وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA SY0-701: Threats,Vulnerabilities & Mitigations-Vol 2

سرفصل های دوره

Tackling Threats, Vulnerabilities, and Their Mitigations


1. Introduction
  • 1. Course Introduction

  • 2. Compare & Contrast Common threat actors and their Motivations
  • 1. Nation State Threat Actors
  • 2. Unskilled Attackers
  • 3. Hactivists
  • 4. Insider Threats
  • 5. Organized Crime
  • 6. Shadow IT
  • 7. Quiz Understanding Cyber Threat Actors.html
  • 8. Attributes of Threat Actors
  • 9. Internal & External Threat Actors
  • 10. Resources and Funding
  • 11. Sophistication & Capabilities
  • 12. Quiz - Attributes of Threat Actors.html
  • 13. Threat Actors Motivations
  • 14. Data Exfilteration
  • 15. Espionage
  • 16. Service Distruptions
  • 17. Blackmail
  • 18. Financial Gains
  • 19. Philosophical and political beliefs
  • 20. Ethical Motivations
  • 21. Revenge
  • 22. Disruption Chaos
  • 23. Warfare
  • 24. Chapter Summary
  • 25. Motivations - Quiz.html

  • 3. Explain Common Threat Vectors and attack Surfaces
  • 1. Chapter Introduction
  • 2. Message Based (Email, SMS and IM ) Threat Vectors
  • 3. File based - Steganography
  • 4. File based - Image Based
  • 5. File based - Malicious QR Codes
  • 6. File Based - DeepFakes and Misinformation
  • 7. Voice call based Attacks
  • 8. Removable devices
  • 9. Vulnerable Software - Agent Based
  • 10. Vulnerable Software - Agentless
  • 11. Unsupported systems and applications
  • 12. Unsecure Networks - Wireless - Case Studies
  • 13. Unsecure Networks - WIRED
  • 14. Unsecure Networks - Bluetooth
  • 15. Open Service Ports
  • 16. Default Credentials
  • 17. High profile supply chain attacks
  • 18. Human Vectors and Social Engineering
  • 19. What is Phishing
  • 20. Variants of Phishing
  • 21. Vishing
  • 22. SPAM
  • 23. Dumpster Diving
  • 24. Shoulder Surfing
  • 25. Pharming
  • 26. Tailgating
  • 27. Hoaxes
  • 28. Prepending
  • 29. Impersonation
  • 30. Identity Fraud
  • 31. Invoice Scams
  • 32. Credential Harvesting
  • 33. Watering Hole Attacks
  • 34. Typo Squatting URL Hijacking
  • 35. Hybrid Warefare
  • 36. Social Media and Influence Campaigns
  • 37. Authority & Intimidation
  • 38. Consensus and Social proof
  • 39. Familiarity and Liking
  • 40. Trust
  • 41. Scarcity Urgency
  • 42. Social Engineering - Summary
  • 43. Milestone Check - 2.html

  • 4. Explain various types of vulnerabilities
  • 1. Introduction
  • 2. Application Vulnerability - Memory Injection
  • 3. Application Vulnerability - Race Conditions - Time of Use
  • 4. The Impact of Application Vulnerabilities
  • 5. Malicious Updates
  • 6. Operating system based vulnerabilities
  • 7. Hardware based vulnerabilities
  • 8. Virtualization - Vulnerabilities
  • 9. Cloud Specific Vulnerabilities
  • 10. Supply Chain Related Vulnerabilities
  • 11. Cryptographic Vulnerabilities
  • 12. Misconfiguration Vulnerabilities
  • 13. Mobile Device Vulnerabilities
  • 14. Mobile Device Vulnerabilities - Side Loading
  • 15. Mobile Device Vulnerabilities - JailBreaking
  • 16. Zero Day Mobile Device Vulnerabilities

  • 5. Given a Scenario, analyze indicators of malicious activity
  • 1. CryptoMalware Ransomware
  • 2. Ransomware Protection
  • 3. Ransomware Protection - Phases
  • 4. Trojan Horse
  • 5. Worms
  • 6. Spyware
  • 7. Bloatware
  • 8. Virus
  • 9. Keyloggers
  • 10. Potentially Unwanted Programs - PUPs
  • 11. Fileless Virus
  • 12. Logic Bomb
  • 13. Root Kits
  • 14. Botnets
  • 15. Backdoors
  • 16. Spraying
  • 17. Brute Force & Dictionary Attacks
  • 18. Known Plain Text Cipher Text
  • 19. Physical Attacks - Brute Force
  • 20. Physical Attacks - What is RFID
  • 21. Physical Attacks - RFID Cloning
  • 22. Physical Attacks - DDOS
  • 23. Physical Attacks - DDOS Attacks - Historical Evidences
  • 24. Environmental Impact on Physical Security
  • 25. Network Attacks - DDOS
  • 26. Network Attacks - DNS
  • 27. Network Attacks - Mitigating DNS attacks
  • 28. Network Attacks - Wireless
  • 29. Network Attacks - Wireless - Mitigation Measures
  • 30. Replay Attacks - Train Station Analogy
  • 31. What is a Replay Attack
  • 32. Network Attacks - On- Path Attacks
  • 33. Network Attacks - Malicious Code
  • 34. Application Attacks - Injection Attacks - Introduction
  • 35. Application Attacks - Command Injection - Theory
  • 36. Application Attacks - Command Line injection Attacks
  • 37. Application Attacks - Command Injection Demo
  • 38. Command-Line Injection (CLI) attacks - The Story of ShellShock
  • 39. Application Attacks - Injection Attacks - XSSCross Site Scripting
  • 40. Application attacks - Injection - LDAP Injection
  • 41. Buffer Overflow attack - Train Station Analogy
  • 42. What is a buffer overflow attack
  • 43. Application Attacks - Credential Replay
  • 44. Detection & Prevention of Credential Replay Attacks
  • 45. Application Attacks - Privilege Escalation
  • 46. What is Application-Level Forgery
  • 47. Application Attacks - Directory Traversal
  • 48. Cryptographic Attacks - Downgrade
  • 49. Cryptographic Attacks - Collision
  • 50. Indicators - Accounts Lockout
  • 51. Indicators of Malicious Activity - Current Session Usage
  • 52. Indicators of Malicious Activity - Blocked Content
  • 53. Indicators of Malicious Activity - Impossible Time Travel
  • 54. Indicators of Malicious Activity - Resource Consumption
  • 55. Indicators of Malicious Activity - Resource inaccessibility
  • 56. Indicators of Malicious Activity - Out-of-Cycle Logging
  • 57. Indicators of Malicious Activity - Published Documented Indicators
  • 58. Indicators of Malicious Activity - Logging
  • 59. Milestone Check.html

  • 6. Explain the purpose of mitigation techniques used to secure the enterprise
  • 1. Segmentation
  • 2. ACLs and Permissions
  • 3. Application Allow Listing
  • 4. Isolation
  • 5. Patching
  • 6. Encryption
  • 7. Monitoring
  • 8. Least Privileage
  • 9. Configuration Enforcement
  • 10. Decommissioning
  • 11. Hardening Techniques - Introduction
  • 12. Hardening Techniques -Encryption
  • 13. Encryption Architecture Diagram
  • 14. Hardening- Installation of endpoint Protection
  • 15. Hardening -Host based Firewalls
  • 16. HIPS
  • 17. Disabling of ports and protocols
  • 18. Default Passwords
  • 19. Removal of unneccessary software
  • 20. Module Summary
  • 21. Milestone Check.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 36654
    حجم: 8396 مگابایت
    مدت زمان: 578 دقیقه
    تاریخ انتشار: 26 اردیبهشت 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید