{"id":572,"date":"2025-08-29T22:00:36","date_gmt":"2025-08-29T18:30:36","guid":{"rendered":"https:\/\/rayka-co.ir\/new\/?post_type=product&#038;p=572"},"modified":"2025-12-24T04:16:36","modified_gmt":"2025-12-24T00:46:36","slug":"comptia-security","status":"publish","type":"product","link":"https:\/\/rayka-co.ir\/new\/product\/comptia-security\/","title":{"rendered":"CompTIA Security+ SY0-501"},"content":{"rendered":"<div style=\"direction: rtl; text-align: right; font-family: Vazir, Tahoma, sans-serif; line-height: 1.8; padding: 20px;\">\n<p><!-- \u0648\u06cc\u062f\u06cc\u0648 \u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<div style=\"position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;\"><iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" src=\"https:\/\/www.aparat.com\/video\/video\/embed\/videohash\/J8A9y\/vt\/frame\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><br \/>\n<\/iframe><\/div>\n<\/div>\n<p><!-- \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062f\u0648\u0631\u0647 --><\/p>\n<h2 style=\"margin-bottom: 1em;\">\u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062f\u0648\u0631\u0647<\/h2>\n<p><!-- Introduction to Security --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0645\u0642\u062f\u0645\u0647\u200c\u0627\u06cc \u0628\u0631 \u0627\u0645\u0646\u06cc\u062a<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0627\u0648\u0644\u06cc\u0647 \u0627\u0645\u0646\u06cc\u062a \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0647\u062f\u06cc\u062f\u0647\u0627 \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f. \u0647\u0645\u0686\u0646\u06cc\u0646 \u062f\u0633\u062a\u0647\u200c\u0628\u0646\u062f\u06cc \u0647\u06a9\u0631\u0647\u0627\u06cc \u0627\u06cc\u0646\u062a\u0631\u0646\u062a\u06cc \u0628\u0631 \u0627\u0633\u0627\u0633 \u0645\u0647\u0627\u0631\u062a \u0648 \u0627\u0646\u06af\u06cc\u0632\u0647 \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Computer Systems Security Part I --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631\u06cc (\u0628\u062e\u0634 \u0627\u0648\u0644)<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0645\u0639\u0631\u0641\u06cc \u0627\u0646\u0648\u0627\u0639 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u0645\u0627\u0646\u0646\u062f \u0648\u06cc\u0631\u0648\u0633\u060c \u06a9\u0631\u0645\u060c \u062a\u0631\u0648\u062c\u0627\u0646\u060c \u0648 \u062c\u0627\u0633\u0648\u0633 \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0648 \u0686\u06af\u0648\u0646\u06af\u06cc \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0645\u0642\u0627\u0628\u0644\u0647 \u0628\u0627 \u0622\u0646\u0647\u0627 \u0631\u0627 \u062a\u0648\u0636\u06cc\u062d \u0645\u06cc\u200c\u062f\u0647\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Computer Systems Security Part II --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631\u06cc (\u0628\u062e\u0634 \u062f\u0648\u0645)<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0627 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u0646\u0646\u062f \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0648 IPS \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f \u0648 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u200c\u0633\u0627\u0632\u06cc \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0633\u062e\u062a\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u0645\u0627\u0646\u0646\u062f BIOS \u0648 \u0645\u0648\u0628\u0627\u06cc\u0644 \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- OS Hardening and Virtualization --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0645\u0646\u200c\u0633\u0627\u0632\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0639\u0627\u0645\u0644 \u0648 \u0645\u062c\u0627\u0632\u06cc\u200c\u0633\u0627\u0632\u06cc<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0627\u0645\u0646\u200c\u0633\u0627\u0632\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0639\u0627\u0645\u0644 \u0648 \u0645\u0641\u0647\u0648\u0645 \u0645\u062c\u0627\u0632\u06cc\u200c\u0633\u0627\u0632\u06cc \u06a9\u0647 \u06a9\u0627\u0631\u0628\u0631\u062f \u06af\u0633\u062a\u0631\u062f\u0647\u200c\u0627\u06cc \u062f\u0627\u0631\u062f\u060c \u0627\u062e\u062a\u0635\u0627\u0635 \u062f\u0627\u0631\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Application Security --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0645\u0646\u06cc\u062a \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0627\u0645\u0646\u200c\u0633\u0627\u0632\u06cc \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc\u06cc \u0645\u0627\u0646\u0646\u062f browser \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0631\u06a9\u0646 \u0627\u0635\u0644\u06cc \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u060c \u06cc\u0639\u0646\u06cc \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0646\u0648\u06cc\u0633\u06cc \u0627\u0645\u0646\u060c \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Network Design Elements --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0645\u0648\u0644\u0641\u0647\u200c\u0647\u0627\u06cc \u0637\u0631\u0627\u062d\u06cc \u0634\u0628\u06a9\u0647<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0645\u0639\u0631\u0641\u06cc \u0645\u0648\u0644\u0641\u0647\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0645\u0627\u0646\u0646\u062f \u0633\u0648\u06cc\u06cc\u0686 \u0648 \u0631\u0648\u062a\u0631 \u0627\u062e\u062a\u0635\u0627\u0635 \u062f\u0627\u0631\u062f \u0648 \u0645\u0641\u0627\u0647\u06cc\u0645 \u0627\u0648\u0644\u06cc\u0647 \u0634\u0628\u06a9\u0647 \u0631\u0627 \u067e\u0648\u0634\u0634 \u0645\u06cc\u200c\u062f\u0647\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Networking Protocols and Threats --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0648 \u062a\u0647\u062f\u06cc\u062f\u0647\u0627<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u067e\u0648\u0631\u062a \u0648 \u067e\u0631\u0648\u062a\u06a9\u0644 \u0648 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0622\u0646\u0647\u0627 \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Network Perimeter Security --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0645\u0646\u06cc\u062a \u0645\u062d\u06cc\u0637 \u067e\u06cc\u0631\u0627\u0645\u0648\u0646\u06cc \u0634\u0628\u06a9\u0647<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0628\u0631\u0631\u0633\u06cc \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0645\u0647\u0645 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0645\u0627\u0646\u0646\u062f \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0648 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0648 \u0645\u0645\u0627\u0646\u0639\u062a \u0627\u0632 \u0646\u0641\u0648\u0630 \u0645\u06cc\u200c\u067e\u0631\u062f\u0627\u0632\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Securing Network Media and Devices --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0645\u0646\u200c\u0633\u0627\u0632\u06cc \u0631\u0633\u0627\u0646\u0647\u200c\u0647\u0627 \u0648 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0645\u0642\u0627\u06cc\u0633\u0647 \u0627\u0645\u0646\u06cc\u062a \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u0628\u0627\u0633\u06cc\u0645 \u0648 \u0628\u06cc\u200c\u0633\u06cc\u0645 \u0648 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u062d\u0641\u0627\u0638\u062a \u0627\u0632 \u0622\u0646\u0647\u0627 \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Physical Security and Authentication Models --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0645\u0646\u06cc\u062a \u0641\u06cc\u0632\u06cc\u06a9\u06cc \u0648 \u0645\u062f\u0644\u200c\u0647\u0627\u06cc \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0645\u0628\u0627\u062d\u062b \u0627\u0645\u0646\u06cc\u062a \u0641\u06cc\u0632\u06cc\u06a9\u06cc \u0648 \u0645\u062f\u0644\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u062e\u062a\u0635\u0627\u0635 \u062f\u0627\u0631\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Access Control Methods and Models --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0631\u0648\u0634\u200c\u0647\u0627 \u0648 \u0645\u062f\u0644\u200c\u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0686\u06af\u0648\u0646\u06af\u06cc \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Vulnerability and Risk Assessment --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0648 \u0631\u06cc\u0633\u06a9<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0645\u0628\u0627\u062d\u062b \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc \u062f\u0631 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0628\u0627 \u062a\u0645\u0631\u06a9\u0632 \u0628\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0648 \u06a9\u0646\u062a\u0631\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u06cc\u200c\u067e\u0631\u062f\u0627\u0632\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Monitoring and Auditing --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0645\u0627\u0646\u06cc\u062a\u0648\u0631\u06cc\u0646\u06af \u0648 \u0628\u0627\u0632\u0631\u0633\u06cc<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0686\u06af\u0648\u0646\u06af\u06cc \u0645\u0627\u0646\u06cc\u062a\u0648\u0631\u06cc\u0646\u06af \u0648 \u0628\u0627\u0632\u0631\u0633\u06cc \u0634\u0627\u062e\u0635\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 \u0633\u0627\u0632\u0645\u0627\u0646 \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Encryption and Hashing Concepts --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0645\u0641\u0627\u0647\u06cc\u0645 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0648 Hashing<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0645\u0639\u0631\u0641\u06cc \u0627\u0646\u0648\u0627\u0639 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc \u0648 \u0645\u0641\u0627\u0647\u06cc\u0645 Hashing \u0627\u062e\u062a\u0635\u0627\u0635 \u062f\u0627\u0631\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- PKI and Encryption Protocols --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>PKI \u0648 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0627 \u0627\u0645\u0636\u0627\u0621 \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644\u060c \u06a9\u0627\u0631\u0628\u0631\u062f certificate\u060c \u0648 \u062c\u0632\u0626\u06cc\u0627\u062a \u0628\u06cc\u0634\u062a\u0631 \u062f\u0631 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Redundancy and Disaster Recovery --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0627\u0641\u0632\u0648\u0646\u06af\u06cc \u0648 \u0628\u0627\u0632\u06cc\u0627\u0628\u06cc \u067e\u0633 \u0627\u0632 \u0641\u0627\u062c\u0639\u0647<\/h3>\n<p>\u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0647 \u0645\u0641\u0647\u0648\u0645 Redundancy \u0648 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0622\u0646 \u062f\u0631 \u0633\u0637\u062d \u0628\u0631\u0642 \u0628\u0627 UPS \u0648 \u0698\u0646\u0631\u0627\u062a\u0648\u0631 \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0646\u0648\u0627\u0639 RAID \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Social Engineering, User Education, and Facilities Security --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>\u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc\u060c \u0622\u0645\u0648\u0632\u0634 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646\u060c \u0648 \u0627\u0645\u0646\u06cc\u062a \u062a\u0627\u0633\u06cc\u0633\u0627\u062a<\/h3>\n<p>\u062f\u0631 \u0627\u06cc\u0646 \u0628\u062e\u0634 \u0628\u0627 \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc\u060c \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0645\u0642\u0627\u0628\u0644\u0647 \u0628\u0627 \u0622\u0646\u060c \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0627\u0637\u0641\u0627\u0621 \u0648 \u0627\u0639\u0644\u0627\u0645 \u062d\u0631\u06cc\u0642 \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<article class=\"text-token-text-primary w-full focus:outline-none scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-testid=\"conversation-turn-2\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<p data-start=\"0\" data-end=\"432\">\u062f\u0631 \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u0645\u0641\u0627\u0647\u06cc\u0645 \u067e\u0627\u06cc\u0647 \u0648 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0645\u0646\u06cc\u062a \u0628\u0647\u200c\u0635\u0648\u0631\u062a \u062c\u0627\u0645\u0639 \u0622\u0645\u0648\u0632\u0634 \u062f\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f\u061b \u0627\u0632 \u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a\u060c \u0627\u0646\u0648\u0627\u0639 \u0647\u06a9\u0631\u0647\u0627 \u0648 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u0647\u0627 \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u0646\u0646\u062f \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0648 IPS \u0648 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u200c\u0633\u0627\u0632\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0639\u0627\u0645\u0644\u060c \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0648 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a \u0634\u0628\u06a9\u0647. \u0647\u0645\u0686\u0646\u06cc\u0646 \u0645\u0628\u0627\u062d\u062b\u06cc \u0647\u0645\u0686\u0648\u0646 \u0627\u0645\u0646\u06cc\u062a \u0641\u06cc\u0632\u06cc\u06a9\u06cc\u060c \u0645\u062f\u0644\u200c\u0647\u0627\u06cc \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a\u060c \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc\u060c \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9\u060c \u0645\u0627\u0646\u06cc\u062a\u0648\u0631\u06cc\u0646\u06af \u0648 \u0628\u0627\u0632\u0631\u0633\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u067e\u0648\u0634\u0634 \u062f\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f. \u062f\u0631 \u0628\u062e\u0634 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 Hashing\u060c \u0627\u0645\u0636\u0627\u06cc \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644 \u0648 PKI \u0622\u0634\u0646\u0627 \u062e\u0648\u0627\u0647\u06cc\u062f \u0634\u062f \u0648 \u062f\u0631 \u0627\u062f\u0627\u0645\u0647 \u0627\u0641\u0632\u0648\u0646\u06af\u06cc \u062f\u0631 \u0633\u0637\u062d \u062f\u0627\u062f\u0647 \u0648 \u062a\u062c\u0647\u06cc\u0632\u0627\u062a\u060c \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u0648 \u062d\u062a\u06cc \u0645\u0628\u0627\u062d\u062b \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0622\u0645\u0648\u0632\u0634 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0648 \u0627\u0645\u0646\u06cc\u062a \u0641\u06cc\u0632\u06cc\u06a9\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u06af\u0631\u062f\u062f. \u0627\u06cc\u0646 \u062f\u0648\u0631\u0647 \u062a\u0635\u0648\u06cc\u0631\u06cc \u06a9\u0644\u06cc \u0648 \u062f\u0631\u0639\u06cc\u0646\u200c\u062d\u0627\u0644 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0627\u0632 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u0647\u0645 \u0628\u0631\u0627\u06cc \u062a\u0627\u0632\u0647\u200c\u0648\u0627\u0631\u062f\u0647\u0627 \u0648 \u0647\u0645 \u0628\u0631\u0627\u06cc \u0627\u0641\u0631\u0627\u062f \u0628\u0627\u062a\u062c\u0631\u0628\u0647 \u0645\u0641\u06cc\u062f \u062e\u0648\u0627\u0647\u062f \u0628\u0648\u062f.<\/p>\n<\/article>\n","protected":false},"featured_media":573,"comment_status":"open","ping_status":"closed","template":"","meta":[],"pwb-brand":[29],"product_brand":[],"product_cat":[85],"product_tag":[],"class_list":{"0":"post-572","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"pwb-brand-majid-asadpoor","7":"product_cat-comptia","8":"post","10":"first","11":"instock","12":"downloadable","13":"virtual","14":"purchasable","15":"product-type-simple"},"brands":[{"id":29,"name":"\u0645\u062c\u06cc\u062f \u0627\u0633\u062f\u067e\u0648\u0631","slug":"majid-asadpoor"}],"_links":{"self":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product\/572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/comments?post=572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/media\/573"}],"wp:attachment":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/media?parent=572"}],"wp:term":[{"taxonomy":"pwb-brand","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/pwb-brand?post=572"},{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_brand?post=572"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_cat?post=572"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_tag?post=572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}