G
Gustav
Команда форума
Администратор
- Сообщения
- 26.413
- Реакции
- 53.743
Network Security (Видеокурс)
Автор: Sunil K. Gupta - Udemy
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
The video tutorial starts with the basics of network and scanning techniques. You will learn to search hosts and find open ports and services in a network. You will also learn the most important attacks on networks such as dos attacks, gaining access attacks, exploitation attacks, and post exploitation attacks. Finally, the course will teach you techniques you can use to defend networks with firewalls, IDS, IPS, and other network security devices.
At the end of this course, you’ll have a practical knowledge of the ways in which hackers can infiltrate a network over the Internet and will be familiar with tools such as nmap, Wireshark, and Metasploit
Продажник:
Скачать:
Автор: Sunil K. Gupta - Udemy
Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
The video tutorial starts with the basics of network and scanning techniques. You will learn to search hosts and find open ports and services in a network. You will also learn the most important attacks on networks such as dos attacks, gaining access attacks, exploitation attacks, and post exploitation attacks. Finally, the course will teach you techniques you can use to defend networks with firewalls, IDS, IPS, and other network security devices.
At the end of this course, you’ll have a practical knowledge of the ways in which hackers can infiltrate a network over the Internet and will be familiar with tools such as nmap, Wireshark, and Metasploit
Продажник:
Для просмотра вы должны войти или зарегистрироваться.
Скачать:
Для просмотра вы должны войти или зарегистрироваться.
Скрытое содержимое для пользователей: Ferr