در حال حاضر محصولی در سبد خرید شما وجود ندارد.
You've likely done everything you can to logically secure your systems. But how can you be sure that you’re fully protected from an attack? This course provides an overview of one of the most important skills for today’s IT security professional: penetration testing, the process of testing a computer, system, network, or application to evaluate its ability to withstand an attack. Cybersecurity expert Lisa Bock reviews the key differences between known and unknown tests, manual and automated tests, announced and unannounced tests, and more. Gather tips and pointers designed to help you get up and running, so you can choose the types of tests that will work best for you. Along the way, learn how to wield cutting-edge reconnaissance tools like scanners, password crackers, search engines, list makers, and APIs to deliver consistent, time-sensitive test results. By the end of this course, you’ll be equipped with new techniques and testing blueprints for Wi-Fi, networks, websites, email, VoIP, cloud-native services, mobile infrastructure, human firewalls, and beyond.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
آموزش رفع عیب شبکه با Wireshark
Securing the IoT: Privacy
کورس یادگیری رمزنگاری و امنیت شبکه
مبانی امنیت IT : پیاده سازی امنیت سیستم
IT Security Foundations: Network Security
Cisco Certified Cyberops Associate Cert Prep: 4 تجزیه و تحلیل نفوذ شبکه
فیلم یادگیری Ethical Hacking: System Hacking
فیلم یادگیری Ethical Hacking: Vulnerability Analysis
Ethical Hacking: Footprinting and Reconnaissance
Cisco Network Security: Cisco Firewall Technologies