وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISA Domain 5 Training – Protection of Information Assets

سرفصل های دوره

Protection of Information Assets - ISACA CISA Training ' 2023


1. Section 0 - Course Introduction
  • 1. 1-CISA0-Welcome to the Course
  • 2. 2-CISA0-What is CISA Certification

  • 2. Section 1 - Security Foundations
  • 1. 1-CISA5-The Security Objective and CIA Triad
  • 2. 2-CISA5-Security vs Privacy and Essential Security Terms
  • 3. 3-CISA5-Privacy Requirements and regulations
  • 4. 4-CISA5-Security Vulnerabilities Overview
  • 5. 5-CISA5-Cyber Kill Chain, the Process of Hacking into systems
  • 6. 6-CISA5-Cyber attacks Explanations - DoS DDoS Buffer overflow and MiTM
  • 7. 7-CISA5-Web Application Attacks
  • 8. 8-CISA5-Malware Types and Other Attacks
  • 9. 9-CISA5-Password Attacks and Rainbow Tables

  • 3. Section 2 - Personnel and Supply Chain Security
  • 1. 10-CISA5-Social Engineering
  • 2. 11-CISA5-Security Awareness Program
  • 3. 12-CISA5-Securing Supply Chain and Supply Chain Risk Management

  • 4. Section 3 - AAA
  • 1. 13-CISA5-The IAAA Framework
  • 2. 14-CISA5-MFA and Biometric
  • 3. 15-CISA5-Single Sign on (SSO) and Reduced Sign on (RSO)
  • 4. 16-CISA5-Authorisation and Access Control Models
  • 5. 17-CISA5-Owner and Custodian and their responsibilities in Assets protection

  • 5. Section 4 - Physical Security
  • 1. 18-CISA5-What is Physical Security
  • 2. 19-CISA5-Physical Access Control System 1
  • 3. 20-CISA5-Physical Access Control System 2
  • 4. 21-CISA5-Environmental Controls - Securing Power Sources
  • 5. 22-CISA5-Environmental Controls - Fire Threat and Controls
  • 6. 23-CISA5-Physical Security Best Practices

  • 6. Section 5 - Data Security
  • 1. 24-CISA5-Data Lifecycle
  • 2. 25-CISA5-Roles in Data and Assets Protection
  • 3. 26-CISA5-Privacy Regulation Roles
  • 4. 27-CISA5-Data Security Measures
  • 5. 28-CISA5-Data Classification
  • 6. 29-CISA5-Data Destruction
  • 7. 30-CISA5-RACI Matrix

  • 7. Section 6 - Cryptography
  • 1. 31-CISA5-Cryptography Overview
  • 2. 32-CISA5-Symmetric Encryption
  • 3. 33-CISA5-Asymmetric Encryption Overview
  • 4. 34-CISA5-Asymmetric Encryption Benefits
  • 5. 35-CISA5-Digital Certificate
  • 6. 36-CISA5-Public Key Infrastructure
  • 7. 37-CISA5-Integrity Hashing and Salting
  • 8. 38-CISA5-Encryption vs Hashing vs Encoding
  • 9. 39-CISA5-Digital Signature
  • 10. 40-CISA5-Cryptography Applications in IT

  • 8. Section 7 - Network Security
  • 1. 41-CISA5-Organization IT Infrastructure and Security Overview
  • 2. 42-CISA5-Network Segmentation and VLANs
  • 3. 43-CISA5-Firewalls
  • 4. 44-CISA5-Network Admission Control
  • 5. 45-CISA5-DMZ and Bastian Host
  • 6. 46-CISA5-Proxy, Load Balancer, Email Security

  • 9. Section 8 - Endpoint Security
  • 1. 47-CISA5-End-user Security Software Overview
  • 2. 48-CISA5-Endpoint Protection Platform Overview - EPP
  • 3. 49-CISA5-Endpoint security best practices

  • 10. Practice Exams - Domain 5
  • 1. Exam 1 - Domain 5.html
  • 2. Exam 2- Domain 5.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 21679
    حجم: 2657 مگابایت
    مدت زمان: 495 دقیقه
    تاریخ انتشار: 7 آبان 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید