وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Become a SOC Analyst – Level 3

سرفصل های دوره

1. CompTIA CASP (CAS-004)
    Module 1 - About the Exam and Certification
  • 1.1 Course Welcome and Introduction
  • 1.2 CASP+ Overview
  • 1.3 CASP+ Course Overview
    Module 2 - Security Architecture
  • 2.1 Network Security Architecture Part 1
  • 2.2 Network Security Architecture Part 2
  • 2.3 Secure Infrastructure Design
  • 2.4 Integrating Software Applications Part 1
  • 2.5 Integrating Software Applications Part 2
  • 2.6 Software Development Activities
  • 2.7 Data Security and the Data Life Cycle
  • 2.8 Authentication
  • 2.9 Authorization Controls
  • 2.10 Virtualization and Cloud Technology
  • 2.11 Emerging Technologies
    Module 3 - Security Operations
  • 3.1 Threat Management
  • 3.2 Threat Management Frameworks
  • 3.3 Indicators of Compromise
  • 3.4 Vulnerability Management
  • 3.5 Vulnerability Assessments
  • 3.6 Vulnerability Risk Mitigation Part 1
  • 3.7 Vulnerability Risk Mitigation Part 2
  • 3.8 Techniques for Risk Reduction
  • 3.9 Incident Response
  • 3.10 Forensics Concepts
  • 3.11 Forensics Tools
    Module 4 - Security Engineering and Cryptography
  • 4.1 Enterprise Mobility Security Part 1
  • 4.2 Enterprise Mobility Security Part 2
  • 4.3 Endpoint Security - Hardening Part 1
  • 4.4 Endpoint Security - Hardening Part 2
  • 4.5 Sector-Specific Technology Security Concerns
  • 4.6 ICS Protocols
  • 4.7 Security Implications of Cloud Technology Adoption
  • 4.8 Cryptography
  • 4.9 Implementing Public Key Infrastructure
  • 4.10 Implementing PKI Solutions
  • 4.11 Common Certificate Implementation Issues
    Module 5 - Governance, Risk, and Compliance
  • 5.1 Understanding Risk
  • 5.2 The Risk Life Cycle
  • 5.3 Vendor Risk
  • 5.4 Governance and Compliance Part 1
  • 5.5 Governance and Compliance Part 2
  • 5.6 Business Impact Analysis
  • 5.7 Disaster Recovery Plans
    Module 6 - Preparing for Your Exam
  • 6.1 Course Recap
  • 6.2 Study Strategies
  • 6.3 Exam Time - Strategies for Success
    Resources
  • CASP Glossary.pdf
  • CASP Resources.pdf
  • CASP Syllabus.pdf

2. OWASP Top 10 - 2021
    Module 1 - Introduction
  • 1.1 Introduction
  • 1.2 An Introduction to OWASP
  • 1.3 The OWASP Top 10
  • 1.4 OWASP Web Security Testing Guide (WSTG)
  • 1.5 Using Intercepting Proxies in Web Application Security Testing
  • 1.6 Video Demonstration of Using Intercepting Proxies
  • 1.7 Video Demonstration of Using OWASP Mutillidae
    Resources
  • OWASP Top 10 2021 Complete Syllabus.pdf

3. Intro to Malware Analysis and Reverse Engineering
    Module 1 - Introduction
  • 1.1 Intro Part 1
  • 1.2 Intro Part 2
  • 1.3 Intro Part 3
    Module 2 - Lab Setup
  • 2.1 Lab Setup Part 1
  • 2.2 Lab Setup Part 2
  • 2.3 Lab Setup Part 3
    Module 3 - Dynamic Analysis Part 1
  • 3.1 Dynamic Analysis Part 1.1
  • 3.2 Dynamic Analysis Part 1.2
  • 3.3 Dynamic Analysis Part 1.3
    Module 4 - Dynamic Analysis Part 2
  • 4.1 Dynamic Analysis Part 2.1
  • 4.2 Dynamic Analysis Part 2.2
    Module 5 - Basic Static Analysis
  • 5.1 Basic Static Analysis Part 1
  • 5.2 Basic Static Analysis Part 2
  • 5.3 Basic Static Analysis Part 3
  • 5.4 Basic Static Analysis Part 4A
  • 5.5 Basic Static Analysis Part 4B
  • 5.6 Basic Static Analysis Part 5
  • 5.7 Basic Static Analysis Part 6
    Module 6 - Packers
  • 6.1 Packers Part 1
  • 6.2 Packers Part 2
  • 6.3 Packers Part 3
  • 6.4 Packers Part 4
  • 6.5 Packers Part 5
    Module 7 - Malware Defenses
  • 7.1 Malware Defenses Part 1
  • 7.2 Malware Defenses Part 2
  • 7.3 Malware Defenses Part 3
    Resources
  • Intro to Malware Analysis and Reverse Engineering Glossary 1 .pdf
  • Intro to Malware Analysis and Reverse Engineering Study Guide 1 .pdf

4. Assembly
  • Resources.zip
      Module 1 - Basic Assembly
    • 1.1 Template and Setup
    • 1.2 Introduction to Assembly
    • 1.3 Architecture, Registers, and Protected Mode
    • 1.4 Binary, 2s Complement and Hexadecimal
    • 1.5 Assembly Template
    • 1.6 Instructions, Directives and Generating a Listing
    • 1.7 Logical Operators and Memory Layout
    • 1.8 Segments and Functions
    • 1.9 Sign Extend, Zero Extend, Multiple, Divide
    • 1.10 Multiply and Divide Examples
    • 1.11 Compare, Conditionals and Jumps
    • 1.12 Skeleton and Loop Example
    • 1.13 Shift Left and Right
    • 1.14 Arithmetic Shift
    • 1.15 Module 1 Review
      Module 2 - Indirect Addressing, Stack, Arrays and Strings
    • 2.1 Indirect Addressing and Variables Part 1
    • 2.2 Indirect Addressing and Variables Part 2
    • 2.3 Slack Intro Part 1
    • 2.4 Slack Intro Part 2
    • 2.5 Stack Usage
    • 2.6 Simple Function Example
    • 2.7 Function Prologue
    • 2.8 Function Epilogue
    • 2.9 Function Arguments
    • 2.10 Saving Registers
    • 2.11 More Complicated Function
    • 2.12 Calling Conventions
    • 2.13 Local Variables
    • 2.14 Local Variables Example
    • 2.15 Enter and Leave
    • 2.16 Enter and Leave Example Conversion
    • 2.17 Floating Point
    • 2.18 Floating Point Circle Example
    • 2.19 Floating Point Comparison
    • 2.20 Floating Point Comparison Example
    • 2.21 Max of Three Numbers
    • 2.22 Conditional Move
    • 2.23 Conditional Move Max Example
    • 2.24 Arrays
    • 2.25 Arrays Examples
    • 2.26 String Instructions
    • 2.27 Strings Uppercase Example
      Module 3 - ARM Architecture
    • 3.1 ARM Intro
    • 3.2 ARM Template
    • 3.3 ARM Math and Data Movement
    • 3.4 Branching, If, While, Shift
    • 3.5 Shift Example
    • 3.6 Memory, Offsets, Debugging and Listing
    • 3.7 Pushing and Popping
    • 3.8 Push Example
    • 3.9 Array Indexing
    • 3.10 Array Indexing Example
    • 3.11 ARM Multiple Load and Store
    • 3.12 ARM Load and Store Multiple Examples
    • 3.13 VFP and Neon
    • 3.14 Neon Example
    • 3.15 Neon Floating Point
    • 3.16 Neon Floating Point Example
    • 3.17 SIMD Load and Store Data
    • 3.18 SIMD Process Data
    • 3.19 SIMD Encryption Example
    • 3.20 Thumb Mode
    • 3.21 Thumb Mode Example
    • 3.22 Conditional Execution
    • 3.23 Conditional Execution Example
    • 3.24 IT Block Assembly
    • 3.25 IT Block Example
      Module 4 - C Constructs and Interrupts
    • 4.1 Tools for Code, Reverse Engineering
    • 4.2 Reverse Engineering Process
    • 4.3 Setup Reverse Engineering Lab
    • 4.4 Structures and Unions
    • 4.5 Structure Layout
    • 4.6 Structure Creation - Reverse Engineering
    • 4.7 Structures, Unions and Malloc
    • 4.8 Structures, Unions and Malloc Example
    • 4.9 Jump Tables and Switch Statements
    • 4.10 Jump Table Example
    • 4.11 Function Pointers
    • 4.12 Function Pointers Example
    • 4.13 Inline Assembly
    • 4.14 Inline Assembly Example
    • 4.15 Assembly with C
    • 4.16 SysCall and Interrupts
    • 4.17 Interrupts Example Use Fork
    • 4.18 Strings in C
    • 4.19 Integers in Assembly
    • 4.20 64-Bit Assembly
    • 4.21 MMX, SSE, AES-NI
    • 4.22 AES Implementations
    • 4.23 Implement Dump Registers
    • 4.24 Static and Dynamic Linking Assembly
    • 4.25 Shared Library
    • 4.26 Shared Library Example

  • 5. How to Use binwalk (BSWJ)
      Module 1 - BSWJ - binwalk
    • 1.1 BSWJ - binwalk

    6. MITRE ATT&CK Defender (MAD) ATT&CK
  • Resources.zip
      Module 1 - Mapping to ATT&CK
    • 1.1 Introduction - Challenges,
    • 1.2 Finding and Researching the Behavior
    • 1.3 Translating the Behavior into a Tactic
    • 1.4 Identifying Techniques or Sub-Techniques
    • 1.5 Mapping to a Narrative Point
    • 1.6 Hedging Your Biases
      Module 2 - Mapping to ATT&CK
    • 2.1 The Process of Mapping from Raw Data
    • 2.2 Identify and Research Behaviors
    • 2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques
    • 2.4 Raw Data to Narrative Reporting
      Module 3 - Storing and Analyzing ATT&CK
    • 3.1 Storing and Displaying ATT&CK-Mapped Data
    • 3.2 Expressing and Storing ATT&CK-Mapped Data
    • 3.3 Analyzing ATT&CK-Mapped Data
    • 3.4 Exercise 3 - Comparing Layers in ATT&CK Navigator
      Module 4 - Making Defensive
    • 4.1 The Defensive Recommendations Process
    • 4.2 How Techniques and Sub-Techniques are Being Used
    • 4.3 Researching Organizational
    • 4.4 Make Defensive Recommendations
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 29480
    حجم: 4688 مگابایت
    مدت زمان: 2009 دقیقه
    تاریخ انتشار: ۱ اسفند ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید