وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

The Complete Certified in Cybersecurity (CC) course ISC2 ’23

سرفصل های دوره

Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 - 2023


1. Introduction
  • 1.1 CC Study Guide by TechSerks.pdf
  • 1. Introduction
  • 2. Important Links.html

  • 2. Domain 1 - Security Principles
  • 1. 1.1 - Security Concepts
  • 2. 1.1.2,.3.4.5 The CIA Triad
  • 3. 1.1.6,1.1.7 - Authentication, IAAA
  • 4. 1.1.8 Non-Repudiation
  • 5. 1.1.9 Privacy
  • 6. 1.2.1 Understanding Risk Management
  • 7. 1.2.2 Understanding Risk Identification
  • 8. 1.2.3 Understanding Risk Assessment
  • 9. 1.2.4 Understanding Risk Treatment
  • 10. 1.2.5 Configuration Management
  • 11. 1.3.1 Security Controls
  • 12. 1.3.2 Technical Controls
  • 13. 1.3.3 Administrative Controls
  • 14. 1.3.4 Physical Controls
  • 15. 1.4.1 ISC2 Code of Ethics
  • 16. 1.5.0 Governance Process
  • 17. 1.5.1 Policies
  • 18. 1.5.2 Procedures
  • 19. 1.5.3 Standards
  • 20. 1.5.4 Regulation and laws
  • 21. 1.5.5 Best practice security policies

  • 3. Domain 2 - BC And DR And Incident Response Concepts
  • 1. 2.1.1 Domain 2 objectives
  • 2. 2.1.2 What is Business Continuity
  • 3. 2.1.3 Business Continuity Planning
  • 4. 2.1.4 Business Continuity Controls
  • 5. 2.1.5 What is high availability
  • 6. 2.1.6 What is fault tolerance
  • 7. 2.2.1 What is disaster recovery
  • 8. 2.2.2 Disaster recovery planning
  • 9. 2.2.3 Data backup
  • 10. 2.2.4 Types of disaster recovery sites
  • 11. 2.3.1 What is incident response
  • 12. 2.3.2 Create a incident response program
  • 13. 2.3.3 Create an incident response team
  • 14. 2.3.4 Incident communication planning
  • 15. 2.3.5 Identify incidents

  • 4. Domain 3 - Access Control Concepts
  • 1. 3.1.1 Domain 3 objectives
  • 2. 3.1.2 Physical security controls types
  • 3. 3.1.3 Monitoring physical access
  • 4. 3.1.4 Visitors management
  • 5. 3.1.5 Differences between Authorised and Non-authorised personnel
  • 6. 3.2.1 What is logical access controls
  • 7. 3.2.2 What is principle of least privilge
  • 8. 3.2.3 What is segregation of duties
  • 9. 3.2.4 What is DAC
  • 10. 3.2.5 What is MAC
  • 11. 3.2.6 What is RBAC

  • 5. Domain 4 - Network Security
  • 1. 4.1.1 Domain Objectives
  • 2. 4.1.2 Network types
  • 3. 4.1.3 Introducing TCP IP
  • 4. 4.1.4 The OSI Model
  • 5. 4.1.5 IP Addresses and DHCP
  • 6. 4.1.6 Network Ports
  • 7. 4.1.7 Network Cables
  • 8. 4.1.8 WiFi
  • 9. 4.1.9 VLANs
  • 10. 4.1.10 VPNs
  • 11. 4.2.1 Types of threats
  • 12. 4.2.2 Intrusion Detection and Prevention Systems
  • 13. 4.2.3 Malware Preventions
  • 14. 4.2.4 Port Scanners
  • 15. 4.2.5 Vulnerability Scanners
  • 16. 4.2.6 Firewalls
  • 17. 4.2.7 Honeynets and Honeypots
  • 18. 4.2.8 SIEM and SOAR systems
  • 19. 4.3.1 Types of Infrastracture, On-Premise, Cloud and Hybrid
  • 20. 4.3.2 Data center protection
  • 21. 4.3.3 Security Zones
  • 22. 4.3.4 Routers and Switches
  • 23. 4.3.5 VLANs and Network segmentation
  • 24. 4.3.6 Firewalls
  • 25. 4.3.7 VPNs and VPN Concentrator
  • 26. 4.3.8 Internet of Things (IoT)
  • 27. 4.3.9 Security IoT devices
  • 28. 4.3.10 Network Security for Smart devices

  • 6. Domain 5 - Security Operations
  • 1. 5.1.1 Domain Objectives
  • 2. 5.1.2 What is Data and Data Security
  • 3. 5.1.3 Understanding Encryption
  • 4. 5.1.4 Differences between symmetric vs asymmetric cryptography
  • 5. 5.1.5 Hashing
  • 6. 5.1.6 Data Handling
  • 7. 5.1.7 Data Classification
  • 8. 5.1.8 Logging and Monitoring Security Events
  • 9. 5.2.1 What is Configuration Management
  • 10. 5.2.2 Patch Management
  • 11. 5.3.1 Data Handling Policiess
  • 12. 5.3.2 Password Policies
  • 13. 5.3.3 Acceptable Use Policy (AUP)
  • 14. 5.3.4 Bring Your Own Device (BYOD) Policy
  • 15. 5.3.5 Change management
  • 16. 5.3.6 Privacy Policy
  • 17. 5.4.1 Social Engineering
  • 18. 5.4.2 Security Awareness Training

  • 7. Practice Exam Questions
  • 1. Practice Exam 1.html
  • 2. Practice Exam 2.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 18470
    حجم: 2177 مگابایت
    مدت زمان: 346 دقیقه
    تاریخ انتشار: 3 شهریور 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید