|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1260248128 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cnu|||||||| |
007 |
vz czazuu |
008 |
050721s2020 xx --- o vleng d |
040 |
|
|
|a AU@
|b eng
|c AU@
|d NZCPL
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1277196662
|a 1305866068
|
020 |
|
|
|z 360520BCRV
|
024 |
8 |
|
|a 360520BCRV
|
029 |
0 |
|
|a AU@
|b 000069471296
|
035 |
|
|
|a (OCoLC)1260248128
|z (OCoLC)1277196662
|z (OCoLC)1305866068
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sokic, Tino,
|e author.
|
245 |
1 |
0 |
|a Open Source Intelligence /
|c Sokic, Tino.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b EC-Council,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 4 hr., 38 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
520 |
|
|
|a If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you. Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company. Information and data have never been more accessible in human history than today. As good as this sounds, it is also a rabbit hole in which you can easily fall into. Here is where Open-Source Intelligence or OSINT comes to play. OSINT means many different things to many different people, because of its versatile framework. For most people, it merely means publicly available data from the internet, but it is much more. In this course, we will go over Open-Source Intelligence from the basics to intermediate things with which you can easily transition yourself into more advanced investigations and upgrade your cybersecurity career. You will understand what Open-Source Intelligence is and how you can use it to your advantage and protection in a virtual Linux environment. Also, you will learn about exciting tools like theHarvester and Spiderfoot, where to find breach information, what is the structure of the internet, and much more. More often, all that will give you a scare of how much information is exposed on the internet.
|
542 |
|
|
|f Copyright © EC-Council
|g 2020
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title screen (viewed September 30, 2020)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/360520BCRV/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|