وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISSP – 4th Edition

سرفصل های دوره
  • 1.1 Organizational and Professional Ethics
  • 2.1 Information and Cybersecurity Principles
  • 3.1 Strategic Alignment
  • 3.2 Organizational Roles and Responsibilities
  • 3.3 Security Control Frameworks
  • 4.1 Regulatory and Compliance Obligations
  • 4.2 Intellectual Property & Transborder Data Flow
  • 4.3 Privacy Principles
  • 4.4 Cybercrime and Data Breaches
  • 5.1 Investigation Objectives and Requirements
  • 6.1 Governance Documents
  • 7.1 Business Continuity Planning
  • 7.2 Business Impact Analysis
  • 8.1 Workforce Lifecycle Security
  • 8.2 Workforce and Third-party Policies and Agreements
  • 9.1 Risk Basics
  • 9.2 Risk Assessment
  • 9.3 Risk Analysis
  • 9.4 Risk Response and Treatment
  • 9.5 Risk Mitigation Controls
  • 9.6 Risk Monitoring, Reporting, and Maturity
  • 10.1 Threat Actors and Attributes
  • 10.2 Attack Vectors - Digital Infrastructure
  • 10.3 Attack Vectors - People
  • 10.4 Attack Vectors - Code
  • 10.5 Threat Modeling and Intelligence
  • 11.1 Supply Chain Relationships and Risks
  • 11.2 Supply Chain Risk Management and Mitigation
  • 12.1 SETA Principles and Practices
  • 12.2 Emerging SETA Trends, Techniques, and Topics
  • 13.1 Asset Classification
  • 14.1 Asset Handling Requirements
  • 15.1 Asset Management
  • 16.1 Data Management
  • 16.2 Data Collection, Retention, and Archiving
  • 16.3 Data Deletion and Media Destruction
  • 17.1 Asset Retention and Retirement
  • 18.1 Control Baselines
  • 18.2 Data Protection Methods
  • 19.1 Secure Design Principles
  • 19.2 Zero Trust and Secure Access Service Edge (SASE)
  • 20.1 Information Security Models
  • 21.1 Security Evaluation Criteria
  • 22.1 Trusted Computing Base
  • 23.1 Client-based, Server-based, and Distributed Systems
  • 23.2 Database Management Systems
  • 23.3 Operational Technology (OT)
  • 23.4 Cloud-based Systems
  • 23.5 Internet of Things (IoT & IIoT) Systems
  • 23.6 Virtualization
  • 23.7 Automation and Solution Elements
  • 24.1 Cryptography Primer
  • 24.2 Encryption
  • 24.3 Hashing and Digital Signatures
  • 24.4 PKI and Digital Certificates
  • 24.5 Emerging Cryptography
  • 25.1 Cryptographic Attacks
  • 25.2 Post-Exploitation Attacks
  • 25.3 Ransomware
  • 26.1 Physical Security Principles
  • 27.1 Site and Building Controls
  • 27.2 Environmental Impact
  • 28.1 Information System Lifecycle
  • 29.1 Network Models
  • 29.2 Internet Protocol (IP)
  • 29.3 Secure Protocols
  • 29.4 Multilayer and Converged Protocols
  • 29.5 Transport Architecture
  • 29.6 Segmentation
  • 29.7 Microsegmentation
  • 29.8 Wireless Architecture
  • 29.9 Wi-Fi Networks
  • 29.10 Virtual Private Cloud
  • 29.11 Continuous Monitoring
  • 30.1 Transmission Media
  • 30.2 Network Access Control
  • 30.3 Endpoint Security
  • 31.1 Voice, Video, and Collaboration (CDN)
  • 31.2 Secure Remote Access Communications
  • 32.1 Access Control Fundamentals
  • 33.1 Identity Management (IdM)
  • 33.2 Authentication and Credential Management
  • 33.3 Biometric Authentication
  • 34.1 Federated Identity Management
  • 35.1 Authorization and Access Controls
  • 36.1 Identity and Access Management (IAM)
  • 37.1 Implementing Authentication Systems
  • 37.2 Authentication and Access Control Attacks
  • 38.1 Assessment and Audit Strategies
  • 38.2 Planning Engagements
  • 39.1 Vulnerability Testing and Assessment
  • 39.2 Penetration Testing and Attack Simulations
  • 39.3 Code and Interface Testing
  • CISSP Introduction
  • CISSP Introduction (1)
  • Learning objectives
  • Learning objectives (1)
  • Learning objectives (2)
  • Learning objectives (3)
  • Learning objectives (4)
  • Learning objectives (5)
  • Learning objectives (6)
  • Learning objectives (7)
  • Learning objectives (8)
  • Learning objectives (9)
  • Learning objectives (10)
  • Learning objectives (11)
  • Learning objectives (12)
  • Learning objectives (13)
  • Learning objectives (14)
  • Learning objectives (15)
  • Learning objectives (16)
  • Learning objectives (17)
  • Learning objectives (18)
  • Learning objectives (19)
  • Learning objectives (20)
  • Learning objectives (21)
  • Learning objectives (22)
  • Learning objectives (23)
  • Learning objectives (24)
  • Learning objectives (25)
  • Learning objectives (26)
  • Learning objectives (27)
  • Learning objectives (28)
  • Learning objectives (29)
  • Learning objectives (30)
  • Learning objectives (31)
  • Learning objectives (32)
  • Learning objectives (33)
  • Learning objectives (34)
  • Learning objectives (35)
  • Learning objectives (36)
  • Learning objectives (37)
  • Learning objectives (38)
  • Lessons 1-5 Deep Dive Quiz
  • Lessons 13 - 18 Deep Dive Quiz
  • Lessons 19 - 22 Deep Dive Quiz
  • Lessons 26 - 28 Deep Dive Quiz
  • Lessons 30 - 31 Deep Dive Quiz
  • Lessons 32 - 37 Deep Dive Quiz
  • Lessons 38 - 39 Deep Dive Quiz
  • Lesson 6 - 9 Deep Dive Quiz
  • Lesson 10 - 12 Deep Dive Quiz
  • Lesson 23 Deep Dive Quiz
  • Lesson 24 - 25 Deep Dive Quiz
  • Lesson 29 Deep Dive Quiz
  • Module Introduction
  • Module Introduction (1)
  • Module Introduction (2)
  • Module Introduction (3)
  • Module Introduction (4)
  • Module Introduction (5)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42553
    حجم: 31527 مگابایت
    مدت زمان: 1217 دقیقه
    تاریخ انتشار: ۲۷ دی ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید