وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CodeRed Certified Cybersecurity Technician (CCT)

سرفصل های دوره

01. Information Security Threats and Vulnerabilities
  • 1. Overview of Threats Sources
  • 2. Overview of Threat Actors Agents
  • 3. Understanding Malware and its Types
  • 4. Overview of Vulnerabilities
  • 5. Understanding Different Types of Vulnerabilities
  • 6. Information Security Threats and Vulnerabilities - Lab.pdf

  • 02. Information Security Attacks
  • 1. Overview of Information Security Attacks
  • 2. Overview of Hacking Methodologies and Frameworks
  • 3. Understanding Network-level Attacks
  • 4. Understanding Application-level and OS-level Attacks
  • 5. Understanding Social Engineering Attacks
  • 6. Understanding Wireless Network-specific Attacks
  • 7. Understanding IoT, OT, and Cloud Attacks
  • 8. Understanding Cryptographic Attacks
  • 9. Information Security Attacks - Lab.pdf

  • 03. Network Security Fundamentals
  • 1. Overview of Information Security Fundamentals
  • 2. Overview of Network Security Fundamentals

  • 04. Identification, Authentication, and Authorization
  • 1. Overview of Access Control Principles, Terminologies, and Models
  • 2. Overview of Identity and Access Management (IAM)
  • 3. Identification, Authentication and Authorization - Lab.pdf

  • 05. Network Security Controls - Administrative Controls
  • 1. Understanding Various Regulatory Frameworks, Laws, and Acts
  • 2. Overview of Information Security Governance and Compliance Program
  • 3. Learn to Design and Develop Security Policies
  • 4. Learn to Conduct Different Type of Security and Awareness Training
  • 5. Network Security Controls - Administrative Controls - Lab.pdf

  • 06. Network Security Controls - Physical Controls
  • 1. Understanding the Importance of Physical Security
  • 2. Understanding Various Physical Security Controls
  • 3. Overview of Workplace Security
  • 4. Understanding Various Environmental Controls

  • 07. Network Security Controls - Technical Controls
  • 01. Overview of Essential Network Security Protocols
  • 02. Understanding Security Benefits of Network Segmentation
  • 03. Understanding Different Types of Firewalls and their Role
  • 04. Understanding Different Types of IDS IPS and their Role
  • 05. Understanding Different Types of Honeypots
  • 06. Understanding Different Types of Proxy Servers and their Benefits
  • 07. Overview of VPN and its importance in Network Security
  • 08. Overview of Other Network Security Controls
  • 09. Understanding Importance of Load Balancing in Network Security
  • 10. Understanding Various Antivirus Anti-malware Software
  • 11. Network Security Controls - Technical Controls - Labs.pdf

  • 08. Network Security Assessment Techniques and Tools
  • 1. Overview of Threat Hunting
  • 2. Understanding Various Threat Intelligence Feeds and Sources
  • 3. Overview of Vulnerability Assessment
  • 4. Overview of Ethical Hacking Concepts
  • 5. Understanding Fundamentals of Penetration Testing and its Benefits
  • 6. Understanding the Fundamentals of Configuration Management and Asset Management
  • 7. Network Security Assessment Techniques and Tools - Lab.pdf

  • 09. Application Security
  • 1. Understanding Secure Application Design and Architecture
  • 2. Understanding Software Security Standards, Models, and Frameworks
  • 3. Understanding Secure Application, Development, Deployment, and Automation
  • 4. Overview of Application Security Testing Techniques and Tools
  • 5. Application Security - Lab.pdf

  • 10. Virtualization and Cloud Computing
  • 1. Overview of Virtualization Essential Concepts and OS Virtualization Security
  • 2. Overview of Cloud Computing Fundamentals
  • 3. Understanding the Insights of Cloud Security and Best Practices
  • 4. Virtualization and Cloud Computing - Lab.pdf

  • 11. Wireless Network Security
  • 1. Overview of Wireless Network Fundamentals
  • 2. Overview of Wireless Network Encryption Mechanisms
  • 3. Understanding Different Types of Wireless Network Authentication Methods
  • 4. Understanding and Implementing Wireless Network Security Measures
  • 5. Wireless Network Security - Lab.pdf

  • 12. Mobile Device Security
  • 1. Understanding Various Mobile Device Connection Methods
  • 2. Understanding Various Mobile Device Management Concepts
  • 3. Overview of Common Mobile Usage Policies in Enterprises
  • 4. Overview of Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
  • 5. Understanding and Implementing Various Enterprise-level Mobile Security Management Solutions
  • 6. Understanding and Implementing General Security Guidelines and Best Practices on Mobile Platforms
  • 7. Mobile Device Security - Lab.pdf
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 44831
    حجم: 8697 مگابایت
    مدت زمان: 501 دقیقه
    تاریخ انتشار: ۱ تیر ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید