در حال حاضر محصولی در سبد خرید شما وجود ندارد.
The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
IT Security Foundations: Network Security
Cisco Network Security: Cisco Firewall Technologies
مبانی امنیت IT : پیاده سازی امنیت سیستم
Ethical Hacking: Footprinting and Reconnaissance
امنیت شبکه سیسکو: مفاهیم امنیتی
Wireshark: Advanced Tools and Techniques
Securing the IoT: Security Risks
فیلم یادگیری Ethical Hacking: Vulnerability Analysis
فیلم یادگیری Wireshark: Packet Loss and Recovery
آموزش مبانی امنیت شبکه
✨ تا ۷۰% تخفیف با شارژ کیف پول 🎁
مشاهده پلن ها