<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;</provider_name><provider_url>https://hide01.ir</provider_url><title>&#x62F;&#x648;&#x631;&#x647; Mandiant - Network Traffic Analysis</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="FSt8okIZ61"&gt;&lt;a href="https://hide01.ir/mandiant-network-traffic-analysis/"&gt;&#x62F;&#x648;&#x631;&#x647; Mandiant &#x2013; Network Traffic Analysis&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://hide01.ir/mandiant-network-traffic-analysis/embed/#?secret=FSt8okIZ61" width="600" height="338" title="&#x201C;&#x62F;&#x648;&#x631;&#x647; Mandiant &#x2013; Network Traffic Analysis&#x201D; &#x2014; &#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;" data-secret="FSt8okIZ61" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://hide01.ir/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://hide01.ir/wp-content/uploads/2024/03/OIG1._1R3nZzfZJySRKgI_.jpeg</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>1024</thumbnail_height><description>Sophisticated attackers frequently go undetected in a victim&#x2019;s network for an extended period. Attackers can blend their traffic with legitimate traffic that only skilled network analysts know how to detect. This course shows learners how to identify malicious network activity. The course provides an overview of network protocols, network architecture, intrusion detection systems, network traffic [&hellip;]</description></oembed>
