وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security Plus (SY0-701) Course | CompTIA Security+

سرفصل های دوره

Security+ | Master Cybersecurity Skills, pass CompTIA Security Plus SY0-701 exam and level up your cyber security career


1. Introduction to CompTIA Security Plus (SY0-701) Course CompTIA Security+
  • 1. Introduction to security+

  • 2. Basic Security Concepts
  • 1. What is Security
  • 2. Privacy-Integrity-Availability
  • 3. Encryption and Access Control
  • 4. 3 A Rule (Authentication, Authorization and Accounting)
  • 5. Threat
  • 6. What is a Hacker
  • 7. What is Attack What are the Stages
  • 8. Quiz.html

  • 3. Identity Management
  • 1. What is Identity Management
  • 2. KERBEROS & NTLM&LDAP
  • 3. Single Sign-On
  • 4. Smart Cards
  • 5. Tokens or Key Fobs
  • 6. Biometric Methods
  • 7. Dual-Factor and Multifactor Authentication
  • 8. RADIUS
  • 9. Quiz.html

  • 4. Cloud Vendors Relationships
  • 1. Finding and Evaluating Cloud Vendors
  • 2. Job Notification
  • 3. Conducting Evaluations
  • 4. Negotiating Contracts and Billing
  • 5. Professional Services
  • 6. Chargebacks
  • 7. Laws, Regulations And Safety Standards

  • 5. Advising
  • 1. Key Stakeholders
  • 2. Using Baselines
  • 3. Conducting Feasibility Study
  • 4. Making GAP Analysis
  • 5. Using Reporting
  • 6. Understanding Benchmarks

  • 6. Users in CompTIA
  • 1. Create a User in comptia
  • 2. Managing Accounts - 1
  • 3. Managing Accounts - 2
  • 4. Passwords
  • 5. Password Policy
  • 6. Quiz.html

  • 7. Comparing Access Control Models
  • 1. Role-Based Access Control
  • 2. Establishing Access with Group-Based Privileges
  • 3. Rule Based and Discretionary Access Control
  • 4. Mandatory Access Control
  • 5. Establishing Access
  • 6. Quiz.html

  • 8. Virtualization
  • 1. What is Virtualization
  • 2. Virtualization Technologies
  • 3. Security Issues of Virtualization
  • 4. Quiz.html

  • 9. Network Technologies
  • 1. Basic Network Concepts
  • 2. Domain Name Services(DNS)
  • 3. What is the port How does it work
  • 4. What is the Network Address
  • 5. Switches
  • 6. Bridge
  • 7. Routers
  • 8. Understanding NAT and PAT
  • 9. Network Separation
  • 10. Proxy Servers
  • 11. Quiz.html

  • 10. Wireless Networks
  • 1. Reviewing Basic Wireless Network Information
  • 2. Wireless Cryptographic Protocols
  • 3. Authentication Protocols for Wireless Networks
  • 4. Quiz.html

  • 11. Network Security Technologies
  • 1. Firewalls
  • 2. Network Access Control
  • 3. Implementing a Secure Network
  • 4. Quiz.html

  • 12. Intrusion Detection Systems
  • 1. Understanding IDSs and IPSs
  • 2. Detection Methods
  • 3. Honeypots
  • 4. Quiz.html

  • 13. Virtual Private Network (VPN) Technologies
  • 1. Using VPNs for Remote Access
  • 2. VPN Tunnel Protocols
  • 3. Site-to-Site VPNs
  • 4. Quiz.html

  • 14. Security Threats
  • 1. Understanding Threat Actors
  • 2. Viruses
  • 3. Logic Bombs
  • 4. Trojans
  • 5. Ransomware
  • 6. Spyware
  • 7. Bots and Botnets
  • 8. Unified Threat Management(UTM)
  • 9. Quiz.html

  • 15. Securing Wireless Networks
  • 1. Disable SSID Broadcasting or Not
  • 2. Enable MAC Filtering
  • 3. Quiz.html

  • 16. Understanding Wireless Attacks
  • 1. Disassociation Attacks
  • 2. WPS and WPS Attacks
  • 3. Rogue AP
  • 4. Evil Twin
  • 5. Jamming Attacks
  • 6. Bluetooth Attacks
  • 7. RFID Attacks
  • 8. Wireless Replay Attacks
  • 9. Quiz.html

  • 17. Network Attacks
  • 1. Network Attacks
  • 2. SYN Flood Attack
  • 3. MAC Flood Attacks
  • 4. Man-in-the-Middle Attacks
  • 5. ARP Poisoning Attacks
  • 6. DNS Attacks
  • 7. Quiz.html

  • 18. Password Attacks
  • 1. Brute Force Attacks
  • 2. Password Hashes
  • 3. Birthday Attacks
  • 4. Replay Attacks
  • 5. Hijacking and Related Attacks
  • 6. Driver Manipulation
  • 7. Quiz.html

  • 19. Zero-Day Attacks
  • 1. Zero-Day Attacks
  • 2. Quiz.html

  • 20. Code Attacks
  • 1. Code Reuse and SDKs
  • 2. Code Quality and Testing
  • 3. Development Life-Cycle Models
  • 4. Secure DevOps
  • 5. Version Control and Change Management
  • 6. Quiz.html

  • 21. Web Server Attacks
  • 1. Web Servers
  • 2. SQL Injection Attacks
  • 3. Protecting Against SQL Injection Attacks
  • 4. DLL Injection
  • 5. Cross-Site Scripting
  • 6. Quiz.html

  • 22. Social Engineering Attacks
  • 1. Social Engineering
  • 2. Shoulder Surfing
  • 3. Tricking Users with Hoaxes
  • 4. Tailgating and Mantraps
  • 5. Dumpster Diving
  • 6. Watering Hole Attacks
  • 7. Spam
  • 8. Phishing
  • 9. Whaling
  • 10. Vishing
  • 11. Quiz.html

  • 23. Memory Buffer Vulnerabilities
  • 1. Buffer Overflow Attacks
  • 2. Pointer Dereference
  • 3. Compiled Versus Runtime Code
  • 4. Proper Input Validation
  • 5. Side Input Validation
  • 6. Avoiding Race Conditions
  • 7. Proper Error Handling
  • 8. Cryptographic Techniques
  • 9. Quiz.html

  • 24. Preventing Attacks
  • 1. Protecting Systems from Malware
  • 2. Antivirus and Anti-Malware Software
  • 3. Advanced Malware Tools
  • 4. Educating Users
  • 5. Quiz.html

  • 25. Server Security
  • 1. Implementing Secure Systems
  • 2. Operating systems
  • 3. Secure Operating System Configurations
  • 4. Resiliency and Automation Strategies
  • 5. Change Management Policy
  • 6. Secure Staging and Deployment
  • 7. Peripherals
  • 8. EMI and EMP
  • 9. Hardware Security Module
  • 10. Cloud Deployment Models
  • 11. Cloud Services
  • 12. Security Responsibilities with Cloud Models
  • 13. Advanced Cloud Services
  • 14. Quiz.html

  • 26. Mobile Devices
  • 1. Deploying Mobile Devices Securely
  • 2. Deployment Models
  • 3. Mobile Device Management
  • 4. Hardware Control
  • 5. Unauthorized Connections
  • 6. Quiz.html

  • 27. Data Security
  • 1. Protecting Data
  • 2. Data Loss Prevention
  • 3. Quiz.html

  • 28. Database Security
  • 1. Database Concepts
  • 2. Normalization
  • 3. SQL Queries
  • 4. Database Security
  • 5. Quiz.html

  • 29. Risk Management
  • 1. Understanding Risk Management
  • 2. Risk Management
  • 3. Threats and Threat Assessments
  • 4. Vulnerabilities
  • 5. Risk Assessment
  • 6. Risk Registers
  • 7. Quiz.html

  • 30. Checking for Vulnerabilities
  • 1. Checking for Vulnerabilities
  • 2. Password Crackers
  • 3. Network Scanners
  • 4. Wireless Scanners Cracker
  • 5. Banner Grabbing
  • 6. Vulnerability Scanning
  • 7. Quiz.html

  • 31. Penetration Tests
  • 1. Penetration Tests
  • 2. Passive & Active Reconnaissance
  • 3. Initial Exploitation
  • 4. White, Gray and Black Box Testing
  • 5. Intrusive and Non-Intrusive Testing
  • 6. Passive Versus Active Tools
  • 7. Quiz.html

  • 32. Physical Security Precautions
  • 1. Comparing Physical Security Controls
  • 2. Comparing Door Lock Types
  • 3. Preventing Tailgating with Mantraps
  • 4. Increasing Physical Security with Guards
  • 5. Using Hardware Locks
  • 6. Asset Management
  • 7. Implementing Environmental Controls
  • 8. Quiz.html

  • 33. Single Point of Failure
  • 1. Single Point of Failure
  • 2. Disk Redundancies
  • 3. Server Redundancy and High Availability
  • 4. Backup
  • 5. Quiz.html

  • 34. Business Continuity Plans
  • 1. Comparing Business Continuity Elements
  • 2. Impact
  • 3. Recovery Time Objective
  • 4. Recovery Sites
  • 5. Disaster Recovery
  • 6. Quiz.html

  • 35. Examination of Logs
  • 1. Monitoring Logs for Event Anomalies
  • 2. Other Logs-SIEM
  • 3. Continuous Monitoring
  • 4. Quiz.html

  • 36. Controls
  • 1. Understanding Control Types
  • 2. Control Goals
  • 3. Quiz.html
  • 4. Quiz.html

  • 37. Cryptography and PKI
  • 1. Introducing Cryptography Concepts
  • 2. Hashing
  • 3. MD5
  • 4. SHA
  • 5. HMAC
  • 6. Hashing Files
  • 7. Digital Signatures, Certificates and non-repudiation
  • 8. Block Versus Stream Ciphers
  • 9. Symmetric Encryption
  • 10. Symmetric Encryption Methods
  • 11. Asymmetric Encryption
  • 12. Certificates
  • 13. Steganography And Obfuscation
  • 14. Using Cryptographic Protocols
  • 15. Cipher Suites
  • 16. Exploring PKI Components
  • 17. Comparing Certificate Types
  • 18. Quiz.html

  • 38. Secure Web Page
  • 1. HTTPS Transport Encryption
  • 2. Quiz.html

  • 39. Risk Mitigation Methods
  • 1. Exploring Security Policies
  • 2. Personnel Management Policies
  • 3. Background Check
  • 4. NDA
  • 5. Policy Violations and Adverse Actions
  • 6. Agreement Types
  • 7. PII and PHI
  • 8. Responding to Incidents
  • 9. Providing Training
  • 10. Troubleshooting Personnel Issues
  • 11. Incident Response-Education
  • 12. Quiz.html

  • 40. CompTIA Security+ (SY0-701) Practice Test
  • 1. CompTIA Security+ (SY0-701) Practice Test.html

  • 41. Extra
  • 1. CompTIA Security Plus (SY0-701) Course CompTIA Security+.html
  • 45,900 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38293
    حجم: 6177 مگابایت
    مدت زمان: 1030 دقیقه
    تاریخ انتشار: 19 تیر 1403
    طراحی سایت و خدمات سئو

    45,900 تومان
    افزودن به سبد خرید