وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

CompTIA Security+ Certification Bootcamp

سرفصل های دوره
  • 1. CompTIA Security+ Certification Bootcamp
  • 2. Introduction
  • 3. What Is Security+
  • 4. How To Succeed
  • 5. Security Basics and CIA Triangle
  • 6. The Power of Control, Different Types of Control
  • 7. Different Types of Identity - Identification
  • 8. Account Access Control and Privilege Management
  • 9. File Access Control (Windows, Linux)
  • 10. AAA Servers
  • 11. Different Types of Authentication and Authentication Management
  • 12. Different Existing Authentication and Authorization Mechanisms
  • 13. Account Control Practices and Policies
  • 14. OSI Model
  • 15. Honeypots, Proxy Servers, Jump Servers, Load Balancers
  • 16. Routers, Switches, ACL, Loop Protection
  • 17. Firewalls
  • 18. Network Segmentation
  • 19. IDS, IPS, NAC
  • 20. DNS, DNS Security
  • 21. IP Addresses
  • 22. Dynamic Host Configuration Protocol (DHCP)
  • 23. Virtual Private Network (VPN)
  • 24. Networking Tools - Commands
  • 25. File Manipulation Tools - Commands
  • 26. Forensic Tools - Commands
  • 27. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
  • 28. Unsecure Protocols
  • 29. Secure Protocols
  • 30. Wireless Infrastructure
  • 31. Wireless Encryption and Threats
  • 32. Wireless Authentication Protocols
  • 33. Mobile Device Connection and Communication Methods
  • 34. Mobile Device Management
  • 35. Mobile Device Monitoring and Protection
  • 36. Virtualization Theory
  • 37. Virtual Box Demonstration
  • 38. Cloud Technology
  • 39. Cloud Services
  • 40. Storing Data in Cloud and Cloud Security
  • 41. Physical Security
  • 42. What is Penetration Testing
  • 43. Different Phases of a Penetration Test
  • 44. Different Teams in Cyber Security
  • 45. Vulnerabilities
  • 46. Monitoring
  • 47. Exercise Imposter Syndrome
  • 48. Different Types of Attackers
  • 49. Different Types of Malware
  • 50. Social Engineering, Phishing
  • 51. Network Attacks
  • 52. Physical Attacks
  • 53. Password Attacks
  • 54. Overflow Attacks, Pointer Dereference, Error Handling
  • 55. Application Attacks, Injection Attacks
  • 56. Zero Days and Weak Configurations
  • 57. Hijacking Attacks
  • 58. Cryptographic Attacks
  • 59. Third Party Attacks
  • 60. Host Security Boot
  • 61. Endpoint Protection Strategy
  • 62. System Hardening
  • 63. Inbuilt Devices and Specialized Devices
  • 64. Secure Application Development and Secure Coding
  • 65. Concept of Risk and Risk Types
  • 66. Risk Control and Analysis
  • 67. Business Impact Analysis
  • 68. Security Information Groups and Sources
  • 69. Facility Policies and Rules
  • 70. Laws and Standards
  • 71. Data Handling
  • 72. Incident Response and Recovery Practices
  • 73. Information Gathering for Incident Response
  • 74. Controls and Techniques for Lowering Risk
  • 75. Redundancy and Tolerance
  • 76. Symmetric and Asymmetric Encryption
  • 77. Concept of Public Key Infrastructure
  • 78. Important Cryptographic Terms and Concepts
  • 79. Thank You!
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 25435
    حجم: 28010 مگابایت
    مدت زمان: 532 دقیقه
    تاریخ انتشار: ۲۶ آذر ۱۴۰۲
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید