در حال حاضر محصولی در سبد خرید شما وجود ندارد.
The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Wireshark: Advanced Tools and Techniques
کورس یادگیری کامل Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures
Securing the IoT: Security Risks
آموزش رفع عیب شبکه با Wireshark
Ethical Hacking: Scanning Networks
Ethical Hacking: Introduction to Ethical Hacking
Ethical Hacking: Footprinting and Reconnaissance
کورس یادگیری و کامل Cisco Certified CyberOps Associate (200-201) Cert Prep: 4 Network Intrusion Analysis
IT Security Foundations: Network Security
آموزش مبانی امنیت شبکه
✨ تا ۷۰% تخفیف با شارژ کیف پول 🎁
مشاهده پلن ها