وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CodeRed Certified Cybersecurity Technician (CCT)

سرفصل های دوره

01. Information Security Threats and Vulnerabilities
  • 1. Overview of Threats Sources
  • 2. Overview of Threat Actors Agents
  • 3. Understanding Malware and its Types
  • 4. Overview of Vulnerabilities
  • 5. Understanding Different Types of Vulnerabilities
  • 6. Information Security Threats and Vulnerabilities - Lab.pdf

  • 02. Information Security Attacks
  • 1. Overview of Information Security Attacks
  • 2. Overview of Hacking Methodologies and Frameworks
  • 3. Understanding Network-level Attacks
  • 4. Understanding Application-level and OS-level Attacks
  • 5. Understanding Social Engineering Attacks
  • 6. Understanding Wireless Network-specific Attacks
  • 7. Understanding IoT, OT, and Cloud Attacks
  • 8. Understanding Cryptographic Attacks
  • 9. Information Security Attacks - Lab.pdf

  • 03. Network Security Fundamentals
  • 1. Overview of Information Security Fundamentals
  • 2. Overview of Network Security Fundamentals

  • 04. Identification, Authentication, and Authorization
  • 1. Overview of Access Control Principles, Terminologies, and Models
  • 2. Overview of Identity and Access Management (IAM)
  • 3. Identification, Authentication and Authorization - Lab.pdf

  • 05. Network Security Controls - Administrative Controls
  • 1. Understanding Various Regulatory Frameworks, Laws, and Acts
  • 2. Overview of Information Security Governance and Compliance Program
  • 3. Learn to Design and Develop Security Policies
  • 4. Learn to Conduct Different Type of Security and Awareness Training
  • 5. Network Security Controls - Administrative Controls - Lab.pdf

  • 06. Network Security Controls - Physical Controls
  • 1. Understanding the Importance of Physical Security
  • 2. Understanding Various Physical Security Controls
  • 3. Overview of Workplace Security
  • 4. Understanding Various Environmental Controls

  • 07. Network Security Controls - Technical Controls
  • 01. Overview of Essential Network Security Protocols
  • 02. Understanding Security Benefits of Network Segmentation
  • 03. Understanding Different Types of Firewalls and their Role
  • 04. Understanding Different Types of IDS IPS and their Role
  • 05. Understanding Different Types of Honeypots
  • 06. Understanding Different Types of Proxy Servers and their Benefits
  • 07. Overview of VPN and its importance in Network Security
  • 08. Overview of Other Network Security Controls
  • 09. Understanding Importance of Load Balancing in Network Security
  • 10. Understanding Various Antivirus Anti-malware Software
  • 11. Network Security Controls - Technical Controls - Labs.pdf

  • 08. Network Security Assessment Techniques and Tools
  • 1. Overview of Threat Hunting
  • 2. Understanding Various Threat Intelligence Feeds and Sources
  • 3. Overview of Vulnerability Assessment
  • 4. Overview of Ethical Hacking Concepts
  • 5. Understanding Fundamentals of Penetration Testing and its Benefits
  • 6. Understanding the Fundamentals of Configuration Management and Asset Management
  • 7. Network Security Assessment Techniques and Tools - Lab.pdf

  • 09. Application Security
  • 1. Understanding Secure Application Design and Architecture
  • 2. Understanding Software Security Standards, Models, and Frameworks
  • 3. Understanding Secure Application, Development, Deployment, and Automation
  • 4. Overview of Application Security Testing Techniques and Tools
  • 5. Application Security - Lab.pdf

  • 10. Virtualization and Cloud Computing
  • 1. Overview of Virtualization Essential Concepts and OS Virtualization Security
  • 2. Overview of Cloud Computing Fundamentals
  • 3. Understanding the Insights of Cloud Security and Best Practices
  • 4. Virtualization and Cloud Computing - Lab.pdf

  • 11. Wireless Network Security
  • 1. Overview of Wireless Network Fundamentals
  • 2. Overview of Wireless Network Encryption Mechanisms
  • 3. Understanding Different Types of Wireless Network Authentication Methods
  • 4. Understanding and Implementing Wireless Network Security Measures
  • 5. Wireless Network Security - Lab.pdf

  • 12. Mobile Device Security
  • 1. Understanding Various Mobile Device Connection Methods
  • 2. Understanding Various Mobile Device Management Concepts
  • 3. Overview of Common Mobile Usage Policies in Enterprises
  • 4. Overview of Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
  • 5. Understanding and Implementing Various Enterprise-level Mobile Security Management Solutions
  • 6. Understanding and Implementing General Security Guidelines and Best Practices on Mobile Platforms
  • 7. Mobile Device Security - Lab.pdf
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 44831
    حجم: 8697 مگابایت
    مدت زمان: 501 دقیقه
    تاریخ انتشار: ۱ تیر ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید