Cargando…

Common Cybersecurity Attacks and Defense Strategies /

Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today. This course teaches you to recognize the most...

Descripción completa

Detalles Bibliográficos
Autor principal: Gilbert, Lisa (Autor, VerfasserIn.)
Autor Corporativo: Safari, an O'Reilly Media Company (Contribuidor, MitwirkendeR.)
Formato: Video
Idioma:Inglés
Publicado: [Erscheinungsort nicht ermittelbar] : EC-Council, 2020
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1259639766
003 OCoLC
005 20231017213018.0
006 m o c
007 cr uuu---uuuuu
007 vz czazuu
008 210712s2020 mau--- o vleng d
040 |a GBVCP  |b ger  |e rda  |c GBVCP  |d OCLCQ 
035 |a (OCoLC)1259639766 
049 |a UAMI 
100 1 |a Gilbert, Lisa,  |e VerfasserIn.  |4 aut 
245 1 0 |a Common Cybersecurity Attacks and Defense Strategies /  |c Gilbert, Lisa. 
250 |a 1st edition. 
264 1 |a [Erscheinungsort nicht ermittelbar] :  |b EC-Council,  |c 2020 
264 2 |a Boston, MA :  |b Safari 
300 |a 1 online resource (1 video file, circa 1 hr., 22 min.) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent/ger 
337 |a Computermedien  |b c  |2 rdamedia/ger 
338 |a Online-Ressource  |b cr  |2 rdacarrier/ger 
500 |a Online resource; Title from title screen (viewed August 20, 2020). 
520 |a Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today. This course teaches you to recognize the most common and most devastating attacks. Relevant, timely information is your best weapon against attackers; learn and understand the latest strategies that will be used against you. Armed with the knowledge to recognize the attacks, you will be prepared to defend against them. You will transform yourself and your personnel from your greatest vulnerability to your greatest asset in defending your cyberspace. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company.,  |e MitwirkendeR.  |4 ctb 
856 4 0 |u https://learning.oreilly.com/videos/~/130320BCRV/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP