در حال حاضر محصولی در سبد خرید شما وجود ندارد.
Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Ethical Hacking: Sniffers
کورس یادگیری Ethical Hacking Vulnerability Analysis
Cisco Certified Cyberops Associate Cert Prep: 4 تجزیه و تحلیل نفوذ شبکه
کورس یادگیری Ethical Hacking: Introduction to Ethical Hacking
Cisco Network Security: VPN
Ethical Hacking: Introduction to Ethical Hacking
امنیت شبکه سیسکو: مفاهیم امنیتی
فیلم یادگیری Ethical Hacking: System Hacking
فیلم آموزش Wireshark: VoIP
IT Security Foundations: Network Security