در حال حاضر محصولی در سبد خرید شما وجود ندارد.
Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Securing the IoT: Security Risks
امنیت شبکه سیسکو: مفاهیم امنیتی
فیلم یادگیری Wireshark: Packet Loss and Recovery
کورس یادگیری کامل Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures
کورس یادگیری Ethical Hacking: Introduction to Ethical Hacking
Securing the IoT: Privacy
فیلم یادگیری Ethical Hacking: System Hacking
Ethical Hacking: Introduction to Ethical Hacking
فیلم یادگیری Ethical Hacking: Vulnerability Analysis
Wireshark: Advanced Tools and Techniques