IT & Software > > Network & Security

핵심을 찾아내는 침해사고 분석

1.   클랙스 요약사이버침해사고가 발생하면 기업은 신속하게 피해 범위를 파악하고, 사고 수습...

Ratings: 4.00/5.00     Lectures: 35  Subscribers: 18

DetailsTake This Course

LTE-4G et 4G+ de zéro à expert

4G LTE EPC (Evolved Packet Core)  permet de fournir une voix et des données convergées sur un r...

Ratings: 3.99/5.00     Lectures: 8  Subscribers: 18

DetailsTake This Course

Smartphone Schulung für Mitarbeiter mit iOS-Geräten

iOS-Smartphone-Schulung für Mitarbeiter: Sicher und effizientDas Ziel dieses Kurses ist es, die Teil...

Ratings: 3.83/5.00     Lectures: 6  Subscribers: 18

DetailsTake This Course

Exploiting Race Conditions in Web Applications

A race condition attack is one of the most dangerous and underestimated attacks in modern web applic...

Ratings: 3.83/5.00     Lectures: 5  Subscribers: 18

DetailsTake This Course

Learning to ATT&CK and Defend with PowerShell

As Sun Tzu said: "Know thy enemy and know yourself; in a hundred battles, you will never be defeated...

Ratings: 3.22/5.00     Lectures: 45  Subscribers: 18

DetailsTake This Course

Ethical Hacking Exam Prep Version 12

The Ethical Hacking Exam Prep Version 12  is a comprehensive course that provides in-depth know...

Ratings: 0.00/5.00     Lectures: 138  Subscribers: 18

DetailsTake This Course

Using OpenBSD as a Secure and Reliable Network Firewall

Hello my name is Tyler Monroe and In this course I will teach you how to take a new or used computer...

Ratings: 5.00/5.00     Lectures: 25  Subscribers: 17

DetailsTake This Course

Cybersecurity and Hacking 101

If cybersecurity fascinates you and you want to learn how hacking is done, this is the course for yo...

Ratings: 4.79/5.00     Lectures: 18  Subscribers: 17

DetailsTake This Course

Build a Keylogger using C++ for Ethical Hacking!

C++ فى الجزء الاول من هذة الدورة سوف تتعلم كل اساسيات البرمجة بلغة :تنزيل بيئة العمل المتكاملةانشاء...

Ratings: 4.67/5.00     Lectures: 42  Subscribers: 17

DetailsTake This Course

Xage Zero Trust Blockchain-Protected Fabric for IIOT

Xage is specialized in Zero Trust approach for access management for critical infrastructure includi...

Ratings: 4.50/5.00     Lectures: 10  Subscribers: 17

DetailsTake This Course

ANONYAT ET HACKING DISTANT

Ce que vous allez apprendreMAITRISE DES TECHNIQUES DE HACKING DISTANTATTEINDRE DES SYSTEMES HORS RES...

Ratings: 4.50/5.00     Lectures: 8  Subscribers: 17

DetailsTake This Course

Grundlagen Verschlüsselung / Encryption

Der Online-Kurs Grundlagen Verschlüsselung bietet eine Einführung in die Welt der Kryptographie und...

Ratings: 4.29/5.00     Lectures: 7  Subscribers: 17

DetailsTake This Course

CYBER LAW – THE BEGINNINGS - BY DR. PAVAN DUGGAL

In this course, the students will get an overview of the various essential subjects, issues, and asp...

Ratings: 4.29/5.00     Lectures: 26  Subscribers: 17

DetailsTake This Course

An Introduction to Software Defined Networks (SDN & NFV)

Learn about network infrastructure decoupling, abstraction, virtualization and how these ground-brea...

Ratings: 4.28/5.00     Lectures: 8  Subscribers: 17

DetailsTake This Course

Check Point CCSA-Kurs R81 (Deutsch)

Von Check Point zertifizierter Sicherheitsadministrator | In der CCSA R81-Schulung lernen Sie die In...

Ratings: 3.47/5.00     Lectures: 33  Subscribers: 17

DetailsTake This Course