{"id":12170,"date":"2025-11-12T16:42:32","date_gmt":"2025-11-12T16:42:32","guid":{"rendered":"https:\/\/elearning.lk\/blog\/?p=12170"},"modified":"2026-01-30T08:00:27","modified_gmt":"2026-01-30T08:00:27","slug":"cybersecurity-essentials-hacking-techniques-defense-strategies-with-tharaka-mahabage-session-02","status":"publish","type":"post","link":"https:\/\/elearning.lk\/blog\/cybersecurity-essentials-hacking-techniques-defense-strategies-with-tharaka-mahabage-session-02\/","title":{"rendered":"Cybersecurity Essentials: Hacking Techniques &#038; Defense Strategies with Tharaka Mahabage &#8211; Session 02"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p>\ud83d\udd13 FREE Seminar: Become a Practical Ethical Hacker \u2013 From Beginner to Pro! \ud83d\udd10<\/p>\n<p>\u0d94\u0db6\u0dad\u0dca:<br \/>\n\ud83d\udee1\ufe0f Cybersecurity \u0d9c\u0dd0\u0db1 \u0d89\u0d9c\u0dd9\u0db1 \u0d9c\u0dd0\u0db1\u0dd3\u0db8\u0da7 \u0d86\u0dc3\u0dcf\u0dc0\u0dd9\u0db1\u0dca \u0dc3\u0dd2\u0da7\u0dd2\u0db1, \u0db1\u0db8\u0dd4\u0dad\u0dca \u0d92 \u0db4\u0dd2\u0dc5\u0dd2\u0db6\u0db3 \u0d9a\u0dd2\u0dc3\u0dd2\u0daf\u0dd4 \u0db8\u0dd6\u0dbd\u0dd2\u0d9a \u0daf\u0dd0\u0db1\u0dd4\u0db8\u0d9a\u0dca \u0db1\u0ddc\u0db8\u0dd0\u0dad\u0dd2 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca\u0daf?<br \/>\n\ud83d\udee1\ufe0f CEH v13 | CompTIA Security+ | NIST CSF \u0dc0\u0dd0\u0db1\u0dd2 \u0da2\u0dcf\u0dad\u0dca\u200d\u0dba\u0db1\u0dca\u0dad\u0dbb \u0db4\u0dca\u200d\u0dbb\u0db8\u0dd2\u0dad\u0dd3\u0db1\u0dca\u0da7 \u0d9c\u0dd0\u0dc5\u0db4\u0dd9\u0db1 Job-Ready \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0d9a\u0dca \u0dc3\u0ddc\u0dba\u0db1\u0dc0\u0dcf\u0daf?<br \/>\n\ud83d\udee1\ufe0f Real-world Hacking Tools, Threat Detection \u0dc3\u0dc4 Defense Labs \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a\u0dc0 \u0db4\u0dd4\u0dc4\u0dd4\u0dab\u0dd4 \u0dc0\u0dd3\u0db8\u0da7 \u0d9a\u0dd0\u0db8\u0dad\u0dd2\u0daf?<\/p>\n<p>\ud83d\udcbb \u0d91\u0dc3\u0dda\u0db1\u0db8\u0dca Cybersecurity \u0d9c\u0dd0\u0db1 \u0db8\u0dd4\u0dbd \u0dc3\u0dd2\u0da7 \u0dbb\u0dd0\u0d9a\u0dd2\u0dba\u0dcf\u0dc0\u0d9a\u0da7 \u0dc3\u0dd4\u0daf\u0dd4\u0dc3\u0dd4 \u0db8\u0da7\u0dca\u0da7\u0db8 (Beginner to Job-Ready) \u0daf\u0d9a\u0dca\u0dc0\u0dcf \u0d89\u0d9c\u0dd9\u0db1 \u0d9c\u0db1\u0dca\u0db1 \u0db4\u0dd4\u0dc5\u0dd4\u0dc0\u0db1\u0dca \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0d9a\u0dca eLearning.lk \u0d85\u0db4\u0dd2 \u0d94\u0db6 \u0dc0\u0dd9\u0dad \u0d9c\u0dd9\u0db1 \u0d91\u0db1\u0dc0\u0dcf. \u0db8\u0dd9\u0db8 \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0 CEH v13 | CompTIA Security+ | NIST CSF \u0dc0\u0dd0\u0db1\u0dd2 \u0da2\u0dcf\u0dad\u0dca\u200d\u0dba\u0db1\u0dca\u0dad\u0dbb \u0db4\u0dca\u200d\u0dbb\u0db8\u0dd2\u0dad\u0dd3\u0db1\u0dca\u0da7 \u0d9c\u0dd0\u0dc5\u0db4\u0dd9\u0db1 \u0db4\u0dbb\u0dd2\u0daf\u0dd2 \u0dc3\u0d9a\u0dc3\u0dca \u0d9a\u0dbb\u0dbd\u0dcf \u0dad\u0dd2\u0dba\u0dd9\u0db1, \u0dc0\u0dd2\u0dc2\u0dba \u0db4\u0dd2\u0dc5\u0dd2\u0db6\u0db3\u0dc0 \u0d9a\u0dd2\u0dc3\u0dd2\u0daf\u0dd4 \u0db4\u0dd6\u0dbb\u0dca\u0dc0 \u0daf\u0dd0\u0db1\u0dd3\u0db8\u0d9a\u0dca \u0db1\u0dd0\u0dad\u0dd2 \u0d95\u0db1\u0dd1\u0db8 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dd4\u0da7 \u0dc3\u0db8\u0dca\u0db6\u0db1\u0dca\u0db0 \u0dc0\u0dd9\u0db1\u0dca\u0db1 \u0db4\u0dd4\u0dc5\u0dd4\u0dc0\u0db1\u0dca Online \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0d9a\u0dca.  <\/p>\n<p>\ud83d\udd13 \u0d9a\u0dca\u0dc2\u0dda\u0dad\u0dca\u200d\u0dbb\u0dba\u0dda \u0db4\u0dca\u200d\u0dbb\u0dc0\u0dd3\u0dab \u0d9c\u0dd4\u0dbb\u0dd4\u0dc0\u0dbb\u0dba\u0dd9\u0d9a\u0dca \u0dc0\u0db1 Tharaka Mahabage \u0db8\u0dc4\u0dad\u0dcf \u0db8\u0dd9\u0dc4\u0dd9\u0dba\u0dc0\u0db1 \u0db8\u0dd9\u0db8 \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0 \u0d85\u0dc0\u0dc3\u0dcf\u0db1\u0dba\u0dda\u0daf\u0dd3, \u0d94\u0dba\u0dcf\u0dbd\u0da7 Cybersecurity \u0d9a\u0dca\u0dc2\u0dda\u0dad\u0dca\u200d\u0dbb\u0dba\u0dda \u0dbb\u0dd0\u0d9a\u0dd2\u0dba\u0dcf\u0dc0\u0d9a\u0dca \u0d9a\u0dbb\u0db1\u0dca\u0db1 \u0d85\u0dc0\u0dc1\u0dca\u200d\u0dba \u0db8\u0dd6\u0dbd\u0dd2\u0d9a\u0db8 \u0dc3\u0dd4\u0daf\u0dd4\u0dc3\u0dd4\u0d9a\u0db8\u0dca \u0da7\u0dd2\u0d9a \u0d89\u0dad\u0dcf\u0db8\u0dad\u0dca \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a \u0dc0\u0dd2\u0daf\u0dd2\u0dba\u0da7 \u0db8\u0dcf\u0dc3 \u0dad\u0dd4\u0db1\u0d9a\u0dca \u0d87\u0dad\u0dd4\u0dc5\u0dad \u0d85\u0db4\u0dd2 \u0dc3\u0db4\u0dd4\u0dbb\u0dbd\u0dcf \u0daf\u0dd9\u0db1\u0dc0\u0dcf.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/eB_WctYsB2Y?si=zEGBa7uqo251m7FA\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>\u270d\ufe0f \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0da7 \u0db8\u0dd9\u0dad\u0db1\u0dd2\u0db1\u0dca Register \u0dc0\u0dd9\u0db8\u0dd4 &#8211; <a href=\"https:\/\/elearning.lk\/courses?course_search=cybersecurity\" rel=\"noopener\" target=\"_blank\">https:\/\/elearning.lk\/courses?course_search=cybersecurity<\/a><\/p>\n<p>\ud83d\udcf1 WhatsApp Group \u0d91\u0d9a\u0dad\u0dca \u0d91\u0d9a\u0dca\u0d9a Join \u0dc0\u0dd9\u0db1\u0dca\u0db1: <a href=\"https:\/\/chat.whatsapp.com\/JeEylH71zqDDvKKf2OXeXB\" rel=\"noopener\" target=\"_blank\">https:\/\/chat.whatsapp.com\/JeEylH71zqDDvKKf2OXeXB<\/a><\/p>\n<p>\ud83d\udc49 075 6 700 700 (Direct Calls)<br \/>\n\ud83d\udc49 075 954 1398, 075 987 3655 (WhatsApp Messages)<br \/>\n&#8212;&#8212;&#8211;<\/p>\n<p>\ud83d\udccd \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf \u0d9a\u0dcf\u0dbd\u0dba : \u0dc3\u0dad\u0dd2 \u0daf\u0dc4\u0dba\u0dba\u0dd2 (\u0db4\u0dd0\u0dba 40)<br \/>\n\ud83d\udccd \u0d86\u0dbb\u0db8\u0dca\u0db7\u0d9a \u0daf\u0dd2\u0db1\u0dba : 2025.11.20<br \/>\n\ud83d\udccd \u0d85\u0dc0\u0dc3\u0dcf\u0db1 \u0daf\u0dd2\u0db1\u0dba : 2026.02.10<br \/>\n\ud83d\udccd \u0daf\u0dd2\u0db1\u0dba \u0dc3\u0dc4 \u0dc0\u0dda\u0dbd\u0dcf\u0dc0 : \u0dc3\u0dd1\u0db8 \u0db6\u0daf\u0dcf\u0daf\u0dcf \u0dc3\u0dc4 \u0db6\u0dca\u200d\u0dbb\u0dc4\u0dc3\u0dca\u0db4\u0dad\u0dd2\u0db1\u0dca\u0daf\u0dcf \u0daf\u0dd2\u0db1\u0d9a\u0db8 \u0dbb\u0dcf\u0dad\u0dca\u200d\u0dbb\u0dd3 8.00 \u0dc3\u0dd2\u0da7 \u0dbb\u0dcf\u0dad\u0dca\u200d\u0dbb\u0dd3 10.00 \u0daf\u0d9a\u0dca\u0dc0\u0dcf<br \/>\n\ud83d\udccd \u0db8\u0dcf\u0db0\u0dca\u200d\u0dba\u0dba : \u0dc3\u0dd2\u0d82\u0dc4\u0dbd \/ English<br \/>\n&#8212;&#8212;&#8211;<\/p>\n<p>\u0d94\u0db6 \u0d89\u0d9c\u0dd9\u0db1\u0d9c\u0db1\u0dca\u0db1\u0dcf \u0daf\u0dda\u0dc0\u0dbd\u0dca \u0d9a\u0dd2\u0dc4\u0dd2\u0db4\u0dba\u0d9a\u0dca&#8230;<br \/>\n\ud83e\uddff Lesson 1: Cybersecurity Fundamentals<br \/>\n\ud83e\uddff Lesson 2: Network Security &#038; Monitoring<br \/>\n\ud83e\uddff Lesson 3: Information Gathering &#038; Reconnaissance<br \/>\n\ud83e\uddff Lesson 4: Vulnerability Assessment &#038; Risk Prioritization<br \/>\n\ud83e\uddff Lesson 5: Operating System Security &#038; Privilege Management<br \/>\n\ud83e\uddff Lesson 6: Web &#038; Application Security Essentials<br \/>\n\ud83e\uddff Lesson 7: System Hardening &#038; Security Monitoring<br \/>\n\ud83e\uddff Lesson 8: Cloud Security Fundamentals<br \/>\n\ud83e\uddff Lesson 9: Incident Response &#038; Reporting<br \/>\n\ud83e\uddff Lesson 10: Security Assessment &#038; Career Path Planning<br \/>\n\ud83e\uddff Lesson 11: Bug Bounty &#038; Responsible Disclosure<br \/>\n\u0dc3\u0db8\u0dca\u0db4\u0dd6\u0dbb\u0dca\u0dab \u0dc0\u0dd2\u0dc2\u0dba \u0db1\u0dd2\u0dbb\u0dca\u0daf\u0dda\u0dc1\u0dba: <a href=\"https:\/\/elearning.lk\/sl\/cybersecurity-essentials-b2-syllabus\" rel=\"noopener\" target=\"_blank\">https:\/\/elearning.lk\/sl\/cybersecurity-essentials-b2-syllabus<\/a><br \/>\n&#8212;&#8212;&#8211;<\/p>\n<p>\ud83c\udff7\ufe0f \u0db8\u0dd2\u0dbd: \u0dbb\u0dd4.20,000<br \/>\n\ud83c\udff7\ufe0f \u0dc3\u0db8\u0dca\u0db4\u0dd6\u0dbb\u0dca\u0dab \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf \u0d9c\u0dcf\u0dc3\u0dca\u0dad\u0dd4\u0dc0 \u0d91\u0d9a\u0dc0\u0dbb \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0d9a\u0dca \u0d94\u0dc3\u0dca\u0dc3\u0dda (One-time Payment) \u0dc3\u0db8\u0dca\u0db6\u0db1\u0dca\u0db0 \u0dc0\u0db1 \u0dc3\u0dd2\u0dc3\u0dd4\u0db1\u0dca\u0da7 20%\u0d9a \u0db8\u0dd2\u0dbd \u0d85\u0da9\u0dd4 \u0d9a\u0dd2\u0dbb\u0dd3\u0db8\u0d9a\u0dca \u0dbd\u0dd0\u0db6\u0dda (\u0dbb\u0dd4.16,000\u0d9a\u0dca \u0db4\u0db8\u0dab\u0dd2)<br \/>\n\ud83c\udff7\ufe0f \u0dc3\u0db8\u0dca\u0db4\u0dd6\u0dbb\u0dca\u0dab \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf \u0d9c\u0dcf\u0dc3\u0dca\u0dad\u0dd4\u0dc0 \u0d91\u0d9a\u0dc0\u0dbb \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0da7 \u0d85\u0db4\u0dc4\u0dc3\u0dd4 \u0dc3\u0dd2\u0dc3\u0dd4\u0db1\u0dca\u0da7 \u0dc0\u0dcf\u0dbb\u0dd2\u0d9a \u0daf\u0dd9\u0d9a\u0d9a\u0dd2\u0db1\u0dca \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0dca \u0d9a\u0da7\u0dba\u0dd4\u0dad\u0dd4 \u0dc3\u0dd2\u0daf\u0dd4 \u0d9a\u0dc5 \u0dc4\u0dd0\u0d9a<br \/>\n\ud83c\udff7\ufe0f Website \u0d91\u0d9a \u0dc4\u0dbb\u0dc4\u0dcf \u0dc4\u0ddd Bank Transaction \u0d91\u0d9a\u0d9a\u0dca \u0dbd\u0dd9\u0dc3 \u0d9c\u0dd9\u0dc0\u0dd3\u0db8\u0dca \u0dc3\u0dd2\u0daf\u0dd4 \u0d9a\u0dc5 \u0dc4\u0dd0\u0d9a<br \/>\n&#8212;&#8212;&#8211;<\/p>\n<p>\ud83d\udcaa \u0d87\u0dba\u0dd2 \u0d85\u0db4\u0dd2 \u0dc0\u0dd2\u0dc1\u0dda\u0dc2?<br \/>\n\ud83d\udccc 2018 \u0dc0\u0dc3\u0dbb\u0dda \u0dc3\u0dd2\u0da7\u0db8 \u0dc1\u0dca\u200d\u0dbb\u0dd3 \u0dbd\u0d82\u0d9a\u0dcf\u0dc0\u0dda Online Education \u0d9a\u0dca\u0dc2\u0dda\u0dad\u0dca\u200d\u0dbb\u0dba\u0dda \u0d85\u0dad\u0dd2\u0daf\u0dd0\u0dc0\u0dd0\u0db1\u0dca\u0dad\u0dba\u0ddd<br \/>\n\ud83d\udccc \u0dc3\u0dd1\u0db8 \u0dc0\u0dd2\u0dc2\u0dba \u0d9a\u0dbb\u0dd4\u0dab\u0d9a\u0dca\u0db8 \u0db8\u0dd4\u0dbd \u0dc3\u0dd2\u0da7 \u0d85\u0d9c\u0da7, \u0d9a\u0dca\u200d\u0dbb\u0db8\u0dcf\u0db1\u0dd4\u0d9a\u0dd6\u0dbd\u0dc0, \u0db4\u0dd2\u0dba\u0dc0\u0dbb\u0dd9\u0db1\u0dca \u0db4\u0dd2\u0dba\u0dc0\u0dbb, \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a\u0dc0, \u0daf\u0db1\u0dca\u0db1 \u0dc3\u0dd2\u0d82\u0dc4\u0dbd\u0dd9\u0db1\u0dca \u0d8b\u0d9c\u0db1\u0dca\u0dc0\u0db1\u0dc0\u0dcf<br \/>\n\ud83d\udccc \u0db4\u0dd0\u0dba 24 \u0db4\u0dd4\u0dbb\u0dcf\u0db8 Update \u0dc0\u0dd9\u0db1 AI Technologies &#038; Tools \u0d9c\u0dd0\u0db1 \u0d85\u0db4\u0dd2 \u0d9a\u0dd2\u0dba\u0dbd\u0dcf \u0daf\u0dd9\u0db1\u0dc0\u0dcf<br \/>\n\ud83d\udccc \u0db4\u0dd2\u0da7\u0dc3\u0dca\u0dad\u0dbb \u0d85\u0dba\u0da7 \u0d87\u0dad\u0dd4\u0dc5\u0dd4\u0dc0\u0dd9\u0db1\u0dca\u0db1 \u0db6\u0dd0\u0dbb\u0dd2 \u0d85\u0db0\u0dd2\u0d86\u0dbb\u0d9a\u0dca\u0dc2\u0dd2\u0dad Online \u0db4\u0db1\u0dca\u0dad\u0dd2<br \/>\n\ud83d\udccc Boring \u0db1\u0dd0\u0dad\u0dd4\u0dc0 \u0dc0\u0dd2\u0db1\u0ddd\u0daf\u0dba\u0dd9\u0db1\u0dca \u0d89\u0d9c\u0dd0\u0db1\u0dca\u0dc0\u0dd3\u0db8\u0dda \u0dc3\u0dd4\u0dc0\u0dd2\u0dc1\u0dda\u0dc2\u0dd3 \u0dc1\u0ddb\u0dbd\u0dd3\u0db1\u0dca<br \/>\n\ud83d\udccc Microlearning Concepts \u0db7\u0dcf\u0dc0\u0dd2\u0dad\u0dba (\u0d9a\u0dd9\u0da7\u0dd2 \u0d9a\u0dcf\u0dbd\u0dba\u0d9a\u0dd2\u0db1\u0dca \u0dc0\u0dd0\u0da9\u0dd2 \u0d89\u0d9c\u0dd0\u0db1\u0dca\u0dc0\u0dd3\u0db8\u0d9a\u0dca)<br \/>\n\ud83d\udccc \u0dc0\u0dd2\u0dc0\u0dd2\u0db0 \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a \u0d9a\u0dca\u200d\u0dbb\u0dd2\u0dba\u0dcf\u0d9a\u0dcf\u0dbb\u0d9a\u0db8\u0dca<br \/>\n\ud83d\udccc \u0dc3\u0dd1\u0db8 \u0dc3\u0dd2\u0dc3\u0dd4\u0dc0\u0dd9\u0d9a\u0dca \u0d9c\u0dd0\u0db1\u0db8 \u0dc0\u0dd2\u0dc1\u0dda\u0dc2 \u0d85\u0dc0\u0db0\u0dcf\u0db1\u0dba<br \/>\n\ud83d\udccc \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0 \u0d85\u0dc0\u0dc3\u0db1\u0dca \u0dc0\u0dd3 \u0db8\u0dcf\u0dc3\u0dba\u0d9a\u0dca \u0dba\u0db1 \u0dad\u0dd4\u0dbb\u0dd4 \u0dc3\u0da2\u0dd3\u0dc0\u0dd3 \u0db4\u0db1\u0dca\u0dad\u0dd2\u0dc0\u0dbd Recordings, Unlimited \u0db1\u0dd0\u0dbb\u0db9\u0dd3\u0db8\u0dda \u0db4\u0dc4\u0dc3\u0dd4\u0d9a\u0db8\u0dca<br \/>\n\ud83d\udccc \u0d9c\u0dd4\u0dbb\u0dd4\u0dc0\u0dbb\u0dba\u0dcf \u0dc3\u0db8\u0d9f \u0d95\u0db1\u0dd1\u0db8 \u0dc0\u0dd9\u0dbd\u0dcf\u0dc0\u0d9a \u0dc3\u0db8\u0dca\u0db6\u0db1\u0dca\u0db0\u0dc0\u0dd3\u0db8\u0da7, \u0d94\u0dba\u0dcf\u0dbd\u0d9c\u0dd9\u0db8 Private Group \u0d91\u0d9a\u0d9a\u0dca!<br \/>\n\ud83d\udccc \u0d91\u0daf\u0dd2\u0db1\u0dd9\u0daf\u0dcf \u0dc3\u0da2\u0dd3\u0dc0\u0dd3 \u0db4\u0db1\u0dca\u0dad\u0dd2 \u0dc3\u0db3\u0dc4\u0dcf \u0dc3\u0dc4\u0db7\u0dcf\u0d9c\u0dd3 \u0dc0\u0dd9\u0db1 \u0dc3\u0dd1\u0db8 \u0dc3\u0dd2\u0dc3\u0dd4\u0dc0\u0dd9\u0d9a\u0dd4\u0da7\u0db8 \u0dc3\u0dc4\u0db7\u0dcf\u0d9c\u0dd2\u0dc0\u0dd3\u0db8\u0dda \u0dc3\u0dc4\u0dad\u0dd2\u0d9a\u0dba\u0d9a\u0dca!<br \/>\n\ud83d\udccc \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0 \u0d85\u0dc0\u0dc3\u0dcf\u0db1\u0dba\u0dda \u0db4\u0dca\u200d\u0dbb\u0dcf\u0dba\u0ddd\u0d9c\u0dd2\u0d9a \u0dc0\u0dd2\u0db7\u0dcf\u0d9c\u0dba\u0d9a\u0dd2\u0db1\u0dca \u0d85\u0db1\u0dad\u0dd4\u0dbb\u0dd4\u0dc0 \u0dbd\u0ddc\u0dc0 Digital Badge \u0d91\u0d9a\u0d9a\u0dca!<br \/>\n\ud83d\udccc \u0d85\u0dc0\u0dc1\u0dca\u200d\u0dba \u0d95\u0db1\u0dd1\u0db8 \u0d85\u0dc0\u0dc3\u0dca\u0dae\u0dcf\u0dc0\u0d9a\u0daf\u0dd2, \u0d9a\u0dca\u0dc2\u0dab\u0dd2\u0d9a\u0dc0 \u0dad\u0dcf\u0d9a\u0dca\u0dc2\u0dab\u0dd2\u0d9a \u0dc3\u0dc4\u0dcf\u0dba \u0dbd\u0db6\u0dcf \u0daf\u0dd9\u0db1 \u0d9a\u0dca\u200d\u0dbb\u0dd2\u0dba\u0dcf\u0dc1\u0dd3\u0dbd\u0dd3 Team \u0d91\u0d9a\u0d9a\u0dca  <\/p>\n<div class=\"fb-background-color\">\n\t\t\t  <div \n\t\t\t  \tclass = \"fb-comments\" \n\t\t\t  \tdata-href = \"https:\/\/elearning.lk\/blog\/cybersecurity-essentials-hacking-techniques-defense-strategies-with-tharaka-mahabage-session-02\/\"\n\t\t\t  \tdata-numposts = \"100\"\n\t\t\t  \tdata-lazy = \"true\"\n\t\t\t\tdata-colorscheme = \"light\"\n\t\t\t\tdata-order-by = \"social\"\n\t\t\t\tdata-mobile=true>\n\t\t\t  <\/div><\/div>\n\t\t  <style>\n\t\t    .fb-background-color {\n\t\t\t\tbackground:  !important;\n\t\t\t}\n\t\t\t.fb_iframe_widget_fluid_desktop iframe {\n\t\t\t    width: 100% !important;\n\t\t\t}\n\t\t  <\/style>\n\t\t  ","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd13 FREE Seminar: Become a Practical Ethical Hacker \u2013 From Beginner to Pro! \ud83d\udd10 \u0d94\u0db6\u0dad\u0dca: \ud83d\udee1\ufe0f Cybersecurity \u0d9c\u0dd0\u0db1 \u0d89\u0d9c\u0dd9\u0db1 \u0d9c\u0dd0\u0db1\u0dd3\u0db8\u0da7 \u0d86\u0dc3\u0dcf\u0dc0\u0dd9\u0db1\u0dca \u0dc3\u0dd2\u0da7\u0dd2\u0db1, \u0db1\u0db8\u0dd4\u0dad\u0dca \u0d92 \u0db4\u0dd2\u0dc5\u0dd2\u0db6\u0db3 \u0d9a\u0dd2\u0dc3\u0dd2\u0daf\u0dd4 \u0db8\u0dd6\u0dbd\u0dd2\u0d9a \u0daf\u0dd0\u0db1\u0dd4\u0db8\u0d9a\u0dca \u0db1\u0ddc\u0db8\u0dd0\u0dad\u0dd2 \u0d9a\u0dd9\u0db1\u0dd9\u0d9a\u0dca\u0daf? \ud83d\udee1\ufe0f CEH v13 | CompTIA Security+ | NIST CSF \u0dc0\u0dd0\u0db1\u0dd2 \u0da2\u0dcf\u0dad\u0dca\u200d\u0dba\u0db1\u0dca\u0dad\u0dbb \u0db4\u0dca\u200d\u0dbb\u0db8\u0dd2\u0dad\u0dd3\u0db1\u0dca\u0da7 \u0d9c\u0dd0\u0dc5\u0db4\u0dd9\u0db1 Job-Ready \u0db4\u0dcf\u0da8\u0db8\u0dcf\u0dbd\u0dcf\u0dc0\u0d9a\u0dca \u0dc3\u0ddc\u0dba\u0db1\u0dc0\u0dcf\u0daf? \ud83d\udee1\ufe0f Real-world Hacking Tools, Threat Detection \u0dc3\u0dc4 Defense Labs [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":12171,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"ngg_post_thumbnail":0},"categories":[21],"tags":[],"_links":{"self":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts\/12170"}],"collection":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/comments?post=12170"}],"version-history":[{"count":2,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts\/12170\/revisions"}],"predecessor-version":[{"id":12244,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/posts\/12170\/revisions\/12244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/media\/12171"}],"wp:attachment":[{"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/media?parent=12170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/categories?post=12170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elearning.lk\/blog\/wp-json\/wp\/v2\/tags?post=12170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}