وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISSP – 4th Edition

سرفصل های دوره
  • 1.1 Organizational and Professional Ethics
  • 2.1 Information and Cybersecurity Principles
  • 3.1 Strategic Alignment
  • 3.2 Organizational Roles and Responsibilities
  • 3.3 Security Control Frameworks
  • 4.1 Regulatory and Compliance Obligations
  • 4.2 Intellectual Property & Transborder Data Flow
  • 4.3 Privacy Principles
  • 4.4 Cybercrime and Data Breaches
  • 5.1 Investigation Objectives and Requirements
  • 6.1 Governance Documents
  • 7.1 Business Continuity Planning
  • 7.2 Business Impact Analysis
  • 8.1 Workforce Lifecycle Security
  • 8.2 Workforce and Third-party Policies and Agreements
  • 9.1 Risk Basics
  • 9.2 Risk Assessment
  • 9.3 Risk Analysis
  • 9.4 Risk Response and Treatment
  • 9.5 Risk Mitigation Controls
  • 9.6 Risk Monitoring, Reporting, and Maturity
  • 10.1 Threat Actors and Attributes
  • 10.2 Attack Vectors - Digital Infrastructure
  • 10.3 Attack Vectors - People
  • 10.4 Attack Vectors - Code
  • 10.5 Threat Modeling and Intelligence
  • 11.1 Supply Chain Relationships and Risks
  • 11.2 Supply Chain Risk Management and Mitigation
  • 12.1 SETA Principles and Practices
  • 12.2 Emerging SETA Trends, Techniques, and Topics
  • 13.1 Asset Classification
  • 14.1 Asset Handling Requirements
  • 15.1 Asset Management
  • 16.1 Data Management
  • 16.2 Data Collection, Retention, and Archiving
  • 16.3 Data Deletion and Media Destruction
  • 17.1 Asset Retention and Retirement
  • 18.1 Control Baselines
  • 18.2 Data Protection Methods
  • 19.1 Secure Design Principles
  • 19.2 Zero Trust and Secure Access Service Edge (SASE)
  • 20.1 Information Security Models
  • 21.1 Security Evaluation Criteria
  • 22.1 Trusted Computing Base
  • 23.1 Client-based, Server-based, and Distributed Systems
  • 23.2 Database Management Systems
  • 23.3 Operational Technology (OT)
  • 23.4 Cloud-based Systems
  • 23.5 Internet of Things (IoT & IIoT) Systems
  • 23.6 Virtualization
  • 23.7 Automation and Solution Elements
  • 24.1 Cryptography Primer
  • 24.2 Encryption
  • 24.3 Hashing and Digital Signatures
  • 24.4 PKI and Digital Certificates
  • 24.5 Emerging Cryptography
  • 25.1 Cryptographic Attacks
  • 25.2 Post-Exploitation Attacks
  • 25.3 Ransomware
  • 26.1 Physical Security Principles
  • 27.1 Site and Building Controls
  • 27.2 Environmental Impact
  • 28.1 Information System Lifecycle
  • 29.1 Network Models
  • 29.2 Internet Protocol (IP)
  • 29.3 Secure Protocols
  • 29.4 Multilayer and Converged Protocols
  • 29.5 Transport Architecture
  • 29.6 Segmentation
  • 29.7 Microsegmentation
  • 29.8 Wireless Architecture
  • 29.9 Wi-Fi Networks
  • 29.10 Virtual Private Cloud
  • 29.11 Continuous Monitoring
  • 30.1 Transmission Media
  • 30.2 Network Access Control
  • 30.3 Endpoint Security
  • 31.1 Voice, Video, and Collaboration (CDN)
  • 31.2 Secure Remote Access Communications
  • 32.1 Access Control Fundamentals
  • 33.1 Identity Management (IdM)
  • 33.2 Authentication and Credential Management
  • 33.3 Biometric Authentication
  • 34.1 Federated Identity Management
  • 35.1 Authorization and Access Controls
  • 36.1 Identity and Access Management (IAM)
  • 37.1 Implementing Authentication Systems
  • 37.2 Authentication and Access Control Attacks
  • 38.1 Assessment and Audit Strategies
  • 38.2 Planning Engagements
  • 39.1 Vulnerability Testing and Assessment
  • 39.2 Penetration Testing and Attack Simulations
  • 39.3 Code and Interface Testing
  • CISSP Introduction
  • CISSP Introduction (1)
  • Learning objectives
  • Learning objectives (1)
  • Learning objectives (2)
  • Learning objectives (3)
  • Learning objectives (4)
  • Learning objectives (5)
  • Learning objectives (6)
  • Learning objectives (7)
  • Learning objectives (8)
  • Learning objectives (9)
  • Learning objectives (10)
  • Learning objectives (11)
  • Learning objectives (12)
  • Learning objectives (13)
  • Learning objectives (14)
  • Learning objectives (15)
  • Learning objectives (16)
  • Learning objectives (17)
  • Learning objectives (18)
  • Learning objectives (19)
  • Learning objectives (20)
  • Learning objectives (21)
  • Learning objectives (22)
  • Learning objectives (23)
  • Learning objectives (24)
  • Learning objectives (25)
  • Learning objectives (26)
  • Learning objectives (27)
  • Learning objectives (28)
  • Learning objectives (29)
  • Learning objectives (30)
  • Learning objectives (31)
  • Learning objectives (32)
  • Learning objectives (33)
  • Learning objectives (34)
  • Learning objectives (35)
  • Learning objectives (36)
  • Learning objectives (37)
  • Learning objectives (38)
  • Lessons 1-5 Deep Dive Quiz
  • Lessons 13 - 18 Deep Dive Quiz
  • Lessons 19 - 22 Deep Dive Quiz
  • Lessons 26 - 28 Deep Dive Quiz
  • Lessons 30 - 31 Deep Dive Quiz
  • Lessons 32 - 37 Deep Dive Quiz
  • Lessons 38 - 39 Deep Dive Quiz
  • Lesson 6 - 9 Deep Dive Quiz
  • Lesson 10 - 12 Deep Dive Quiz
  • Lesson 23 Deep Dive Quiz
  • Lesson 24 - 25 Deep Dive Quiz
  • Lesson 29 Deep Dive Quiz
  • Module Introduction
  • Module Introduction (1)
  • Module Introduction (2)
  • Module Introduction (3)
  • Module Introduction (4)
  • Module Introduction (5)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42553
    حجم: 31527 مگابایت
    مدت زمان: 1217 دقیقه
    تاریخ انتشار: ۲۷ دی ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید