در حال حاضر محصولی در سبد خرید شما وجود ندارد.
The Internet of Things (IoT) connects people, infrastructure, and things. Businesses and consumers recognize the value of integrating IoT products and systems into their infrastructure, and manufacturers continue to develop devices to join the Internet of Things. However, many devices are insecure, which can result in an attack with devastating consequences. Malicious actors can leverage IoT vulnerabilities to launch attacks, such as infecting devices with malware, creating an IoT botnet, and denying sleep.
In this course, security ambassador Lisa Bock covers why it’s essential to consider the many security issues when dealing with the IoT. She then reinforces why testing for vulnerabilities before implementation is critical and describes reasons why it is key for companies to design devices with security in mind. Finally, Lisa reviews some key considerations for selecting and securing your IoT device and outlines ways to deploy effective countermeasures to prevent an attack.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Ethical Hacking: Scanning Networks
Learning Penetration Testing
کورس یادگیری Ethical Hacking: Introduction to Ethical Hacking
کورس یادگیری کامل Ethical Hacking: Penetration Testing
Cisco Network Security: Cisco Firewall Technologies
فیلم یادگیری Ethical Hacking: Vulnerability Analysis
IT Security Foundations: Network Security
مبانی امنیت IT : پیاده سازی امنیت سیستم
کورس یادگیری کامل Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures
Ethical Hacking: Sniffers