وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

ISC2 CISSP Full Course & Practice Exam

سرفصل های دوره

Pass the ISC2 CISSP exam on your 1st attempt, includes a full practice exam!


1 - Introduction
  • 1 - Introduction
  • 2 - CISSP-Study-Plan.pdf
  • 2 - Download your free study guide.html
  • 2 - ISC2-CISSP-Study-Guide.pdf
  • 3 - Exam Tips

  • 2 - Security Management Concepts
  • 4 - Security Management Concepts
  • 5 - Code of Ethics OBJ 11
  • 6 - Information Security Concepts OBJ 12
  • 7 - Aligning Security And The Organization OBJ 13
  • 8 - Organizational Roles and Responsibilities OBJ 13
  • 9 - Security Awareness Training And Education OBJ 112
  • 10 - Social Engineering OBJ 112
  • 11 - Personnel Security Policies OBJ 18
  • 12 - Personnel Safety and Security OBJ 715

  • 3 - Security Governance and Compliance
  • 13 - Security Governance and Compliance
  • 14 - Due Care and Due Diligence OBJ 13
  • 15 - Important Laws and Regulations OBJ 14
  • 16 - Licensing and Property Rights OBJ 14
  • 17 - Export and Import Controls OBJ 14
  • 18 - Cybercrime And Data Breaches OBJ 14
  • 19 - Determine Compliance Requirements OBJ 14
  • 20 - Security Compliance Artifacts OBJ 16

  • 4 - Risk Management
  • 21 - Risk Management
  • 22 - Risk Management Concepts OBJ 19
  • 23 - Risk Response And Monitoring OBJ 19
  • 24 - Controls and Countermeasures OBJ 19
  • 25 - Continuous Monitoring OBJ 19 72
  • 26 - Supply Chain Risk Management OBJ 111

  • 5 - Risk Frameworks
  • 27 - Risk Frameworks
  • 28 - Risk Frameworks OBJ 19
  • 29 - NIST Cybersecurity Framework OBJ 19
  • 30 - ISOIEC 27001 OBJ 19
  • 31 - Understanding PCI DSS OBJ 19
  • 32 - Understanding SABSA OBJ 19

  • 6 - Risk Assessments
  • 33 - Risk Assessments
  • 34 - Understanding Risk Assessments OBJ 19
  • 35 - Conducting Risk Assessments OBJ 19
  • 36 - Control Assessments OBJ 19
  • 37 - Privacy Control Assessments OBJ 19
  • 38 - PCI DSS Assessments OBJ 19
  • 39 - Threat Modeling Concepts OBJ 110
  • 40 - Threat Modeling Methodologies OBJ 110

  • 7 - Asset Security
  • 41 - Asset Security
  • 43 - Information and Asset Handling Requirements OBJ 22
  • 44 - Managing System Assets OBJ 23
  • 45 - Data Roles And Responsibilities OBJ 24
  • 46 - Managing The Data Lifecycle OBJ 24
  • 47 - The Information System Lifecycle Part 1 OBJ 310
  • 48 - The Information System Lifecycle Part 2 OBJ 310

  • 8 - Data Security Controls
  • 49 - Data Security Controls
  • 50 - Understanding Data States OBJ 26 75
  • 51 - Security Control Frameworks OBJ 13
  • 52 - Determining Security Controls OBJ 26
  • 53 - Selecting Security Controls OBJ 26 33
  • 54 - Data Protection Methods OBJ 26
  • 55 - Data Retention Requirements OBJ 24
  • 56 - Managing Data Remanence OBJ 24

  • 9 - Secure Design Principles
  • 57 - Secure Design Principles
  • 58 - Understanding Secure Design OBJ 35
  • 59 - Secure Design Principles OBJ 31
  • 60 - Zero Trust Architecture OBJ 31 54
  • 61 - Privacy By Design OBJ 31
  • 62 - System Security Capabilities OBJ 34
  • 63 - Understanding Security Models OBJ 32
  • 64 - Security Models Part 1 OBJ 32
  • 65 - Security Models Part 2 OBJ 32

  • 10 - Secure Architecture Design
  • 66 - Secure Architecture Design
  • 67 - System Architectures OBJ 35
  • 68 - Database Systems OBJ 35
  • 69 - Common Criteria OBJ 35
  • 70 - Industrial Control Systems OBJ 35
  • 71 - Secure Access Service Edge OBJ 31
  • 72 - Internet of Things OBJ 35
  • 73 - Microservices OBJ 35
  • 74 - Embedded Systems OBJ 35
  • 75 - HighPerformance Computing OBJ 35
  • 76 - Edge Computing Systems OBJ 35

  • 11 - Virtualization and Cloud Computing
  • 77 - Virtualization and Cloud Computing
  • 78 - Virtualized Systems OBJ 35
  • 79 - Containerization OBJ 35
  • 80 - Cloud Deployment Models OBJ 35
  • 81 - Cloud Service Models OBJ 35
  • 82 - Shared Responsibility Model OBJ 35
  • 83 - Virtual Private Cloud OBJ 41
  • 84 - Serverless Computing OBJ 35

  • 12 - Cryptographic Solutions
  • 85 - Cryptographic Solutions
  • 86 - Understanding Cryptography OBJ 36
  • 87 - Cryptographic Methods OBJ 36
  • 88 - Symmetric Ciphers OBJ 36
  • 89 - Asymmetric Ciphers OBJ 36
  • 90 - Quantum Cryptography OBJ 36
  • 91 - Hash Functions OBJ 36
  • 92 - Cryptographic Key Management OBJ 36
  • 93 - Digital Signatures and Certificates OBJ 36
  • 94 - Public Key Infrastructure OBJ 36

  • 13 - Cryptanalytic Attacks
  • 95 - Cryptanalytic Attacks
  • 96 - Vulnerabilities In Cryptographic Systems OBJ 35
  • 97 - Cryptanalytic Attacks Part 1 OBJ 37
  • 98 - Cryptanalytic Attacks Part 2 OBJ 37
  • 99 - Cryptanalytic Attacks Part 3 OBJ 37

  • 14 - Physical Security
  • 100 - Physical Security
  • 101 - Site Design Principles OBJ 38
  • 102 - Facility Design Principles OBJ 39
  • 103 - Facility Security Controls OBJ 39
  • 104 - Facility Infrastructure Security OBJ 39
  • 105 - Fire Prevention Detection and Suppression OBJ 39
  • 106 - Physical Security Controls OBJ 714

  • 15 - Network Components
  • 107 - Network Components
  • 108 - Hardware Operations OBJ 42
  • 109 - Network Infrastructure Operations OBJ 42
  • 110 - Transmission Media Part 1 OBJ 42
  • 111 - Transmission Media Part 2 OBJ 42
  • 112 - Network Monitoring OBJ 41

  • 16 - Networking Concepts
  • 113 - Networking Concepts
  • 114 - TCPIP and OSI Models OBJ 41
  • 115 - IP Networking OBJ 41
  • 116 - LAN Communications OBJ 41
  • 117 - Communication Protocols OBJ 41
  • 118 - Multilayer Protocols OBJ 41
  • 119 - Converged Protocols OBJ 41
  • 120 - Data Communications OBJ 43
  • 121 - Virtualized Networks OBJ 43

  • 17 - Network Architectures
  • 122 - Network Architectures
  • 123 - Content Distribution Networks OBJ 41
  • 124 - Software Defined Networks OBJ 41
  • 125 - Application Programming Interfaces OBJ 41
  • 126 - Network Functions Virtualization OBJ 41

  • 18 - Secure Network Design
  • 127 - Secure Network Design
  • 128 - Transport Architecture OBJ 41
  • 129 - Performance Metrics OBJ 41
  • 130 - Network Traffic Flows OBJ 41
  • 131 - Physical Network Segmentation OBJ 41
  • 132 - Logical Network Segmentation OBJ 41
  • 133 - MicroSegmentation OBJ 41
  • 134 - Edge Networks OBJ 41
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 45180
    حجم: 7994 مگابایت
    مدت زمان: 1314 دقیقه
    تاریخ انتشار: ۱۰ تیر ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید