در حال حاضر محصولی در سبد خرید شما وجود ندارد.
You've likely done everything you can to logically secure your systems. But how can you be sure that you’re fully protected from an attack? This course provides an overview of one of the most important skills for today’s IT security professional: penetration testing, the process of testing a computer, system, network, or application to evaluate its ability to withstand an attack. Cybersecurity expert Lisa Bock reviews the key differences between known and unknown tests, manual and automated tests, announced and unannounced tests, and more. Gather tips and pointers designed to help you get up and running, so you can choose the types of tests that will work best for you. Along the way, learn how to wield cutting-edge reconnaissance tools like scanners, password crackers, search engines, list makers, and APIs to deliver consistent, time-sensitive test results. By the end of this course, you’ll be equipped with new techniques and testing blueprints for Wi-Fi, networks, websites, email, VoIP, cloud-native services, mobile infrastructure, human firewalls, and beyond.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
کورس یادگیری رمزنگاری و امنیت شبکه
کورس یادگیری کامل Ethical Hacking: Penetration Testing
Wireshark: Advanced Tools and Techniques
امنیت شبکه سیسکو: مفاهیم امنیتی
کورس یادگیری Ethical Hacking Vulnerability Analysis
آموزش رفع عیب شبکه با Wireshark
فیلم آموزش Wireshark: VoIP
آموزش مبانی امنیت شبکه
Ethical Hacking: Footprinting and Reconnaissance
Ethical Hacking: System Hacking