وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Making Sense of Cybersecurity, Video Edition

سرفصل های دوره
  • 001. Chapter 1. Cybersecurity and hackers
  • 002. Chapter 1. Why should you care about cybersecurity
  • 003. Chapter 1. Who is the ideal reader for this book
  • 004. Chapter 1. How does hacking and defending work
  • 005. Chapter 1. What will you learn in this book
  • 006. Chapter 1. What we won t cover
  • 007. Chapter 1. What tools do you need to get started
  • 008. Chapter 1. Summary
  • 009. Chapter 2. Cybersecurity Everyone s problem
  • 010. Chapter 2. Impacts of a security breach
  • 011. Chapter 2. Objectives of a cybersecurity strategy
  • 012. Chapter 2. Supporting our strategy Building a patching policy
  • 013. Chapter 2. A culture of security
  • 014. Chapter 2. How ready are you
  • 015. Chapter 2. Summary
  • 016. Part 1
  • 017. Chapter 3. Understanding hackers
  • 018. Chapter 3. Where do they come from
  • 019. Chapter 3. What are hackers capable of
  • 020. Chapter 3. Working through a real-life problem How do hackers think
  • 021. Chapter 3. Summary
  • 022. Chapter 4. External attacks
  • 023. Chapter 4. Data injection attacks
  • 024. Chapter 4. Malware Viruses, Trojans, and ransomware
  • 025. Chapter 4. Dodgy Wi-Fi
  • 026. Chapter 4. Mobile phones, SMS, and 5G
  • 027. Chapter 4. Summary
  • 028. Chapter 5. Tricking our way in Social engineering
  • 029. Chapter 5. Malicious USB
  • 030. Chapter 5. Targeted attacks Phishing
  • 031. Chapter 5. Credential theft and passwords
  • 032. Chapter 5. Building access cards
  • 033. Chapter 5. Summary
  • 034. Chapter 6. Internal attacks
  • 035. Chapter 6. Gaining more control Privilege escalation
  • 036. Chapter 6. Data theft
  • 037. Chapter 6. Insider threats
  • 038. Chapter 6. Blast radius Limiting the damage
  • 039. Chapter 6. Building your castle Defense in depth
  • 040. Chapter 6. Summary
  • 041. Chapter 7. The Dark Web Where is stolen data traded
  • 042. Chapter 7. How to access the Dark Web
  • 043. Chapter 7. How is the Dark Web used
  • 044. Chapter 7. Summary
  • 045. Part 2
  • 046. Chapter 8. Understanding risk
  • 047. Chapter 8. How likely is a hack
  • 048. Chapter 8. How bad will it be
  • 049. Chapter 8. A simple model to measure risk
  • 050. Chapter 8. How do I measure and communicate this
  • 051. Chapter 8. Summary
  • 052. Chapter 9. Testing your systems
  • 053. Chapter 9. Vulnerability management
  • 054. Chapter 9. Break your own stuff Penetration testing
  • 055. Chapter 9. Getting expert help Bug bounties
  • 056. Chapter 9. Breaking in Physical penetration testing
  • 057. Chapter 9. Red teams and blue teams
  • 058. Chapter 9. Summary
  • 059. Chapter 10. Inside the security operations center
  • 060. Chapter 10. Dealing with attacks Incident response
  • 061. Chapter 10. Keeping track of everything Security and Information Event Management
  • 062. Chapter 10. Gaining intelligence Data feeds
  • 063. Chapter 10. Summary
  • 064. Chapter 11. Protecting the people
  • 065. Chapter 11. MFA
  • 066. Chapter 11. Protecting from ransomware
  • 067. Chapter 11. Education and support
  • 068. Chapter 11. Summary
  • 069. Chapter 12. After the hack
  • 070. Chapter 12. Where to get help
  • 071. Chapter 12. What to do next
  • 072. Chapter 12. Lessons learned
  • 073. Chapter 12. Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43833
    حجم: 10386 مگابایت
    مدت زمان: 533 دقیقه
    تاریخ انتشار: ۱۵ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید