وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
00:00
00:00

Architecture and Design for CompTIA Security+

سرفصل های دوره

This course will teach you the fundamentals and key concepts around the security architecture and design, and how your organization implements and utilizes various tools and technologies to secure the environment.


1. Course Overview
  • 1. Course Overview

  • 02. Understanding Security Concepts in an Enterprise Environment
  • 01. Module Intro
  • 02. Configuration Management
  • 03. Diagrams
  • 04. Baseline Configuration
  • 05. IP Address Schema
  • 06. Data Sovereignty
  • 07. Data Loss Prevention (DLP)
  • 08. Types of Data to Secure
  • 09. Data Masking
  • 10. Tokenization
  • 11. Digital Rights Management (DRM)
  • 12. Hardware Based Encryption (TPM and HSM)
  • 13. Geographical Considerations
  • 14. Cloud Access Security Broker (CASB)
  • 15. Security-as-a-Service (SECaaS)
  • 16. Differences between CASB and SECaaS
  • 17. Recovery
  • 18. Secure Protocols and SSLTLS Inspection
  • 19. Hashing
  • 20. API Considerations and API Gateways
  • 21. Recovery Site Options (Cold, Warm, Hot, and Cloud-based Sites)
  • 22. Disaster Area Example
  • 23. Honeypots and Honeyfiles
  • 24. Honeynets
  • 25. Fake Telemetry
  • 26. DNS Sinkhole

  • 03. Understanding Virtualization and Cloud Computing
  • 01. Module Intro
  • 02. Cloud Storage
  • 03. Cloud Computing
  • 04. [X] as a Service
  • 05. Infrastructure as a Service (IaaS)
  • 06. IaaS and Automation
  • 07. Platform as a Service (PaaS)
  • 08. Software as a Service (SaaS)
  • 09. IaaS, PaaS, and SaaS Differentiators
  • 10. Types of Clouds
  • 11. Managed Service Providers (MSP)
  • 12. Fog Computing
  • 13. Edge Computing
  • 14. VDI
  • 15. Virtualization
  • 16. Containers
  • 17. Microservices and APIs
  • 18. Infrastructure as Code (IAC)
  • 19. Software Defined Networking (SDN)
  • 20. Software Defined Visibility (SDV)
  • 21. Serverless Architecture
  • 22. IaaS, PaaS, FaaS, and SaaS Differentiators
  • 23. Service Integrations and Resource Policies
  • 24. Transit Gateway
  • 25. VM Sprawl Avoidance
  • 26. VM Escape
  • 27. Module Review

  • 04. Implementing Secure Application Development, Deployment, and Automation
  • 01. Module Intro
  • 02. Environments (Dev, Test, Staging, and Production)
  • 03. Environment Example
  • 04. Provisioning and Deprovisioning
  • 05. Integrity Measurement
  • 06. Static Code Analysis
  • 07. Secure Coding Techniques
  • 08. Security Automation
  • 09. Continuous Monitoring and Validation
  • 10. Continuous Integration
  • 11. Continuous Delivery and Continuous Development
  • 12. OWASP
  • 13. Software Diversity, Compiler, and Binary
  • 14. Elasticity and Scalability
  • 15. Version Control

  • 05. Understanding Authentication and Authorizations Methods
  • 01. Module Intro
  • 02. Directory Services
  • 03. Usernames
  • 04. Federation
  • 05. Transitive Trust Authentication
  • 06. Attestation
  • 07. Time-Based One-Time Password (TOTP)
  • 08. HMAC-Based One-Time Password (HOTP)
  • 09. SMS Authentication
  • 10. Tokens
  • 11. Static Codes
  • 12. Authentication Applications
  • 13. Push Notifications
  • 14. Smart Cards
  • 15. Proximity Cards
  • 16. Personal Identification Verification Card (PIV)
  • 17. Common Access Card
  • 18. Biometric Factors
  • 19. Facial Recognition
  • 20. Vein and Gait Analysis
  • 21. Efficacy Rates
  • 22. Identification vs. Authentication vs. Authorization
  • 23. Multifactor Authentication
  • 24. Authentication Factors
  • 25. Authorization
  • 26. Authentication Factors
  • 27. Authentication, Authorization, and Accounting (AAA)
  • 28. On-prem vs. Cloud Requirements

  • 06. Implementing Cybersecurity Resilience
  • 01. Module Intro
  • 02. Geographically Disperse
  • 03. Geographical Dispersal of Assets
  • 04. RAID
  • 05. Multipath
  • 06. Load Balancer
  • 07. Power Resiliency
  • 08. Replication
  • 09. On-prem vs. Cloud
  • 10. Backup Plans Policies
  • 11. Backup Execution Frequency
  • 12. Backup Types
  • 13. Backup Environments
  • 14. Online vs. Offline Backups
  • 15. Backups - Distance Considerations
  • 16. Non-persistence, Snapshots, and Live Boot Media
  • 17. High Availability
  • 18. Redundancy
  • 19. Fault Tolerant Hardware
  • 20. Technology and Vendor Diversity
  • 21. Crypto and Control Diversity

  • 07. Recognizing Security Implications of Embedded and Specialized Systems
  • 01. Module Intro
  • 02. Module Goal
  • 03. Embedded Systems
  • 04. Embedded Systems Examples
  • 05. SCADA ICS
  • 06. SCADA Security Concerns
  • 07. Smart Devices IoT
  • 08. Smart Devices IoT Weak Defaults
  • 09. Special Purpose Devices
  • 10. Vehicles
  • 11. Voice over IP (VoIP)
  • 12. HVAC
  • 13. AircraftUAV
  • 14. PrintersMFDs
  • 15. Real Time Operating Systems (RTOS)
  • 16. Surveillance Systems
  • 17. System on a Chip (SoC)
  • 18. 5G Networks and Security Concerns
  • 19. Narrow-band and Baseband Radio
  • 20. Zigbee
  • 21. Constraints

  • 08. Understanding the Importance of Physical Security Controls
  • 01. Module Intro
  • 02. Barricades
  • 03. Mantraps
  • 04. Badges
  • 05. Alarms
  • 06. Lighting and Signs
  • 07. Cameras and Video Surveillance
  • 08. Guards
  • 09. Robot Sentries
  • 10. Reception
  • 11. Two Person Integrity (TPI) Control
  • 12. Hardware Locks
  • 13. Biometrics
  • 14. Cable Locks, Safes, and Locking Cabinets
  • 15. USB Data Blocker
  • 16. Fencing
  • 17. Fire Suppression
  • 18. Motion Detection Infrared
  • 19. Proximity Readers
  • 20. Drones UAV
  • 21. Logs
  • 22. Air Gaps
  • 23. Demilitarized Zone (DMZ)
  • 24. Protected Distribution System (PDS)
  • 25. Hot and Cold Aisles
  • 26. Non-Digital and Digital Data Destruction
  • 27. Shredding
  • 28. Pulping and Pulverizing
  • 29. Deguassing
  • 30. Purging
  • 31. Wiping
  • 32. Module Review

  • 09. Understanding the Basics of Cryptographic Concepts
  • 01. Module Intro
  • 02. Why You Should Care
  • 03. Cryptographic Terminology and History
  • 04. Vigenere Table
  • 05. Digital Signatures
  • 06. Key Stretching
  • 07. Hashing
  • 08. In-band vs. Out-of-band Key Exchange
  • 09. Elliptic Curve Cryptography (ECC)
  • 10. Perfect Forward Secrecy
  • 11. Quantum Communications
  • 12. Quantum Computing
  • 13. Post Quantum
  • 14. Ephemeral Key
  • 15. Cipher Modes
  • 16. XOR Function
  • 17. Cryptographic Methods and Design
  • 18. Blockchain
  • 19. Fundamental Differences and Encryption Methods
  • 20. Session Keys
  • 21. Asymmetric Encryption
  • 22. Lightweight Encryption
  • 23. Steganography
  • 24. Homomorphic Encryption
  • 25. Common Use Cases
  • 26. Cipher Suites
  • 27. Limitations
  • 28. Random and Pseudorandom Number Generators (PRNG)
  • 29. Quantum Random Number Generators (QRNG)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 5745
    حجم: 669 مگابایت
    مدت زمان: 340 دقیقه
    تاریخ انتشار: ۲۰ بهمن ۱۴۰۱
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید