در حال حاضر محصولی در سبد خرید شما وجود ندارد.
As a pentester, you need to understand the inner workings of many different types of cyberattacks. The more you know about an attacker’s chosen tools and techniques, the better odds you’ll have to successfully stop them. Join ethical hacker Clint Kehr as he guides you through the basic concepts of ethical hacking, shows you how to leverage advanced-level exploitation techniques, and demonstrates the skills you need to know to tackle certification exams such as the Offensive Security Certified Professional (OSCP) certification exam. Learn how to adopt the mindset of a hacker, and how to use a variety of tools and techniques, including network protocols, web app pentesting, buffer overflows, public exploits, shells, privilege escalation, password cracking, brute-forcing, and more.
Note: This course was created by Cybrary, and the labs referenced throughout the course are only available on the Cybrary platform. We are pleased to host this training in our library.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
PowerShell for Security Professionals
Privileged Access Management
Developing Ethical Hacking Tools with Python
Advanced Malware Analysis: Redux
Certified Information Systems Auditor (CISA) Cert Prep
Advanced Cyber Threat Intelligence
Linux Hardening
Computer Hacking Forensics Investigator (CHFI) Cert Prep
IoT Product Security