وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CASP+ Certification Training

سرفصل های دوره

1. Secure Network Architecture Services
  • 1. DoS Protection, Load Balancers and Proxies
  • 2. Intrusion PreventionDetection Systems
  • 3. Application Security
  • 4. NACs and VPNs
  • 5. Securing DNS and Email
  • 6. Routers and NAT Gateways
  • 7. Firewalls, UTMs and NGFWs

  • 2. Secure Network Architecture Practices
  • 1. Traffic Monitoring
  • 2. Security Sensors
  • 3. Network Segmentation
  • 4. Deperimeterization Zero Trust
  • 5. Merging Networks
  • 6. Defense In Depth

  • 3. Security Infrastructure Design
  • 1. Software Defined Networking (SDN)
  • 2. Scalability and Automation
  • 3. Resiliency In Infrastructure Design
  • 4. Virtuailzation and Containerization
  • 5. CDNs and Caching

  • 4. Secure Software Integration
  • 1. Baselines and Templates
  • 2. APIs and Middleware
  • 3. Software Assurance
  • 4. Integrating Enterprise Applications
  • 5. Application Development Security
  • 6. Web Application Security

  • 5. Data Security Techniques
  • 1. Data Loss Prevention and Detection
  • 2. Data Classification, Labeling and Tagging
  • 3. Obfuscation and Anonymization of Data
  • 4. Data Lifecycle Management
  • 5. Data Inventory and Mapping
  • 6. Data Integrity Management

  • 6. Authentication and Authorization Controls
  • 1. Managing Credentials
  • 2. Password Policies
  • 3. Access Control
  • 4. AAA Protocols
  • 5. MFA, OTP and SSO
  • 6. Authenticating Hardware and People

  • 7. Cloud and Virtualization Solutions
  • 1. Virtualization Technologies
  • 2. Virtualization Strategies
  • 3. Cloud Deployment Models
  • 4. Cloud Computing Characteristics
  • 5. Cloud Provider Limitations
  • 6. Extending On-premise Security Controls

  • 8. Cryptography and PKI
  • 1. The CIA Triad
  • 2. Non-repudiation and Compliance Requirements
  • 3. Cryptography and PKI
  • 4. Hashes and Digital Signatures
  • 5. Cryptography Use Cases

  • 9. Enterprise Security and Emerging Technologies
  • 1. AI and ML
  • 2. Quantum Computing and Nano Technology
  • 3. Homomorphic Encryption and SMC
  • 4. Blockchain and Distributed Consensus
  • 5. Big Data and Passwordless Authentication
  • 6. Virtual Reality and 3D Printing
  • 7. Deepfakes and Biometric Impersonation

  • 10. Threat Management Activities
  • 1. Threat Intelligence
  • 2. Threat Intel Collection Methods
  • 3. Types of Threat Actors
  • 4. Threat Management Frameworks
  • 5. Using MITRE ATT&CK
  • 6. IOCs and Responses

  • 11. Vulnerability Management Activities
  • 1. Vulnerability Scans
  • 2. Security Content Automation Protocol (SCAP)
  • 3. Assessments
  • 4. Patch Management
  • 5. Information Sources

  • 12. Vulnerability Assessments and Pentesting
  • 1. Vulnerability Assessment vs Pentesting
  • 2. Testing Methods
  • 3. Pentesting Post Exploit
  • 4. Vulnerability Assessment Tools
  • 5. Some Pentesting Tools
  • 6. Vulnerability Assessments and Pentesting Requirements

  • 13. Vulnerability Analysis and Mitigation
  • 1. Common Software Vulnerabilities
  • 2. Race Conditions
  • 3. Cryptographic Vulnerabilities
  • 4. Software Development Vulnerabilities
  • 5. Web Application Attacks
  • 6. VM and Network-Based Attacks

  • 14. Using Processes to Reduce Risk
  • 1. Being Proactive
  • 2. Using Data Analysis
  • 3. Preventative Measures
  • 4. Application Control
  • 5. Security Automation
  • 6. Physical .Security

  • 15. Incidents and Their Responses
  • 1. Intro
  • 2. Event Classification
  • 3. Event Triage
  • 4.Incident Response Process
  • 5. Incident Response Playbooks
  • 6. Automated Response
  • 7. Communications Plans & Stakeholder Management

  • 16. Forensic Concepts and Analysis
  • 1. Intro
  • 2. Forensic Process Identification
  • 3. Digital Forensics
  • 4. Forensic Process Evidence Collection
  • 5. Forensic Process Evidence Preservation
  • 6. Forensic Process Analysis
  • 7. Forensic Process Verification and Presentation

  • 17. Configuring Enterprise Mobility and Endpoint Security
  • 1. Intro
  • 2. Enterprise Mobility Management
  • 3. Windows Information Protection
  • 4. Configuring Endpoint Security Controls
  • 5. Hardening Techniques
  • 6. Compensation Controls

  • 18. Cloud Adoption And Operational Technology Security Impacts
  • 1. Intro
  • 2. Cloud Deployment Models
  • 3. Impacts of Cloud Technology Adoption
  • 4. Securing Specialized Technologies
  • 5. Cloud Threats And Vulnerabilities
  • 6. Monitoring Logs Using Azure AD Audit.
  • 7. Emerging Technologies

  • 19. Implementing PKI Solutions and Cryptography
  • 1. Introduction To Public Key Infrastructure
  • 2. The Role Of Public Key Infrastructure
  • 3. Private And Public Key Encryption
  • 4. Certificate Lifecycle
  • 5. Certificate Types And Usage
  • 6. Understanding Trust Concepts

  • 20. Implementing Cryptographic Protocols and Algorithms
  • 1. Hashing
  • 2. SSLTLS
  • 3. . Symmetric And Asymmetric Algorithm
  • 4. SMIME and SSH
  • 5. Internet Protocol Security (IPSec)

  • 21. Risk Strategies
  • 1. Risk Analysis Methods
  • 2. Responding To Risk
  • 3. Types of Risk
  • 4. Risk Management Lifecycle and Frameworks
  • 5. Tracking Risk
  • 6. Risk Appetite, Tolerance, and Capacity
  • 7. Policies and Security Practices

  • 22. Managing and Mitigating Third Party Risk
  • 1. Third Party Risk Management
  • 2. Vendor Lock-InOut and Viability
  • 3. Meeting Obligations
  • 4. Third Party Dependencies
  • 5. Technical Considerations
  • 6. Additional Vendor Considerations

  • 23. Compliance Frameworks and Legal Considerations
  • 1. Data Considerations
  • 2. Location, Location, Location
  • 3. Regulations, Accreditations and Standards
  • 4. Legal Considerations
  • 5. Contract and Agreement Types

  • 24. Business Continuity and Disaster Recovery Planning
  • 1. BC and DR Planning
  • 2. BCDR Planning Process
  • 3. Creating a BC Plan
  • 4. DR Planning
  • 5. Resiliency Technologies
  • 6. Testing BCDR Plans
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 41278
    حجم: 8287 مگابایت
    مدت زمان: 1243 دقیقه
    تاریخ انتشار: 15 آبان 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید