وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
3

Network Defense Fundamentals: Training for IT Beginners

سرفصل های دوره

Building Strong Foundations in Cybersecurity and Information Protection


1 - Introduction
  • 2 - The overview of the different types of network defense approaches
  • 3 - The different types of Network security controls
  • 4 - Basic Linux concepts

  • 2 - Identification authentication and authorization
  • 5 - The different types of identifications overview
  • 6 - The different types of authentications overview
  • 7 - The different types of authorization overview

  • 3 - Network security controls physical controls
  • 8 - Understanding the importance of physical security
  • 9 - The different physical security attack vectors
  • 10 - Understanding the various environmental controls

  • 4 - Network security controls technical controls
  • 11 - Understanding Network segmentation and its types
  • 12 - Understanding the different types of firewalls and their roles
  • 13 - Understanding the different types of IDSIPS and their roles
  • 14 - The different types of proxy servers and their benefits
  • 15 - The fundamental understanding of VPN and their importance in a network
  • 16 - Overview of antivirusantimalware software

  • 5 - Virtualization and cloud computing
  • 17 - Understanding virtualization and its components
  • 18 - OS virtualization security
  • 19 - Cloud computing and its benefits
  • 20 - Overview of different types of cloud computing service
  • 21 - Importance of cloud computing and its best practice

  • 6 - Wireless network security
  • 22 - Wireless network encryption mechanism
  • 23 - Understanding the different types of wireless network authentication methods
  • 24 - Wireless security measures and wireless security tools

  • 7 - IoT device Security
  • 25 - Understanding IoT architecture and communication models
  • 26 - Understanding the best practice tool for IoT for security

  • 8 - Cryptography and public key infrastructure
  • 27 - Cryptography techniques
  • 28 - The different Encryption algorithm
  • 29 - The different hashing algorithm
  • 30 - Different cryptography tools and hash calculators
  • 31 - PKI infrastructure

  • 9 - Data security
  • 32 - The different data security controls for data encryption
  • 33 - File encryption removablemedia encryption and disk encryption
  • 34 - Methods and tools for data backup retention Part 1
  • 35 - Methods and tools for data backup retention Part 2
  • 36 - DLPS data loss prevention and solutions

  • 10 - Mini Projects
  • 37 - The implementation of an IDSIPS Snort on a Linux based system
  • 38 - Installation of snort and its libraries Both Linux and ubuntu
  • 39 - Configuration of snort for IDS IPS functionalities
  • 40 - Timezone configuration and swap files in firewall
  • 41 - How to setup a VPN
  • 42 - Firewall configuration
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 32473
    حجم: 1060 مگابایت
    مدت زمان: 222 دقیقه
    تاریخ انتشار: ۶ فروردین ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید