comments?post=318839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/media\/67493"}],"wp:attachment":[{"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/media?parent=318839"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product_cat?post=318839"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/express24.ir\/d\/wp-json\/wp\/v2\/product_tag?post=318839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}