Common Cybersecurity Attacks and Defense Strategies /
Bad actors are constantly hunting for your personal and proprietary information to use against you for their profit. Attacks are becoming more and more sophisticated, so you must learn to recognize their methods and start defending your cyberspace today. This course teaches you to recognize the most...
Autor principal: | Gilbert, Lisa (Autor, VerfasserIn.) |
---|---|
Autor Corporativo: | Safari, an O'Reilly Media Company (Contribuidor, MitwirkendeR.) |
Formato: | Video |
Idioma: | Inglés |
Publicado: |
[Erscheinungsort nicht ermittelbar] :
EC-Council,
2020
|
Edición: | 1st edition. |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics /
por: Diogenes, Yuri, et al.
Publicado: (2018) -
Cybersecurity - Attack and Defense Strategies : Infrastructure security with Red Team and Blue Team tactics.
por: Diogenes, Yuri
Publicado: (2018) -
Cybersecurity - Attack and Defense Strategies - Second Edition /
por: Diogenes, Yuri, et al.
Publicado: (2019) -
Cybersecurity attacks : Red Team strategies : a practical guide to building a penetration testing program having homefield advantage /
por: Rehberger, Johann
Publicado: (2020) -
Chinese cybersecurity and defense /
Publicado: (2014)