{"id":12049,"date":"2025-07-15T07:56:48","date_gmt":"2025-07-15T07:56:48","guid":{"rendered":"https:\/\/elearning.lk\/blog\/?p=12049"},"modified":"2025-09-05T10:48:31","modified_gmt":"2025-09-05T10:48:31","slug":"cybersecurity-essentials-hacking-techniques-defense-strategies-with-tharaka-mahabage","status":"publish","type":"post","link":"https:\/\/elearning.lk\/blog\/cybersecurity-essentials-hacking-techniques-defense-strategies-with-tharaka-mahabage\/","title":{"rendered":"Cybersecurity Essentials: Hacking Techniques &#038; Defense Strategies with Tharaka Mahabage"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p>\u0d94\u0db6\u0dad\u0dca<br \/>\n\ud83d\udee1\ufe0f Cybersecurity \u0d9c\u0dd0\u0db1 \u0d89\u0d9c\u0dd9\u0db1 \u0d9c\u0db1\u0dca\u0db1 \u0d86\u0dc3\u0dcf\u0dc0\u0dd9\u0db1\u0dca \u0d89\u0db1\u0dca\u0db1, \u0db1\u0db8\u0dd4\u0dad\u0dca \u0d92 \u0db4\u0dd2\u0dc5\u0dd2\u0db6\u0db3 \u0d9a\u0dd2\u0dc3\u0dd2\u0daf\u0dd4 \u0db8\u0dd6\u0dbd\u0dd2\u0d9a \u0daf\u0dd0\u0db1\u0dd3\u0db8\u0d9a\u0dca \u0db1\u0ddc\u0db8\u0dd0\u0dad\u0dd2 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca \u0daf?<br \/>\n\ud83d\udee1\ufe0f \u0d91\u0dc4\u0dd9\u0db8\u0dad\u0dca \u0db1\u0dd0\u0dad\u0dca\u0db1\u0db8\u0dca Certified Ethical Hacker (CEH) Exam \u0d91\u0d9a \u0dc3\u0db3\u0dc4\u0dcf \u0db8\u0dd4\u0dc4\u0dd4\u0dab \u0daf\u0dd3\u0db8\u0da7 \u0db6\u0dbd\u0dcf\u0db4\u0ddc\u0dbb\u0ddc\u0dad\u0dca\u0dad\u0dd4\u0dc0\u0dd9\u0db1\u0dca \u0d89\u0db1\u0dca\u0db1 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca\u0daf?<br \/>\n\ud83d\udee1\ufe0f Real-world Hacking Tools \u0db1\u0dd0\u0dad\u0dca\u0db1\u0db8\u0dca Ethical Hacking \u0d9c\u0dd0\u0db1 Study \u0d9a\u0dbb\u0db1\u0dca\u0db1 \u0d9a\u0dd0\u0db8\u0dad\u0dd2 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca \u0daf?<br \/>\n\ud83d\udee1\ufe0f Cyber Attacks \u0dc0\u0dbd\u0da7 \u0d91\u0dbb\u0dd9\u0dc4\u0dd2\u0dc0 System \u0d91\u0d9a\u0d9a\u0dca Secure \u0d9a\u0dbb\u0db1\u0dca\u0db1 \u0db4\u0dd4\u0dc5\u0dd4\u0dc0\u0db1\u0dca \u0dc0\u0dd2\u0daf\u0dd2\u0dc4 \u0d9c\u0dd0\u0db1 \u0dc4\u0ddc\u0dba\u0db1 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca\u0daf?<\/p>\n<p>\ud83d\udcbb \u0d91\u0dc4\u0dd9\u0db8\u0db1\u0db8\u0dca Cybersecurity \u0d9c\u0dd0\u0db1 \u0d89\u0d9c\u0dd9\u0db1 \u0d9c\u0db1\u0dca\u0db1 \u0d86\u0dc3\u0dcf\u0dc0\u0dd9\u0db1\u0dca \u0d89\u0db1\u0dca\u0db1, \u0db1\u0db8\u0dd4\u0dad\u0dca \u0d92 \u0db4\u0dd2\u0dc5\u0dd2\u0db6\u0db3 \u0d9a\u0dd2\u0dc3\u0dd2\u0daf\u0dd4 \u0db8\u0dd6\u0dbd\u0dd2\u0d9a \u0daf\u0dd0\u0db1\u0dd3\u0db8\u0d9a\u0dca \u0db1\u0ddc\u0db8\u0dd0\u0dad\u0dd2 \u0d94\u0dba\u0dcf\u0dbd\u0da7,  Cybersecurity \u0dc0\u0dd2\u0dc2\u0dba \u0d9c\u0dd0\u0db1 \u0dc3\u0dbb\u0dbd\u0dc0 A &#8211; Z \u0d89\u0d9c\u0dd9\u0db1 \u0d9c\u0db1\u0dca\u0db1 \u0dc3\u0dd4\u0daf\u0dd4\u0dc3\u0dd4\u0db8 \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0d9a\u0dca eLearning.lk \u0d85\u0db4\u0dd2 \u0db8\u0dda \u0dc0\u0dad\u0dcf\u0dc0\u0dda \u0d85\u0dbb\u0d9c\u0dd9\u0db1 \u0d91\u0db1\u0dc0\u0dcf.<\/p>\n<p>\ud83e\udd16 CEH (Certified Ethical Hacker) Syllabus \u0d91\u0d9a\u0da7\u0db8  Align \u0d9a\u0dbb\u0dbd\u0dcf \u0dc3\u0d9a\u0dc3\u0dcf \u0dad\u0dd2\u0dba\u0dd9\u0db1 \u0db8\u0dda \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0dd9\u0db1\u0dca \u0d94\u0dba\u0dcf\u0da7 Cybersecurity \u0d9c\u0dd0\u0db1 \u0dc4\u0ddc\u0db3 Practical Knowledge \u0d91\u0d9a\u0d9a\u0dca \u0dbd\u0dd0\u0db6\u0dd9\u0db1\u0dc0\u0dcf \u0dc0\u0d9c\u0dda\u0db8, \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0 \u0d85\u0dc0\u0dc3\u0dcf\u0db1\u0dba\u0dda\u0daf\u0dd3 Job \u0d91\u0d9a\u0d9a\u0da7 Apply \u0d9a\u0dbb\u0db1\u0dca\u0db1 \u0d85\u0dc0\u0dc1\u0dca\u200d\u0dba \u0db8\u0dd6\u0dbd\u0dd2\u0d9a \u0dc3\u0dd4\u0daf\u0dd4\u0dc3\u0dd4\u0d9a\u0db8\u0dca \u0da7\u0dd2\u0d9a\u0dad\u0dca \u0dc3\u0db4\u0dd4\u0dbb\u0dbd\u0dcf \u0daf\u0dd9\u0db1\u0dc0\u0dcf.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/4dXsKAmmpAk?si=Ut_vJ-VdGmDVSrTf\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>\u270d\ufe0f \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0da7 \u0db8\u0dd9\u0dad\u0db1\u0dd2\u0db1\u0dca Register \u0dc0\u0dd9\u0db8\u0dd4 &#8211; <a href=\"https:\/\/elearning.lk\/courses?course_search=cybersecurity\" rel=\"noopener\" target=\"_blank\">https:\/\/elearning.lk\/courses?course_search=cybersecurity<\/a><br \/>\n\ud83d\udcf1 WhatsApp Group \u0d91\u0d9a\u0dad\u0dca \u0d91\u0d9a\u0dca\u0d9a Join \u0dc0\u0dd9\u0db1\u0dca\u0db1: <a href=\"https:\/\/chat.whatsapp.com\/JeEylH71zqDDvKKf2OXeXB\" rel=\"noopener\" target=\"_blank\">https:\/\/chat.whatsapp.com\/JeEylH71zqDDvKKf2OXeXB<\/a><br \/>\n\ud83d\udc49 075 6 700 700 (Direct Calls)<br \/>\n\ud83d\udc49 075 954 1398 (WhatsApp Messages)<br \/>\n\ud83d\udc49 075 987 3655 (WhatsApp Messages)<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\ud83d\udccd \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf \u0d9a\u0dcf\u0dbd\u0dba : \u0dc3\u0dad\u0dd2 \u0dc4\u0dba\u0d9a\u0dd2 (\u0db4\u0dd0\u0dba 24)<br \/>\n\ud83d\udccd \u0d86\u0dbb\u0db8\u0dca\u0db7\u0d9a \u0daf\u0dd2\u0db1\u0dba : 2025.07.23<br \/>\n\ud83d\udccd \u0d85\u0dc0\u0dc3\u0dcf\u0db1 \u0daf\u0dd2\u0db1\u0dba : 2025.08.28<br \/>\n\ud83d\udccd \u0daf\u0dd2\u0db1\u0dba \u0dc3\u0dc4 \u0dc0\u0dda\u0dbd\u0dcf\u0dc0 : \u0dc3\u0dd1\u0db8 \u0db6\u0daf\u0dcf\u0daf\u0dcf \u0dc3\u0dc4 \u0db6\u0dca\u200d\u0dbb\u0dc4\u0dc3\u0dca\u0db4\u0dad\u0dd2\u0db1\u0dca\u0daf\u0dcf \u0daf\u0dd2\u0db1\u0d9a\u0db8 \u0dbb\u0dcf\u0dad\u0dca\u200d\u0dbb\u0dd3 8.00 \u0dc3\u0dd2\u0da7 10.00 \u0daf\u0d9a\u0dca\u0dc0\u0dcf<br \/>\n\ud83d\udccd \u0db8\u0dcf\u0db0\u0dca\u200d\u0dba\u0dba : \u0dc3\u0dd2\u0d82\u0dc4\u0dbd \/ English<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\u0d94\u0db6 \u0d89\u0d9c\u0dd9\u0db1\u0d9c\u0db1\u0dca\u0db1\u0dcf \u0daf\u0dda\u0dc0\u0dbd\u0dca \u0d9a\u0dd2\u0dc4\u0dd2\u0db4\u0dba\u0d9a\u0dca&#8230;<br \/>\n\ud83e\uddff Week 1: Introduction to Ethical Hacking &#038; Footprinting<br \/>\n\ud83e\uddff Week 2: Scanning Networks &#038; Enumeration<br \/>\n\ud83e\uddff Week 3: Vulnerability Analysis &#038; System Hacking<br \/>\n\ud83e\uddff Week 4: Malware, Sniffing &#038; Social Engineering<br \/>\n\ud83e\uddff Week 5: Web Application, Wireless &#038; IoT Hacking<br \/>\n\ud83e\uddff Week 6: Cloud, Cryptography &#038; CEH Practice<br \/>\n\u0dc3\u0db8\u0dca\u0db4\u0dd6\u0dbb\u0dca\u0dab \u0dc0\u0dd2\u0dc2\u0dba \u0db1\u0dd2\u0dbb\u0dca\u0daf\u0dda\u0dc1\u0dba: https:\/\/elearning.lk\/sl\/cybersecurity-essentials-syllabus<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\ud83c\udff7\ufe0f \u0db8\u0dd2\u0dbd: \u0dbb\u0dd4.20,000 <\/p>\n<p>\ud83c\udff7\ufe0f \u0dc3\u0db8\u0dca\u0db4\u0dd6\u0dbb\u0dca\u0dab \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf \u0d9c\u0dcf\u0dc3\u0dca\u0dad\u0dd4\u0dc0 \u0d91\u0d9a\u0dc0\u0dbb \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0d9a\u0dca \u0d94\u0dc3\u0dca\u0dc3\u0dda (One-time Payment) \u0dc3\u0db8\u0dca\u0db6\u0db1\u0dca\u0db0 \u0dc0\u0db1 \u0dc3\u0dd2\u0dc3\u0dd4\u0db1\u0dca\u0da7 20%\u0d9a \u0db8\u0dd2\u0dbd \u0d85\u0da9\u0dd4 \u0d9a\u0dd2\u0dbb\u0dd3\u0db8\u0d9a\u0dca \u0dbd\u0dd0\u0db6\u0dda (\u0dbb\u0dd4.16,000\u0d9a\u0dca \u0db4\u0db8\u0dab\u0dd2) <\/p>\n<p>\ud83c\udff7\ufe0f \u0dc3\u0db8\u0dca\u0db4\u0dd6\u0dbb\u0dca\u0dab \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf \u0d9c\u0dcf\u0dc3\u0dca\u0dad\u0dd4\u0dc0 \u0d91\u0d9a\u0dc0\u0dbb \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0da7 \u0d85\u0db4\u0dc4\u0dc3\u0dd4 \u0dc3\u0dd2\u0dc3\u0dd4\u0db1\u0dca\u0da7 \u0dc0\u0dcf\u0dbb\u0dd2\u0d9a \u0daf\u0dd9\u0d9a\u0d9a\u0dd2\u0db1\u0dca \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0dca \u0d9a\u0da7\u0dba\u0dd4\u0dad\u0dd4 \u0dc3\u0dd2\u0daf\u0dd4 \u0d9a\u0dc5 \u0dc4\u0dd0\u0d9a <\/p>\n<p>\ud83c\udff7\ufe0f Website \u0d91\u0d9a \u0dc4\u0dbb\u0dc4\u0dcf \u0dc4\u0ddd Bank Transaction \u0d91\u0d9a\u0d9a\u0dca \u0dbd\u0dd9\u0dc3 \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0dca \u0dc3\u0dd2\u0daf\u0dd4 \u0d9a\u0dc5 \u0dc4\u0dd0\u0d9a<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\u0d94\u0db6\u0dda \u0d9c\u0dd4\u0dbb\u0dd4\u0dc0\u0dbb\u0dba\u0dcf \u0d9c\u0dd0\u0db1 &#8211; Tharaka Tharaka Mahabage<br \/>\n\ud83d\udccc Cyber Security Enthusiast<br \/>\n\ud83d\udccc Security Researcher<br \/>\n\ud83d\udccc Red Teaming<br \/>\n\ud83d\udc49 LinkedIn: <a href=\"https:https:\/\/www.linkedin.com\/in\/tharaka-mahabage-bbb14935\/\" rel=\"noopener\" target=\"_blank\">https:https:\/\/www.linkedin.com\/in\/tharaka-mahabage-bbb14935\/<\/a><br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n<p>\ud83d\udcaa \u0d87\u0dba\u0dd2 \u0d85\u0db4\u0dd2 \u0dc0\u0dd2\u0dc1\u0dda\u0dc2?<br \/>\n\ud83d\udccc 2018 \u0dc0\u0dc3\u0dbb\u0dda \u0dc3\u0dd2\u0da7\u0db8 \u0dc1\u0dca\u200d\u0dbb\u0dd3 \u0dbd\u0d82\u0d9a\u0dcf\u0dc0\u0dda Online Education \u0d9a\u0dca\u0dc2\u0dda\u0dad\u0dca\u200d\u0dbb\u0dba\u0dda \u0d85\u0dad\u0dd2\u0daf\u0dd0\u0dc0\u0dd0\u0db1\u0dca\u0dad\u0dba\u0ddd<br \/>\n\ud83d\udccc \u0dad\u0dd8\u0dad\u0dd3\u0dba\u0dd2\u0d9a \u0dc4\u0dcf \u0dc0\u0dd8\u0dad\u0dca\u0dad\u0dd3\u0dba \u0d85\u0db0\u0dca\u200d\u0dba\u0dcf\u0db4\u0db1 \u0d9a\u0ddc\u0db8\u0dd2\u0dc2\u0db1\u0dca \u0dc3\u0db7\u0dcf\u0dc0 \u0dc0\u0dd2\u0dc3\u0dd2\u0db1\u0dca \u0d85\u0db1\u0dd4\u0db8\u0dad \u0d9a\u0dbb\u0db1 \u0dbd\u0daf \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0d9a\u0dd2 (P01\/1036)<br \/>\n\ud83d\udccc \u0dc3\u0dd1\u0db8 \u0dc0\u0dd2\u0dc2\u0dba \u0d9a\u0dbb\u0dd4\u0dab\u0d9a\u0dca\u0db8 \u0db8\u0dd4\u0dbd \u0dc3\u0dd2\u0da7 \u0d85\u0d9c\u0da7, \u0d9a\u0dca\u200d\u0dbb\u0db8\u0dcf\u0db1\u0dd4\u0d9a\u0dd6\u0dbd\u0dc0, \u0db4\u0dd2\u0dba\u0dc0\u0dbb\u0dd9\u0db1\u0dca \u0db4\u0dd2\u0dba\u0dc0\u0dbb, \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a\u0dc0, \u0daf\u0db1\u0dca\u0db1 \u0dc3\u0dd2\u0d82\u0dc4\u0dbd\u0dd9\u0db1\u0dca \u0d8b\u0d9c\u0db1\u0dca\u0dc0\u0db1\u0dc0\u0dcf<br \/>\n\ud83d\udccc \u0db4\u0dd0\u0dba 24 \u0db4\u0dd4\u0dbb\u0dcf\u0db8 Update \u0dc0\u0dd9\u0db1 AI Technologies &#038; Tools \u0d9c\u0dd0\u0db1 \u0d85\u0db4\u0dd2 \u0d9a\u0dd2\u0dba\u0dbd\u0dcf \u0daf\u0dd9\u0db1\u0dc0\u0dcf<br \/>\n\ud83d\udccc \u0db4\u0dd2\u0da7\u0dc3\u0dca\u0dad\u0dbb \u0d85\u0dba\u0da7 \u0d87\u0dad\u0dd4\u0dc5\u0dd4\u0dc0\u0dd9\u0db1\u0dca\u0db1 \u0db6\u0dd0\u0dbb\u0dd2 \u0d85\u0db0\u0dd2\u0d86\u0dbb\u0d9a\u0dca\u0dc2\u0dd2\u0dad Online \u0db4\u0db1\u0dca\u0dad\u0dd2<br \/>\n\ud83d\udccc Boring \u0db1\u0dd0\u0dad\u0dd4\u0dc0 \u0dc0\u0dd2\u0db1\u0ddd\u0daf\u0dba\u0dd9\u0db1\u0dca \u0d89\u0d9c\u0dd0\u0db1\u0dca\u0dc0\u0dd3\u0db8\u0dda \u0dc3\u0dd4\u0dc0\u0dd2\u0dc1\u0dda\u0dc2\u0dd3 \u0dc1\u0ddb\u0dbd\u0dd3\u0db1\u0dca<br \/>\n\ud83d\udccc Microlearning Concepts \u0db7\u0dcf\u0dc0\u0dd2\u0dad\u0dba (\u0d9a\u0dd9\u0da7\u0dd2 \u0d9a\u0dcf\u0dbd\u0dba\u0d9a\u0dd2\u0db1\u0dca \u0dc0\u0dd0\u0da9\u0dd2 \u0d89\u0d9c\u0dd0\u0db1\u0dca\u0dc0\u0dd3\u0db8\u0d9a\u0dca)<br \/>\n\ud83d\udccc \u0dc0\u0dd2\u0dc0\u0dd2\u0db0 \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a \u0d9a\u0dca\u200d\u0dbb\u0dd2\u0dba\u0dcf\u0d9a\u0dcf\u0dbb\u0d9a\u0db8\u0dca<br \/>\n\ud83d\udccc \u0dc3\u0dd1\u0db8 \u0dc3\u0dd2\u0dc3\u0dd4\u0dc0\u0dd9\u0d9a\u0dca \u0d9c\u0dd0\u0db1\u0db8 \u0dc0\u0dd2\u0dc1\u0dda\u0dc2 \u0d85\u0dc0\u0db0\u0dcf\u0db1\u0dba<br \/>\n\ud83d\udccc \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0 \u0d85\u0dc0\u0dc3\u0db1\u0dca \u0dc0\u0dd3 \u0db8\u0dcf\u0dc3\u0dba\u0d9a\u0dca \u0dba\u0db1 \u0dad\u0dd4\u0dbb\u0dd4 \u0dc3\u0da2\u0dd3\u0dc0\u0dd3 \u0db4\u0db1\u0dca\u0dad\u0dd2\u0dc0\u0dbd Recordings, Unlimited \u0db1\u0dd0\u0dbb\u0db9\u0dd3\u0db8\u0dda \u0db4\u0dc4\u0dc3\u0dd4\u0d9a\u0db8\u0dca<br \/>\n\ud83d\udccc \u0d9c\u0dd4\u0dbb\u0dd4\u0dc0\u0dbb\u0dba\u0dcf \u0dc3\u0db8\u0d9f \u0d95\u0db1\u0dd1\u0db8 \u0dc0\u0dd9\u0dbd\u0dcf\u0dc0\u0d9a \u0dc3\u0db8\u0dca\u0db6\u0db1\u0dca\u0db0\u0dc0\u0dd3\u0db8\u0da7, \u0d94\u0dba\u0dcf\u0dbd\u0d9c\u0dd9\u0db8 Private Group \u0d91\u0d9a\u0d9a\u0dca!<br \/>\n\ud83d\udccc \u0d91\u0daf\u0dd2\u0db1\u0dd9\u0daf\u0dcf \u0dc3\u0da2\u0dd3\u0dc0\u0dd3 \u0db4\u0db1\u0dca\u0dad\u0dd2 \u0dc3\u0db3\u0dc4\u0dcf \u0dc3\u0dc4\u0db7\u0dcf\u0d9c\u0dd3 \u0dc0\u0dd9\u0db1 \u0dc3\u0dd1\u0db8 \u0dc3\u0dd2\u0dc3\u0dd4\u0dc0\u0dd9\u0d9a\u0dd4\u0da7\u0db8 \u0dc3\u0dc4\u0db7\u0dcf\u0d9c\u0dd2\u0dc0\u0dd3\u0db8\u0dda \u0dc3\u0dc4\u0dad\u0dd2\u0d9a\u0dba\u0d9a\u0dca!<br \/>\n\ud83d\udccc \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0 \u0d85\u0dc0\u0dc3\u0dcf\u0db1\u0dba\u0dda \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a \u0dc0\u0dd2\u0db7\u0dcf\u0d9c\u0dba\u0d9a\u0dd2\u0db1\u0dca \u0d85\u0db1\u0dad\u0dd4\u0dbb\u0dd4\u0dc0 \u0dbd\u0ddc\u0dc0 Digital Badge \u0d91\u0d9a\u0d9a\u0dca!<br \/>\n\ud83d\udccc \u0d85\u0dc0\u0dc1\u0dca\u200d\u0dba \u0d95\u0db1\u0dd1\u0db8 \u0d85\u0dc0\u0dc3\u0dca\u0dae\u0dcf\u0dc0\u0d9a\u0daf\u0dd2, \u0d9a\u0dca\u0dc2\u0dab\u0dd2\u0d9a\u0dc0 \u0dad\u0dcf\u0d9a\u0dca\u0dc2\u0dab\u0dd2\u0d9a \u0dc3\u0dc4\u0dcf\u0dba \u0dbd\u0db6\u0dcf \u0daf\u0dd9\u0db1 \u0d9a\u0dca\u200d\u0dbb\u0dd2\u0dba\u0dcf\u0dc1\u0dd3\u0dbd\u0dd3 Team \u0d91\u0d9a\u0d9a\u0dca  <\/p>\n<div class=\"fb-background-color\">\n\t\t\t  <div \n\t\t\t  \tclass = \"fb-comments\" \n\t\t\t  \tdata-href = \"https:\/\/elearning.lk\/blog\/cybersecurity-essentials-hacking-techniques-defense-strategies-with-tharaka-mahabage\/\"\n\t\t\t  \tdata-numposts = \"100\"\n\t\t\t  \tdata-lazy = \"true\"\n\t\t\t\tdata-colorscheme = \"light\"\n\t\t\t\tdata-order-by = \"social\"\n\t\t\t\tdata-mobile=true>\n\t\t\t  <\/div><\/div>\n\t\t  <style>\n\t\t    .fb-background-color {\n\t\t\t\tbackground:  !important;\n\t\t\t}\n\t\t\t.fb_iframe_widget_fluid_desktop iframe {\n\t\t\t    width: 100% !important;\n\t\t\t}\n\t\t  <\/style>\n\t\t  ","protected":false},"excerpt":{"rendered":"<p>\u0d94\u0db6\u0dad\u0dca \ud83d\udee1\ufe0f Cybersecurity \u0d9c\u0dd0\u0db1 \u0d89\u0d9c\u0dd9\u0db1 \u0d9c\u0db1\u0dca\u0db1 \u0d86\u0dc3\u0dcf\u0dc0\u0dd9\u0db1\u0dca \u0d89\u0db1\u0dca\u0db1, \u0db1\u0db8\u0dd4\u0dad\u0dca \u0d92 \u0db4\u0dd2\u0dc5\u0dd2\u0db6\u0db3 \u0d9a\u0dd2\u0dc3\u0dd2\u0daf\u0dd4 \u0db8\u0dd6\u0dbd\u0dd2\u0d9a \u0daf\u0dd0\u0db1\u0dd3\u0db8\u0d9a\u0dca \u0db1\u0ddc\u0db8\u0dd0\u0dad\u0dd2 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca \u0daf? \ud83d\udee1\ufe0f \u0d91\u0dc4\u0dd9\u0db8\u0dad\u0dca \u0db1\u0dd0\u0dad\u0dca\u0db1\u0db8\u0dca Certified Ethical Hacker (CEH) Exam \u0d91\u0d9a \u0dc3\u0db3\u0dc4\u0dcf \u0db8\u0dd4\u0dc4\u0dd4\u0dab \u0daf\u0dd3\u0db8\u0da7 \u0db6\u0dbd\u0dcf\u0db4\u0ddc\u0dbb\u0ddc\u0dad\u0dca\u0dad\u0dd4\u0dc0\u0dd9\u0db1\u0dca \u0d89\u0db1\u0dca\u0db1 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca\u0daf? \ud83d\udee1\ufe0f Real-world Hacking Tools \u0db1\u0dd0\u0dad\u0dca\u0db1\u0db8\u0dca Ethical Hacking \u0d9c\u0dd0\u0db1 Study \u0d9a\u0dbb\u0db1\u0dca\u0db1 \u0d9a\u0dd0\u0db8\u0dad\u0dd2 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca \u0daf? \ud83d\udee1\ufe0f Cyber Attacks \u0dc0\u0dbd\u0da7 \u0d91\u0dbb\u0dd9\u0dc4\u0dd2\u0dc0 System \u0d91\u0d9a\u0d9a\u0dca Secure \u0d9a\u0dbb\u0db1\u0dca\u0db1 \u0db4\u0dd4\u0dc5\u0dd4\u0dc0\u0db1\u0dca [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":12050,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"ngg_post_thumbnail":0},"categories":[21],"tags":[],"_links":{"self":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts\/12049"}],"collection":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/comments?post=12049"}],"version-history":[{"count":4,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts\/12049\/revisions"}],"predecessor-version":[{"id":12101,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts\/12049\/revisions\/12101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/media\/12050"}],"wp:attachment":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/media?parent=12049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/categories?post=12049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/tags?post=12049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}