وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ Certification Bootcamp

سرفصل های دوره
  • 1. CompTIA Security+ Certification Bootcamp
  • 2. Introduction
  • 3. What Is Security+
  • 4. How To Succeed
  • 5. Security Basics and CIA Triangle
  • 6. The Power of Control, Different Types of Control
  • 7. Different Types of Identity - Identification
  • 8. Account Access Control and Privilege Management
  • 9. File Access Control (Windows, Linux)
  • 10. AAA Servers
  • 11. Different Types of Authentication and Authentication Management
  • 12. Different Existing Authentication and Authorization Mechanisms
  • 13. Account Control Practices and Policies
  • 14. OSI Model
  • 15. Honeypots, Proxy Servers, Jump Servers, Load Balancers
  • 16. Routers, Switches, ACL, Loop Protection
  • 17. Firewalls
  • 18. Network Segmentation
  • 19. IDS, IPS, NAC
  • 20. DNS, DNS Security
  • 21. IP Addresses
  • 22. Dynamic Host Configuration Protocol (DHCP)
  • 23. Virtual Private Network (VPN)
  • 24. Networking Tools - Commands
  • 25. File Manipulation Tools - Commands
  • 26. Forensic Tools - Commands
  • 27. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
  • 28. Unsecure Protocols
  • 29. Secure Protocols
  • 30. Wireless Infrastructure
  • 31. Wireless Encryption and Threats
  • 32. Wireless Authentication Protocols
  • 33. Mobile Device Connection and Communication Methods
  • 34. Mobile Device Management
  • 35. Mobile Device Monitoring and Protection
  • 36. Virtualization Theory
  • 37. Virtual Box Demonstration
  • 38. Cloud Technology
  • 39. Cloud Services
  • 40. Storing Data in Cloud and Cloud Security
  • 41. Physical Security
  • 42. What is Penetration Testing
  • 43. Different Phases of a Penetration Test
  • 44. Different Teams in Cyber Security
  • 45. Vulnerabilities
  • 46. Monitoring
  • 47. Exercise Imposter Syndrome
  • 48. Different Types of Attackers
  • 49. Different Types of Malware
  • 50. Social Engineering, Phishing
  • 51. Network Attacks
  • 52. Physical Attacks
  • 53. Password Attacks
  • 54. Overflow Attacks, Pointer Dereference, Error Handling
  • 55. Application Attacks, Injection Attacks
  • 56. Zero Days and Weak Configurations
  • 57. Hijacking Attacks
  • 58. Cryptographic Attacks
  • 59. Third Party Attacks
  • 60. Host Security Boot
  • 61. Endpoint Protection Strategy
  • 62. System Hardening
  • 63. Inbuilt Devices and Specialized Devices
  • 64. Secure Application Development and Secure Coding
  • 65. Concept of Risk and Risk Types
  • 66. Risk Control and Analysis
  • 67. Business Impact Analysis
  • 68. Security Information Groups and Sources
  • 69. Facility Policies and Rules
  • 70. Laws and Standards
  • 71. Data Handling
  • 72. Incident Response and Recovery Practices
  • 73. Information Gathering for Incident Response
  • 74. Controls and Techniques for Lowering Risk
  • 75. Redundancy and Tolerance
  • 76. Symmetric and Asymmetric Encryption
  • 77. Concept of Public Key Infrastructure
  • 78. Important Cryptographic Terms and Concepts
  • 79. Thank You!
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 25435
    حجم: 28010 مگابایت
    مدت زمان: 532 دقیقه
    تاریخ انتشار: 26 آذر 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید