وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Become a SOC Analyst – Level 3

سرفصل های دوره

1. CompTIA CASP (CAS-004)
    Module 1 - About the Exam and Certification
  • 1.1 Course Welcome and Introduction
  • 1.2 CASP+ Overview
  • 1.3 CASP+ Course Overview
    Module 2 - Security Architecture
  • 2.1 Network Security Architecture Part 1
  • 2.2 Network Security Architecture Part 2
  • 2.3 Secure Infrastructure Design
  • 2.4 Integrating Software Applications Part 1
  • 2.5 Integrating Software Applications Part 2
  • 2.6 Software Development Activities
  • 2.7 Data Security and the Data Life Cycle
  • 2.8 Authentication
  • 2.9 Authorization Controls
  • 2.10 Virtualization and Cloud Technology
  • 2.11 Emerging Technologies
    Module 3 - Security Operations
  • 3.1 Threat Management
  • 3.2 Threat Management Frameworks
  • 3.3 Indicators of Compromise
  • 3.4 Vulnerability Management
  • 3.5 Vulnerability Assessments
  • 3.6 Vulnerability Risk Mitigation Part 1
  • 3.7 Vulnerability Risk Mitigation Part 2
  • 3.8 Techniques for Risk Reduction
  • 3.9 Incident Response
  • 3.10 Forensics Concepts
  • 3.11 Forensics Tools
    Module 4 - Security Engineering and Cryptography
  • 4.1 Enterprise Mobility Security Part 1
  • 4.2 Enterprise Mobility Security Part 2
  • 4.3 Endpoint Security - Hardening Part 1
  • 4.4 Endpoint Security - Hardening Part 2
  • 4.5 Sector-Specific Technology Security Concerns
  • 4.6 ICS Protocols
  • 4.7 Security Implications of Cloud Technology Adoption
  • 4.8 Cryptography
  • 4.9 Implementing Public Key Infrastructure
  • 4.10 Implementing PKI Solutions
  • 4.11 Common Certificate Implementation Issues
    Module 5 - Governance, Risk, and Compliance
  • 5.1 Understanding Risk
  • 5.2 The Risk Life Cycle
  • 5.3 Vendor Risk
  • 5.4 Governance and Compliance Part 1
  • 5.5 Governance and Compliance Part 2
  • 5.6 Business Impact Analysis
  • 5.7 Disaster Recovery Plans
    Module 6 - Preparing for Your Exam
  • 6.1 Course Recap
  • 6.2 Study Strategies
  • 6.3 Exam Time - Strategies for Success
    Resources
  • CASP Glossary.pdf
  • CASP Resources.pdf
  • CASP Syllabus.pdf

2. OWASP Top 10 - 2021
    Module 1 - Introduction
  • 1.1 Introduction
  • 1.2 An Introduction to OWASP
  • 1.3 The OWASP Top 10
  • 1.4 OWASP Web Security Testing Guide (WSTG)
  • 1.5 Using Intercepting Proxies in Web Application Security Testing
  • 1.6 Video Demonstration of Using Intercepting Proxies
  • 1.7 Video Demonstration of Using OWASP Mutillidae
    Resources
  • OWASP Top 10 2021 Complete Syllabus.pdf

3. Intro to Malware Analysis and Reverse Engineering
    Module 1 - Introduction
  • 1.1 Intro Part 1
  • 1.2 Intro Part 2
  • 1.3 Intro Part 3
    Module 2 - Lab Setup
  • 2.1 Lab Setup Part 1
  • 2.2 Lab Setup Part 2
  • 2.3 Lab Setup Part 3
    Module 3 - Dynamic Analysis Part 1
  • 3.1 Dynamic Analysis Part 1.1
  • 3.2 Dynamic Analysis Part 1.2
  • 3.3 Dynamic Analysis Part 1.3
    Module 4 - Dynamic Analysis Part 2
  • 4.1 Dynamic Analysis Part 2.1
  • 4.2 Dynamic Analysis Part 2.2
    Module 5 - Basic Static Analysis
  • 5.1 Basic Static Analysis Part 1
  • 5.2 Basic Static Analysis Part 2
  • 5.3 Basic Static Analysis Part 3
  • 5.4 Basic Static Analysis Part 4A
  • 5.5 Basic Static Analysis Part 4B
  • 5.6 Basic Static Analysis Part 5
  • 5.7 Basic Static Analysis Part 6
    Module 6 - Packers
  • 6.1 Packers Part 1
  • 6.2 Packers Part 2
  • 6.3 Packers Part 3
  • 6.4 Packers Part 4
  • 6.5 Packers Part 5
    Module 7 - Malware Defenses
  • 7.1 Malware Defenses Part 1
  • 7.2 Malware Defenses Part 2
  • 7.3 Malware Defenses Part 3
    Resources
  • Intro to Malware Analysis and Reverse Engineering Glossary 1 .pdf
  • Intro to Malware Analysis and Reverse Engineering Study Guide 1 .pdf

4. Assembly
  • Resources.zip
      Module 1 - Basic Assembly
    • 1.1 Template and Setup
    • 1.2 Introduction to Assembly
    • 1.3 Architecture, Registers, and Protected Mode
    • 1.4 Binary, 2s Complement and Hexadecimal
    • 1.5 Assembly Template
    • 1.6 Instructions, Directives and Generating a Listing
    • 1.7 Logical Operators and Memory Layout
    • 1.8 Segments and Functions
    • 1.9 Sign Extend, Zero Extend, Multiple, Divide
    • 1.10 Multiply and Divide Examples
    • 1.11 Compare, Conditionals and Jumps
    • 1.12 Skeleton and Loop Example
    • 1.13 Shift Left and Right
    • 1.14 Arithmetic Shift
    • 1.15 Module 1 Review
      Module 2 - Indirect Addressing, Stack, Arrays and Strings
    • 2.1 Indirect Addressing and Variables Part 1
    • 2.2 Indirect Addressing and Variables Part 2
    • 2.3 Slack Intro Part 1
    • 2.4 Slack Intro Part 2
    • 2.5 Stack Usage
    • 2.6 Simple Function Example
    • 2.7 Function Prologue
    • 2.8 Function Epilogue
    • 2.9 Function Arguments
    • 2.10 Saving Registers
    • 2.11 More Complicated Function
    • 2.12 Calling Conventions
    • 2.13 Local Variables
    • 2.14 Local Variables Example
    • 2.15 Enter and Leave
    • 2.16 Enter and Leave Example Conversion
    • 2.17 Floating Point
    • 2.18 Floating Point Circle Example
    • 2.19 Floating Point Comparison
    • 2.20 Floating Point Comparison Example
    • 2.21 Max of Three Numbers
    • 2.22 Conditional Move
    • 2.23 Conditional Move Max Example
    • 2.24 Arrays
    • 2.25 Arrays Examples
    • 2.26 String Instructions
    • 2.27 Strings Uppercase Example
      Module 3 - ARM Architecture
    • 3.1 ARM Intro
    • 3.2 ARM Template
    • 3.3 ARM Math and Data Movement
    • 3.4 Branching, If, While, Shift
    • 3.5 Shift Example
    • 3.6 Memory, Offsets, Debugging and Listing
    • 3.7 Pushing and Popping
    • 3.8 Push Example
    • 3.9 Array Indexing
    • 3.10 Array Indexing Example
    • 3.11 ARM Multiple Load and Store
    • 3.12 ARM Load and Store Multiple Examples
    • 3.13 VFP and Neon
    • 3.14 Neon Example
    • 3.15 Neon Floating Point
    • 3.16 Neon Floating Point Example
    • 3.17 SIMD Load and Store Data
    • 3.18 SIMD Process Data
    • 3.19 SIMD Encryption Example
    • 3.20 Thumb Mode
    • 3.21 Thumb Mode Example
    • 3.22 Conditional Execution
    • 3.23 Conditional Execution Example
    • 3.24 IT Block Assembly
    • 3.25 IT Block Example
      Module 4 - C Constructs and Interrupts
    • 4.1 Tools for Code, Reverse Engineering
    • 4.2 Reverse Engineering Process
    • 4.3 Setup Reverse Engineering Lab
    • 4.4 Structures and Unions
    • 4.5 Structure Layout
    • 4.6 Structure Creation - Reverse Engineering
    • 4.7 Structures, Unions and Malloc
    • 4.8 Structures, Unions and Malloc Example
    • 4.9 Jump Tables and Switch Statements
    • 4.10 Jump Table Example
    • 4.11 Function Pointers
    • 4.12 Function Pointers Example
    • 4.13 Inline Assembly
    • 4.14 Inline Assembly Example
    • 4.15 Assembly with C
    • 4.16 SysCall and Interrupts
    • 4.17 Interrupts Example Use Fork
    • 4.18 Strings in C
    • 4.19 Integers in Assembly
    • 4.20 64-Bit Assembly
    • 4.21 MMX, SSE, AES-NI
    • 4.22 AES Implementations
    • 4.23 Implement Dump Registers
    • 4.24 Static and Dynamic Linking Assembly
    • 4.25 Shared Library
    • 4.26 Shared Library Example

  • 5. How to Use binwalk (BSWJ)
      Module 1 - BSWJ - binwalk
    • 1.1 BSWJ - binwalk

    6. MITRE ATT&CK Defender (MAD) ATT&CK
  • Resources.zip
      Module 1 - Mapping to ATT&CK
    • 1.1 Introduction - Challenges,
    • 1.2 Finding and Researching the Behavior
    • 1.3 Translating the Behavior into a Tactic
    • 1.4 Identifying Techniques or Sub-Techniques
    • 1.5 Mapping to a Narrative Point
    • 1.6 Hedging Your Biases
      Module 2 - Mapping to ATT&CK
    • 2.1 The Process of Mapping from Raw Data
    • 2.2 Identify and Research Behaviors
    • 2.3 Translate Behaviors to Tactics, Techniques and Sub-Techniques
    • 2.4 Raw Data to Narrative Reporting
      Module 3 - Storing and Analyzing ATT&CK
    • 3.1 Storing and Displaying ATT&CK-Mapped Data
    • 3.2 Expressing and Storing ATT&CK-Mapped Data
    • 3.3 Analyzing ATT&CK-Mapped Data
    • 3.4 Exercise 3 - Comparing Layers in ATT&CK Navigator
      Module 4 - Making Defensive
    • 4.1 The Defensive Recommendations Process
    • 4.2 How Techniques and Sub-Techniques are Being Used
    • 4.3 Researching Organizational
    • 4.4 Make Defensive Recommendations
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 29480
    حجم: 4688 مگابایت
    مدت زمان: 2009 دقیقه
    تاریخ انتشار: 1 اسفند 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید