وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
5

CASP+ Certification Training

سرفصل های دوره

1. Secure Network Architecture Services
  • 1. DoS Protection, Load Balancers and Proxies
  • 2. Intrusion PreventionDetection Systems
  • 3. Application Security
  • 4. NACs and VPNs
  • 5. Securing DNS and Email
  • 6. Routers and NAT Gateways
  • 7. Firewalls, UTMs and NGFWs

  • 2. Secure Network Architecture Practices
  • 1. Traffic Monitoring
  • 2. Security Sensors
  • 3. Network Segmentation
  • 4. Deperimeterization Zero Trust
  • 5. Merging Networks
  • 6. Defense In Depth

  • 3. Security Infrastructure Design
  • 1. Software Defined Networking (SDN)
  • 2. Scalability and Automation
  • 3. Resiliency In Infrastructure Design
  • 4. Virtuailzation and Containerization
  • 5. CDNs and Caching

  • 4. Secure Software Integration
  • 1. Baselines and Templates
  • 2. APIs and Middleware
  • 3. Software Assurance
  • 4. Integrating Enterprise Applications
  • 5. Application Development Security
  • 6. Web Application Security

  • 5. Data Security Techniques
  • 1. Data Loss Prevention and Detection
  • 2. Data Classification, Labeling and Tagging
  • 3. Obfuscation and Anonymization of Data
  • 4. Data Lifecycle Management
  • 5. Data Inventory and Mapping
  • 6. Data Integrity Management

  • 6. Authentication and Authorization Controls
  • 1. Managing Credentials
  • 2. Password Policies
  • 3. Access Control
  • 4. AAA Protocols
  • 5. MFA, OTP and SSO
  • 6. Authenticating Hardware and People

  • 7. Cloud and Virtualization Solutions
  • 1. Virtualization Technologies
  • 2. Virtualization Strategies
  • 3. Cloud Deployment Models
  • 4. Cloud Computing Characteristics
  • 5. Cloud Provider Limitations
  • 6. Extending On-premise Security Controls

  • 8. Cryptography and PKI
  • 1. The CIA Triad
  • 2. Non-repudiation and Compliance Requirements
  • 3. Cryptography and PKI
  • 4. Hashes and Digital Signatures
  • 5. Cryptography Use Cases

  • 9. Enterprise Security and Emerging Technologies
  • 1. AI and ML
  • 2. Quantum Computing and Nano Technology
  • 3. Homomorphic Encryption and SMC
  • 4. Blockchain and Distributed Consensus
  • 5. Big Data and Passwordless Authentication
  • 6. Virtual Reality and 3D Printing
  • 7. Deepfakes and Biometric Impersonation

  • 10. Threat Management Activities
  • 1. Threat Intelligence
  • 2. Threat Intel Collection Methods
  • 3. Types of Threat Actors
  • 4. Threat Management Frameworks
  • 5. Using MITRE ATT&CK
  • 6. IOCs and Responses

  • 11. Vulnerability Management Activities
  • 1. Vulnerability Scans
  • 2. Security Content Automation Protocol (SCAP)
  • 3. Assessments
  • 4. Patch Management
  • 5. Information Sources

  • 12. Vulnerability Assessments and Pentesting
  • 1. Vulnerability Assessment vs Pentesting
  • 2. Testing Methods
  • 3. Pentesting Post Exploit
  • 4. Vulnerability Assessment Tools
  • 5. Some Pentesting Tools
  • 6. Vulnerability Assessments and Pentesting Requirements

  • 13. Vulnerability Analysis and Mitigation
  • 1. Common Software Vulnerabilities
  • 2. Race Conditions
  • 3. Cryptographic Vulnerabilities
  • 4. Software Development Vulnerabilities
  • 5. Web Application Attacks
  • 6. VM and Network-Based Attacks

  • 14. Using Processes to Reduce Risk
  • 1. Being Proactive
  • 2. Using Data Analysis
  • 3. Preventative Measures
  • 4. Application Control
  • 5. Security Automation
  • 6. Physical .Security

  • 15. Incidents and Their Responses
  • 1. Intro
  • 2. Event Classification
  • 3. Event Triage
  • 4.Incident Response Process
  • 5. Incident Response Playbooks
  • 6. Automated Response
  • 7. Communications Plans & Stakeholder Management

  • 16. Forensic Concepts and Analysis
  • 1. Intro
  • 2. Forensic Process Identification
  • 3. Digital Forensics
  • 4. Forensic Process Evidence Collection
  • 5. Forensic Process Evidence Preservation
  • 6. Forensic Process Analysis
  • 7. Forensic Process Verification and Presentation

  • 17. Configuring Enterprise Mobility and Endpoint Security
  • 1. Intro
  • 2. Enterprise Mobility Management
  • 3. Windows Information Protection
  • 4. Configuring Endpoint Security Controls
  • 5. Hardening Techniques
  • 6. Compensation Controls

  • 18. Cloud Adoption And Operational Technology Security Impacts
  • 1. Intro
  • 2. Cloud Deployment Models
  • 3. Impacts of Cloud Technology Adoption
  • 4. Securing Specialized Technologies
  • 5. Cloud Threats And Vulnerabilities
  • 6. Monitoring Logs Using Azure AD Audit.
  • 7. Emerging Technologies

  • 19. Implementing PKI Solutions and Cryptography
  • 1. Introduction To Public Key Infrastructure
  • 2. The Role Of Public Key Infrastructure
  • 3. Private And Public Key Encryption
  • 4. Certificate Lifecycle
  • 5. Certificate Types And Usage
  • 6. Understanding Trust Concepts

  • 20. Implementing Cryptographic Protocols and Algorithms
  • 1. Hashing
  • 2. SSLTLS
  • 3. . Symmetric And Asymmetric Algorithm
  • 4. SMIME and SSH
  • 5. Internet Protocol Security (IPSec)

  • 21. Risk Strategies
  • 1. Risk Analysis Methods
  • 2. Responding To Risk
  • 3. Types of Risk
  • 4. Risk Management Lifecycle and Frameworks
  • 5. Tracking Risk
  • 6. Risk Appetite, Tolerance, and Capacity
  • 7. Policies and Security Practices

  • 22. Managing and Mitigating Third Party Risk
  • 1. Third Party Risk Management
  • 2. Vendor Lock-InOut and Viability
  • 3. Meeting Obligations
  • 4. Third Party Dependencies
  • 5. Technical Considerations
  • 6. Additional Vendor Considerations

  • 23. Compliance Frameworks and Legal Considerations
  • 1. Data Considerations
  • 2. Location, Location, Location
  • 3. Regulations, Accreditations and Standards
  • 4. Legal Considerations
  • 5. Contract and Agreement Types

  • 24. Business Continuity and Disaster Recovery Planning
  • 1. BC and DR Planning
  • 2. BCDR Planning Process
  • 3. Creating a BC Plan
  • 4. DR Planning
  • 5. Resiliency Technologies
  • 6. Testing BCDR Plans
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 41278
    حجم: 8287 مگابایت
    مدت زمان: 1243 دقیقه
    تاریخ انتشار: ۱۵ آبان ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید