در حال حاضر محصولی در سبد خرید شما وجود ندارد.
Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
کورس یادگیری Cisco Certified CyberOps Associate (200-201) Cert Prep: 4 Network Intrusion Analysis
Securing the IoT: Privacy
فیلم یادگیری Wireshark: Packet Loss and Recovery
کورس یادگیری Ethical Hacking Sniffers
آموزش رفع عیب شبکه با Wireshark
فیلم یادگیری کامل Cisco Certified CyberOps Associate Cert Prep: 3 Host-Based Analysis
Ethical Hacking: Introduction to Ethical Hacking
IT Security Foundations: Network Security
Learning Penetration Testing
Securing the IoT: Security Risks
✨ تا ۷۰% تخفیف با شارژ کیف پول 🎁
مشاهده پلن ها