وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Enterprise Defense Administrator (eEDA)

سرفصل های دوره

01-01- Introduction to Security Engineering & Change Management
  • 01.zip
  • 01-IntroductiontoChangeManagement.txt
  • 02.zip
  • 03-.zip
  • 04-.zip
      01-Introduction
    • 01-Course Introduction
      02-Security Engineering
    • 01-What is Security Engineering
    • 02-Perimeter Security
    • 03-Network Security
    • 04-Endpoint Security
      03-Change Management
    • 01-Introduction to Change Management
    • 02-Types of Change & Change Environments
    • 03-Change Management Process
    • 04-Governance, Risk, and Compliance
      04-Conclusion
    • 01-Course Conclusion

  • 01-02- Introduction to cyber security hardening
  • 02.zip
  • 02-.zip
  • 02-Introduction to Cyber Security Hardening.txt
  • 03-.zip
  • 04-.zip
  • 05-.zip
  • 06-.zip
      02.1-Introduction
    • 02.1-Course Introduction
      02.2-Security Hardening Basics
    • 02.2.1-Introduction to Security Hardening
    • 02.2.2-Guidelines, Baselines, & Frameworks
      02.3-Network
    • 02.3.1-Network Perimeter
    • 02.3.2-Securing Network Devices
      02.4-Windows
    • 02.4.1-Windows Servers
    • 02.4.2-Active Directory
    • 02.4.3-Windows Server Hardening Demo
    • 02.4.4-Active Directory Hardening Demo
      02.5-Other Systems
    • 02.5.1-Windows Workstations & Applications
    • 02.5.2-Linux Hardening
    • 02.5.3-Securing Linux Demo
    • 02.5.4-Other Endpoints & Systems
      02.6-Conclution
    • 02.6-Conclusion

  • 01-03-Introduction to Security Sensors & Logging Management
  • 01.zip
  • 02-.zip
  • 03-.zip
  • 03-Introduction to Security Sensors & Logging Management.txt
  • 04-.zip
  • 05-.zip
      3.1-Introduction
    • 03.1-Course Introduction
      3.2-Sensor and Logging Basics
    • 03.2.1-Security Sensor Introduction
    • 03.2.2-Logging Introduction
      3.3-Security Sensors
    • 03.3.1-Network Sensors
    • 03.3.2-Host Sensors
      3.4-Log Management
    • 3.4.1-Centralized Logging
    • 3.4.2-SIEM
    • 3.4.3-SIEM Demo
    • 3.4.4-Logging Formats & Normalization
    • 3.4.5-Continuous Monitoring & Alerting
    • 3.4.6-Storage Management
      3.5-Log Analysis & Response
    • 3.5.1-Manual Log Review
    • 3.5.2-Automated Log Analysis
    • 3.5.3-SOAR Introduction
      3.6-Conclusion
    • 3.6.1-Conculsion

  • 01-04-Introduction to Identity & Access Management (IAM)
  • 01-.zip
  • 02.zip
  • 03-.zip
  • 04-.zip
  • 04-Introduction to Identity & Access Management.txt
      4.1-Introduction
    • 4.1.1-Introduction
      4.2-IAM Basics
    • 4.2.1-Identity & Access Management
    • 4.2.2-Authentication, Authorization, & Accountability
      4.3-Credential Management
    • 4.3.1-Authentication Types
    • 4.3.2-Password Management
    • 4.3.3-Just-in-Time Access
      4.4-Identity & Authorization
    • 4.4.1-Authorization Mechanisms
    • 4.4.2-Authentication & Authorization Systems
    • 4.4.3-Identity Management
    • 4.4.4-Identity & Access Management with Active Directory
      4.5-Accountability
    • 4.5.1-Accounting & Auditing
    • 4.5.2-Identity & Access Lifecycle
      4.6-Conclusion
    • 4.6.1-Conclusion

  • 02-01-Introduction to Vulnerability Management
      1.1-Introduction
    • 2.2.1-Introduction
      1.2-Introduction to Vulnerabilities
    • 2.2.1-Vulnerabilities Explained
    • 2.2.2-Discovery of Vulnerabilities
    • 2.2.3-History of Vulnerabilities & Malware
      1.3-Vulnerability Scanning
    • 2.3.1-Introduction to Vulnerability Scanning
    • 2.3.2-Scanning Process
    • 2.3.3-Vulnerability Scanners
    • 2.3.4-Vulnerability Scanner Demo
    • 2.3.5-Inventory Scanning
      1.4-Vulnerability Scoring
    • 2.4.1-Introduction to Vulnerability Scoring
    • 2.4.2-Vulnerability Information Resources
    • 2.4.3-Score Interpretation
      1.5-Vulnerability Analytics and Reporting
    • 2.5.1-Vulnerability Risk Analysis
    • 2.5.2-Vulnerability Reporting
    • 2.5.3-Vulnerability Operations Management
      1.6-Conclusion
    • 2.6.1-Conclusion

    02-02-Introduction to Security & Risk Management
      01.1-Introduction
    • 01-Course Introduction
      01.2-Security Basics
    • 01-Introduction to Security Management
    • 02-GRC Introduction
      01.3-Governance
    • 01-Governance Basics
    • 02-Organizational Roles & Responsibilities
    • 03-Policies, Procedures, & Standards
    • 04-Training & Ethics
      01.4-Risk Management
    • 01-Training & Ethics
    • 02-Risk Assessments & Methodologies
    • 03-Risk Response, Monitoring, & Reporting
      01.5-Compliance
    • 01-Compliance Basics
    • 02-Laws & Regulations
    • 03-Privacy & Liability
    • 04-Maintaining Compliance
      01.6-Frameworks
    • 01-Introduction to Frameworks
    • 02-Risk Management Frameworks
    • 03-Security Controls & Programs
    • 04-Other Frameworks & Concepts
      01.7-Conclusion
    • 01-Conclusion

    03-01-Perimeter & Network Security Engineering
      3.1-Introduction
    • 3.1.1-Course Introduction
      3.2-Overview
    • 3.2.1-Perimeter Introduction
    • 3.2.2-Network Introduction
      3.3-Perimeter Security
    • 3.3.1-Securing Firewalls
    • 3.3.2-Firewall Demo
    • 3.3.3-DMZ Security
    • 3.3.4-Remote Access
    • 3.3.5-DNS Security
    • 3.3.6-Other Perimeter Considerations
      3.4-Internal Network Security
    • 3.4.1-Network Segmentation
    • 3.4.2-Switches & Routers
    • 3.4.3-Wireless Security
    • 3.4.4-Logging & Analysis
    • 3.4.5-Wireshark Introduction
    • 3.4.6-Wireshark Demo
    • 3.4.7-Other Internal Network Considerations
      3.5-Conclusion
    • 3.5.1-Course Conclusion

    03-02-Secure Architecture Design
      3.2.1-Introduction
    • 3.2.1-Introduction
      3.2.2-Secure Architecture Introduction
    • 3.2.1-Basic Security Principles
    • 3.2.2-What is Secure Architecture
      3.2.3-Security Principles
    • 3.2.3.1-General Principles of Secure Architecture
    • 3.2.3.2-Secure Architecture Goals
    • 3.2.3.3-Secure the Users
    • 3.2.3.4-Secure Infrastructure
      3.2.4-Designing a Secure Architecture
    • 3.2.4.1-Threat Modeling
    • 3.2.4.2-Secure Architecture Planning
    • 3.2.4.3-Creating a Secure Network
    • 3.2.4.4-Logging
    • 3.2.4.5-Disaster Recovery
    • 3.2.4.6-Documenting the Secure Architecture
      3.2.5-Conclution
    • 3.2.5.1-Conclusion

    04-01-Security Engineering for Business Operations
      4.1-Introduction
    • 01-Course Introduction
      4.2-Security Operations
    • 4.2.1-Documentation
    • 4.2.2-Evaluating Existing Networks
    • 4.2.3-Creating New Secure Networks
      4.3-Conclusion
    • 4.3.1-Course Conclusion
    139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 29507
    حجم: 16921 مگابایت
    مدت زمان: 2002 دقیقه
    تاریخ انتشار: 2 اسفند 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید