در حال حاضر محصولی در سبد خرید شما وجود ندارد.
Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Learning Penetration Testing
امنیت شبکه سیسکو: مفاهیم امنیتی
کورس یادگیری Ethical Hacking Vulnerability Analysis
کورس یادگیری کامل Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures
Cisco Network Security: VPN
کورس یادگیری Cisco Certified CyberOps Associate (200-201) Cert Prep: 4 Network Intrusion Analysis
مبانی امنیت IT : پیاده سازی امنیت سیستم
فیلم یادگیری Ethical Hacking: System Hacking
Cisco Network Security: Cisco Firewall Technologies
فیلم یادگیری Wireshark: Packet Loss and Recovery