وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Making Sense of Cybersecurity, Video Edition

سرفصل های دوره
  • 001. Chapter 1. Cybersecurity and hackers
  • 002. Chapter 1. Why should you care about cybersecurity
  • 003. Chapter 1. Who is the ideal reader for this book
  • 004. Chapter 1. How does hacking and defending work
  • 005. Chapter 1. What will you learn in this book
  • 006. Chapter 1. What we won t cover
  • 007. Chapter 1. What tools do you need to get started
  • 008. Chapter 1. Summary
  • 009. Chapter 2. Cybersecurity Everyone s problem
  • 010. Chapter 2. Impacts of a security breach
  • 011. Chapter 2. Objectives of a cybersecurity strategy
  • 012. Chapter 2. Supporting our strategy Building a patching policy
  • 013. Chapter 2. A culture of security
  • 014. Chapter 2. How ready are you
  • 015. Chapter 2. Summary
  • 016. Part 1
  • 017. Chapter 3. Understanding hackers
  • 018. Chapter 3. Where do they come from
  • 019. Chapter 3. What are hackers capable of
  • 020. Chapter 3. Working through a real-life problem How do hackers think
  • 021. Chapter 3. Summary
  • 022. Chapter 4. External attacks
  • 023. Chapter 4. Data injection attacks
  • 024. Chapter 4. Malware Viruses, Trojans, and ransomware
  • 025. Chapter 4. Dodgy Wi-Fi
  • 026. Chapter 4. Mobile phones, SMS, and 5G
  • 027. Chapter 4. Summary
  • 028. Chapter 5. Tricking our way in Social engineering
  • 029. Chapter 5. Malicious USB
  • 030. Chapter 5. Targeted attacks Phishing
  • 031. Chapter 5. Credential theft and passwords
  • 032. Chapter 5. Building access cards
  • 033. Chapter 5. Summary
  • 034. Chapter 6. Internal attacks
  • 035. Chapter 6. Gaining more control Privilege escalation
  • 036. Chapter 6. Data theft
  • 037. Chapter 6. Insider threats
  • 038. Chapter 6. Blast radius Limiting the damage
  • 039. Chapter 6. Building your castle Defense in depth
  • 040. Chapter 6. Summary
  • 041. Chapter 7. The Dark Web Where is stolen data traded
  • 042. Chapter 7. How to access the Dark Web
  • 043. Chapter 7. How is the Dark Web used
  • 044. Chapter 7. Summary
  • 045. Part 2
  • 046. Chapter 8. Understanding risk
  • 047. Chapter 8. How likely is a hack
  • 048. Chapter 8. How bad will it be
  • 049. Chapter 8. A simple model to measure risk
  • 050. Chapter 8. How do I measure and communicate this
  • 051. Chapter 8. Summary
  • 052. Chapter 9. Testing your systems
  • 053. Chapter 9. Vulnerability management
  • 054. Chapter 9. Break your own stuff Penetration testing
  • 055. Chapter 9. Getting expert help Bug bounties
  • 056. Chapter 9. Breaking in Physical penetration testing
  • 057. Chapter 9. Red teams and blue teams
  • 058. Chapter 9. Summary
  • 059. Chapter 10. Inside the security operations center
  • 060. Chapter 10. Dealing with attacks Incident response
  • 061. Chapter 10. Keeping track of everything Security and Information Event Management
  • 062. Chapter 10. Gaining intelligence Data feeds
  • 063. Chapter 10. Summary
  • 064. Chapter 11. Protecting the people
  • 065. Chapter 11. MFA
  • 066. Chapter 11. Protecting from ransomware
  • 067. Chapter 11. Education and support
  • 068. Chapter 11. Summary
  • 069. Chapter 12. After the hack
  • 070. Chapter 12. Where to get help
  • 071. Chapter 12. What to do next
  • 072. Chapter 12. Lessons learned
  • 073. Chapter 12. Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 43833
    حجم: 10386 مگابایت
    مدت زمان: 533 دقیقه
    تاریخ انتشار: ۱۵ اردیبهشت ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید