وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ (SY0-601) by Stone River eLearning

سرفصل های دوره

1. Threats, Attacks, and Vulnerabilities
  • 1.1 comptia-secplusy0601.zip
  • 1. Overview
  • 2. Social Engineering Techniques
  • 3. Malware
  • 4. Password Attacks - Types
  • 5. Password Attacks - Tools
  • 6. Application Attacks - Injections
  • 7. Application Attacks - System Resources
  • 8. Application Attacks - XSS and XSRF
  • 9. Application Attacks - Replay Attacks
  • 10. Network Attacks - DNS Attacks
  • 11. Network Attacks - Layer 2 Attacks
  • 12. Network Attacks - DoS and DDoS
  • 13. Network Attacks - MiTM and MiTB
  • 14. Network Attacks - Wireless
  • 15. Vulnerabilities
  • 16. Threat Intelligence - OSINT
  • 17. Threat Intelligence - Threat Maps and Feeds
  • 18. Threat Intelligence Vulnerability Databases Feed
  • 19. Threat Actors and Vectors

  • 2. Cryptography
  • 1. Cryptography Concepts
  • 2. Encryption and Steganography
  • 3. Hashing
  • 4. Secure Protocols
  • 5. Symmetric vs. Asymmetric Encryption
  • 6. PKI Concepts
  • 7. Certificates
  • 8. Keys
  • 9. IPSec
  • 10. Authentication and Authorization
  • 11. Authentication Methods
  • 12. Additional Authentication Methods
  • 13. Biometrics
  • 14. Authentication Protocols - PAP and CHAP
  • 15. Authentication Protocols - EAP and 802.1X
  • 16. Authentication Protocols - RADIUS and TACACS
  • 17. Authentication Protocols - Kerberos
  • 18. Access Control Schemes
  • 19. Account Management - Account Types
  • 20. Account Management - Password Policies
  • 21. Account Management - Account Policies
  • 22. Application Security
  • 23. Physical Security
  • 24. Wireless Security
  • 25. Secure Data Destruction
  • 26. Host Security - Endpoint Protection
  • 27. Host Security - Hardening
  • 28. Mobile Device Deployment
  • 29. Mobile Device Management and Enforcement
  • 30. Mobile Device Connections
  • 31. Specialized Systems
  • 32. Network Security - Segmentation
  • 33. Network Security - VPNs
  • 34. Network Security - Proxies and Load Balancing
  • 35. Network Security - Port Security
  • 36. Network Security - Firewalls
  • 37. Network Security - NIDS and NIPS
  • 38. Virtualization
  • 39. Cloud Concepts
  • 40. Cloud Services
  • 41. Cloud Models
  • 42. Computing Types
  • 43. Cloud Security Controls
  • 44. Hardware Redundancy
  • 45. Site Redundancy
  • 46. Non-persistence Concepts
  • 47. Backup and Recovery
  • 48. Network Reconnaissance and Discovery
  • 49. Packet Capture and Replay
  • 50. Vulnerability Scans
  • 51. SIEM and SOAR Systems
  • 52. Pentesting Techniques
  • 53. Pentesting Exercise Types
  • 54. Digital Forensics Concepts
  • 55. Investigational Data Sources
  • 56. Incident Response Process
  • 57. Incident Response Plans
  • 58. Attack Frameworks
  • 59. Security Controls
  • 60. Regulations, Standards and Frameworks
  • 61. Spotlight on General Data Protection Regulation
  • 62. Organizational Security Policies - Personnel
  • 63. Organizational Security Policies - 3rd Party Risk
  • 64. Organizational Security Policies - Data
  • 65. Organizational Security Policies - Other Areas
  • 66. Risk Management Concepts - Vocabulary
  • 67. Risk Management Concepts - Types & Strategies
  • 68. Risk Management Concepts - Risk Analysis
  • 69. Risk Management Concepts Business Impact Analysis
  • 70. Privacy and Data Sensitivity Breaches & Data Types
  • 71. Privacy, Data Sensitivity - Privacy Enhancing Tech
  • 72. Privacy, Data Sensitivity, Roles, Responsibilities
  • 73. Privacy and Data Sensitivity - Other Areas
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 35979
    حجم: 27541 مگابایت
    مدت زمان: 1707 دقیقه
    تاریخ انتشار: 13 اردیبهشت 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید