در حال حاضر محصولی در سبد خرید شما وجود ندارد.
The number of IoT (Internet of Things) devices deployed is increasing exponentially, which presents significant security challenges. In this course, Lisa Bock covers topics related to the IoT and OT hacking domain from the CEH body of knowledge. Lisa dives into the myriad of security challenges that the IoT faces, highlighting the importance of conducting ethical hacking to unearth vulnerabilities within IoT and operational technology (OT) devices. The course covers strategies for managing OT and industrial control systems (ICS). Furthermore, Lisa outlines methods for executing attacks on IoT/OT systems along with ways to safeguard systems against potential attacks, to ensure participants are well-equipped to protect these technologies. To help apply these concepts, Lisa provides a list of resources for best practice frameworks and guidance on securing IoT/OT systems. At the end of the course, you will have a robust arsenal to navigate the complex landscape of IoT security.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
Ethical Hacking: Scanning Networks
Cisco Network Security: VPN
آموزش رفع عیب شبکه با Wireshark
مبانی امنیت IT : پیاده سازی امنیت سیستم
فیلم یادگیری Wireshark: Packet Loss and Recovery
Cisco Certified Cyberops Associate Cert Prep: 4 تجزیه و تحلیل نفوذ شبکه
IT Security Foundations: Network Security
کورس یادگیری کامل Ethical Hacking: Penetration Testing
کورس یادگیری و کامل Cisco Certified CyberOps Associate (200-201) Cert Prep: 4 Network Intrusion Analysis
Securing the IoT: Privacy
✨ تا ۷۰% تخفیف با شارژ کیف پول 🎁
مشاهده پلن ها