{{ 'fb_in_app_browser_popup.desc' | translate }} {{ 'fb_in_app_browser_popup.copy_link' | translate }}

{{ 'in_app_browser_popup.desc' | translate }}

目录 购物车 {{currentCart.getItemCount()}}
[Udemy Course] IT Security Hacking And Networks Security

[Udemy Course] IT Security Hacking And Networks Security

RM15.00
{{shoplineProductReview.avg_score}} {{'product.product_review.stars' | translate}} | {{shoplineProductReview.total}} {{'product.product_review.reviews' | translate}}
{{amazonProductReview.avg_rating}} {{'product.product_review.stars' | translate}} | {{amazonProductReview.total_comment_count}} {{'product.product_review.reviews' | translate}}
数量 组合数量
加入追踪清单
一次最大商品购买数量限制为 99999
该数量不适用,请填入有效的数量。
售完

商品存货不足,未能加入购物车

您所填写的商品数量超过库存

{{'products.quick_cart.out_of_number_hint'| translate}}

{{'product.preorder_limit.hint'| translate}}

每笔订单限购 {{ product.max_order_quantity }} 件

现库存只剩下 {{ quantityOfStock }} 件

若想购买,请联络我们。
加入追踪清单

商品描述

What you'll learn

Have a comprehensive insight regarding information technologies security

Security concepts and methodologies (Teology, Security properties and case study of a Risk Management plan)

Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)

Security benchmark (Black-box and white-box approach to exploit and secure a system)

Formulary hacks (Code a vulnerable form, exploit and secure it)

Build a dedicated virtual server (Backup your data, including Machine, run your Virtual Machines among other perks)

Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.

Requirements

You must be comfortable using your PC and some programing knowledge is advisable

All the software we are using is Open Source

Description

This curse sums up more than 10 years working on IT and the content of a master degree in information technologies security.

The topics are:

CIA triad, types of attacks and security mechanisms

Security concepts and methodologies (Teology, Security properties and case study of a Risk Management plan)

Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)

Security benchmark (Black-box and white-box approach to exploit and secure a system)

Formulary hacks (Code a vulnerable form, exploit and secure it)

Security in email (PGP) and web servers (X.509)

Network firewall with Snort integration

Remote security analysis and assessment

Build a dedicated virtual server (Backup your data, including Machine, run your Virtual Machines among other perks)

Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.

Even if you are already a system administrator or a newbie you are most likely to find something new, as I did previously to start this.

If you have any question or doubt just send me a message.

This course is constantly reviewed and updated with new lessons.

💢💢💢💢💢💢💢💢

File size: 5GB

Payment and delivery:
1. Please provide your EMAIL address in “message:” during checkout.
2. The files will be sent to you after payment has been confirmed.

🔥 All files will be delivered online.
🔥 Download for Lifetime Access

Kindly PM us if you are looking for other ebooks/ Video Courses.
Enjoy learning!

用户评分


{{'product.product_review.no_review' | translate}}

相关产品