وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
4

CISA Domain 5 Training – Protection of Information Assets

سرفصل های دوره

Protection of Information Assets - ISACA CISA Training ' 2023


1. Section 0 - Course Introduction
  • 1. 1-CISA0-Welcome to the Course
  • 2. 2-CISA0-What is CISA Certification

  • 2. Section 1 - Security Foundations
  • 1. 1-CISA5-The Security Objective and CIA Triad
  • 2. 2-CISA5-Security vs Privacy and Essential Security Terms
  • 3. 3-CISA5-Privacy Requirements and regulations
  • 4. 4-CISA5-Security Vulnerabilities Overview
  • 5. 5-CISA5-Cyber Kill Chain, the Process of Hacking into systems
  • 6. 6-CISA5-Cyber attacks Explanations - DoS DDoS Buffer overflow and MiTM
  • 7. 7-CISA5-Web Application Attacks
  • 8. 8-CISA5-Malware Types and Other Attacks
  • 9. 9-CISA5-Password Attacks and Rainbow Tables

  • 3. Section 2 - Personnel and Supply Chain Security
  • 1. 10-CISA5-Social Engineering
  • 2. 11-CISA5-Security Awareness Program
  • 3. 12-CISA5-Securing Supply Chain and Supply Chain Risk Management

  • 4. Section 3 - AAA
  • 1. 13-CISA5-The IAAA Framework
  • 2. 14-CISA5-MFA and Biometric
  • 3. 15-CISA5-Single Sign on (SSO) and Reduced Sign on (RSO)
  • 4. 16-CISA5-Authorisation and Access Control Models
  • 5. 17-CISA5-Owner and Custodian and their responsibilities in Assets protection

  • 5. Section 4 - Physical Security
  • 1. 18-CISA5-What is Physical Security
  • 2. 19-CISA5-Physical Access Control System 1
  • 3. 20-CISA5-Physical Access Control System 2
  • 4. 21-CISA5-Environmental Controls - Securing Power Sources
  • 5. 22-CISA5-Environmental Controls - Fire Threat and Controls
  • 6. 23-CISA5-Physical Security Best Practices

  • 6. Section 5 - Data Security
  • 1. 24-CISA5-Data Lifecycle
  • 2. 25-CISA5-Roles in Data and Assets Protection
  • 3. 26-CISA5-Privacy Regulation Roles
  • 4. 27-CISA5-Data Security Measures
  • 5. 28-CISA5-Data Classification
  • 6. 29-CISA5-Data Destruction
  • 7. 30-CISA5-RACI Matrix

  • 7. Section 6 - Cryptography
  • 1. 31-CISA5-Cryptography Overview
  • 2. 32-CISA5-Symmetric Encryption
  • 3. 33-CISA5-Asymmetric Encryption Overview
  • 4. 34-CISA5-Asymmetric Encryption Benefits
  • 5. 35-CISA5-Digital Certificate
  • 6. 36-CISA5-Public Key Infrastructure
  • 7. 37-CISA5-Integrity Hashing and Salting
  • 8. 38-CISA5-Encryption vs Hashing vs Encoding
  • 9. 39-CISA5-Digital Signature
  • 10. 40-CISA5-Cryptography Applications in IT

  • 8. Section 7 - Network Security
  • 1. 41-CISA5-Organization IT Infrastructure and Security Overview
  • 2. 42-CISA5-Network Segmentation and VLANs
  • 3. 43-CISA5-Firewalls
  • 4. 44-CISA5-Network Admission Control
  • 5. 45-CISA5-DMZ and Bastian Host
  • 6. 46-CISA5-Proxy, Load Balancer, Email Security

  • 9. Section 8 - Endpoint Security
  • 1. 47-CISA5-End-user Security Software Overview
  • 2. 48-CISA5-Endpoint Protection Platform Overview - EPP
  • 3. 49-CISA5-Endpoint security best practices

  • 10. Practice Exams - Domain 5
  • 1. Exam 1 - Domain 5.html
  • 2. Exam 2- Domain 5.html
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 21679
    حجم: 2657 مگابایت
    مدت زمان: 495 دقیقه
    تاریخ انتشار: ۷ آبان ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید