در حال حاضر محصولی در سبد خرید شما وجود ندارد.
As a pentester, you need to understand the inner workings of many different types of cyberattacks. The more you know about an attacker’s chosen tools and techniques, the better odds you’ll have to successfully stop them. Join ethical hacker Clint Kehr as he guides you through the basic concepts of ethical hacking, shows you how to leverage advanced-level exploitation techniques, and demonstrates the skills you need to know to tackle certification exams such as the Offensive Security Certified Professional (OSCP) certification exam. Learn how to adopt the mindset of a hacker, and how to use a variety of tools and techniques, including network protocols, web app pentesting, buffer overflows, public exploits, shells, privilege escalation, password cracking, brute-forcing, and more.
Note: This course was created by Cybrary, and the labs referenced throughout the course are only available on the Cybrary platform. We are pleased to host this training in our library.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Developing Ethical Hacking Tools with Python
Privileged Access Management
Advanced Cyber Threat Intelligence
Certified Information Systems Auditor (CISA) Cert Prep
Linux Hardening
IoT Product Security
PowerShell for Security Professionals
Advanced Malware Analysis: Redux
Computer Hacking Forensics Investigator (CHFI) Cert Prep