وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security Plus (SY0-701) Course | CompTIA Security+

سرفصل های دوره

Security+ | Master Cybersecurity Skills, pass CompTIA Security Plus SY0-701 exam and level up your cyber security career


1. Introduction to CompTIA Security Plus (SY0-701) Course CompTIA Security+
  • 1. Introduction to security+

  • 2. Basic Security Concepts
  • 1. What is Security
  • 2. Privacy-Integrity-Availability
  • 3. Encryption and Access Control
  • 4. 3 A Rule (Authentication, Authorization and Accounting)
  • 5. Threat
  • 6. What is a Hacker
  • 7. What is Attack What are the Stages
  • 8. Quiz.html

  • 3. Identity Management
  • 1. What is Identity Management
  • 2. KERBEROS & NTLM&LDAP
  • 3. Single Sign-On
  • 4. Smart Cards
  • 5. Tokens or Key Fobs
  • 6. Biometric Methods
  • 7. Dual-Factor and Multifactor Authentication
  • 8. RADIUS
  • 9. Quiz.html

  • 4. Cloud Vendors Relationships
  • 1. Finding and Evaluating Cloud Vendors
  • 2. Job Notification
  • 3. Conducting Evaluations
  • 4. Negotiating Contracts and Billing
  • 5. Professional Services
  • 6. Chargebacks
  • 7. Laws, Regulations And Safety Standards

  • 5. Advising
  • 1. Key Stakeholders
  • 2. Using Baselines
  • 3. Conducting Feasibility Study
  • 4. Making GAP Analysis
  • 5. Using Reporting
  • 6. Understanding Benchmarks

  • 6. Users in CompTIA
  • 1. Create a User in comptia
  • 2. Managing Accounts - 1
  • 3. Managing Accounts - 2
  • 4. Passwords
  • 5. Password Policy
  • 6. Quiz.html

  • 7. Comparing Access Control Models
  • 1. Role-Based Access Control
  • 2. Establishing Access with Group-Based Privileges
  • 3. Rule Based and Discretionary Access Control
  • 4. Mandatory Access Control
  • 5. Establishing Access
  • 6. Quiz.html

  • 8. Virtualization
  • 1. What is Virtualization
  • 2. Virtualization Technologies
  • 3. Security Issues of Virtualization
  • 4. Quiz.html

  • 9. Network Technologies
  • 1. Basic Network Concepts
  • 2. Domain Name Services(DNS)
  • 3. What is the port How does it work
  • 4. What is the Network Address
  • 5. Switches
  • 6. Bridge
  • 7. Routers
  • 8. Understanding NAT and PAT
  • 9. Network Separation
  • 10. Proxy Servers
  • 11. Quiz.html

  • 10. Wireless Networks
  • 1. Reviewing Basic Wireless Network Information
  • 2. Wireless Cryptographic Protocols
  • 3. Authentication Protocols for Wireless Networks
  • 4. Quiz.html

  • 11. Network Security Technologies
  • 1. Firewalls
  • 2. Network Access Control
  • 3. Implementing a Secure Network
  • 4. Quiz.html

  • 12. Intrusion Detection Systems
  • 1. Understanding IDSs and IPSs
  • 2. Detection Methods
  • 3. Honeypots
  • 4. Quiz.html

  • 13. Virtual Private Network (VPN) Technologies
  • 1. Using VPNs for Remote Access
  • 2. VPN Tunnel Protocols
  • 3. Site-to-Site VPNs
  • 4. Quiz.html

  • 14. Security Threats
  • 1. Understanding Threat Actors
  • 2. Viruses
  • 3. Logic Bombs
  • 4. Trojans
  • 5. Ransomware
  • 6. Spyware
  • 7. Bots and Botnets
  • 8. Unified Threat Management(UTM)
  • 9. Quiz.html

  • 15. Securing Wireless Networks
  • 1. Disable SSID Broadcasting or Not
  • 2. Enable MAC Filtering
  • 3. Quiz.html

  • 16. Understanding Wireless Attacks
  • 1. Disassociation Attacks
  • 2. WPS and WPS Attacks
  • 3. Rogue AP
  • 4. Evil Twin
  • 5. Jamming Attacks
  • 6. Bluetooth Attacks
  • 7. RFID Attacks
  • 8. Wireless Replay Attacks
  • 9. Quiz.html

  • 17. Network Attacks
  • 1. Network Attacks
  • 2. SYN Flood Attack
  • 3. MAC Flood Attacks
  • 4. Man-in-the-Middle Attacks
  • 5. ARP Poisoning Attacks
  • 6. DNS Attacks
  • 7. Quiz.html

  • 18. Password Attacks
  • 1. Brute Force Attacks
  • 2. Password Hashes
  • 3. Birthday Attacks
  • 4. Replay Attacks
  • 5. Hijacking and Related Attacks
  • 6. Driver Manipulation
  • 7. Quiz.html

  • 19. Zero-Day Attacks
  • 1. Zero-Day Attacks
  • 2. Quiz.html

  • 20. Code Attacks
  • 1. Code Reuse and SDKs
  • 2. Code Quality and Testing
  • 3. Development Life-Cycle Models
  • 4. Secure DevOps
  • 5. Version Control and Change Management
  • 6. Quiz.html

  • 21. Web Server Attacks
  • 1. Web Servers
  • 2. SQL Injection Attacks
  • 3. Protecting Against SQL Injection Attacks
  • 4. DLL Injection
  • 5. Cross-Site Scripting
  • 6. Quiz.html

  • 22. Social Engineering Attacks
  • 1. Social Engineering
  • 2. Shoulder Surfing
  • 3. Tricking Users with Hoaxes
  • 4. Tailgating and Mantraps
  • 5. Dumpster Diving
  • 6. Watering Hole Attacks
  • 7. Spam
  • 8. Phishing
  • 9. Whaling
  • 10. Vishing
  • 11. Quiz.html

  • 23. Memory Buffer Vulnerabilities
  • 1. Buffer Overflow Attacks
  • 2. Pointer Dereference
  • 3. Compiled Versus Runtime Code
  • 4. Proper Input Validation
  • 5. Side Input Validation
  • 6. Avoiding Race Conditions
  • 7. Proper Error Handling
  • 8. Cryptographic Techniques
  • 9. Quiz.html

  • 24. Preventing Attacks
  • 1. Protecting Systems from Malware
  • 2. Antivirus and Anti-Malware Software
  • 3. Advanced Malware Tools
  • 4. Educating Users
  • 5. Quiz.html

  • 25. Server Security
  • 1. Implementing Secure Systems
  • 2. Operating systems
  • 3. Secure Operating System Configurations
  • 4. Resiliency and Automation Strategies
  • 5. Change Management Policy
  • 6. Secure Staging and Deployment
  • 7. Peripherals
  • 8. EMI and EMP
  • 9. Hardware Security Module
  • 10. Cloud Deployment Models
  • 11. Cloud Services
  • 12. Security Responsibilities with Cloud Models
  • 13. Advanced Cloud Services
  • 14. Quiz.html

  • 26. Mobile Devices
  • 1. Deploying Mobile Devices Securely
  • 2. Deployment Models
  • 3. Mobile Device Management
  • 4. Hardware Control
  • 5. Unauthorized Connections
  • 6. Quiz.html

  • 27. Data Security
  • 1. Protecting Data
  • 2. Data Loss Prevention
  • 3. Quiz.html

  • 28. Database Security
  • 1. Database Concepts
  • 2. Normalization
  • 3. SQL Queries
  • 4. Database Security
  • 5. Quiz.html

  • 29. Risk Management
  • 1. Understanding Risk Management
  • 2. Risk Management
  • 3. Threats and Threat Assessments
  • 4. Vulnerabilities
  • 5. Risk Assessment
  • 6. Risk Registers
  • 7. Quiz.html

  • 30. Checking for Vulnerabilities
  • 1. Checking for Vulnerabilities
  • 2. Password Crackers
  • 3. Network Scanners
  • 4. Wireless Scanners Cracker
  • 5. Banner Grabbing
  • 6. Vulnerability Scanning
  • 7. Quiz.html

  • 31. Penetration Tests
  • 1. Penetration Tests
  • 2. Passive & Active Reconnaissance
  • 3. Initial Exploitation
  • 4. White, Gray and Black Box Testing
  • 5. Intrusive and Non-Intrusive Testing
  • 6. Passive Versus Active Tools
  • 7. Quiz.html

  • 32. Physical Security Precautions
  • 1. Comparing Physical Security Controls
  • 2. Comparing Door Lock Types
  • 3. Preventing Tailgating with Mantraps
  • 4. Increasing Physical Security with Guards
  • 5. Using Hardware Locks
  • 6. Asset Management
  • 7. Implementing Environmental Controls
  • 8. Quiz.html

  • 33. Single Point of Failure
  • 1. Single Point of Failure
  • 2. Disk Redundancies
  • 3. Server Redundancy and High Availability
  • 4. Backup
  • 5. Quiz.html

  • 34. Business Continuity Plans
  • 1. Comparing Business Continuity Elements
  • 2. Impact
  • 3. Recovery Time Objective
  • 4. Recovery Sites
  • 5. Disaster Recovery
  • 6. Quiz.html

  • 35. Examination of Logs
  • 1. Monitoring Logs for Event Anomalies
  • 2. Other Logs-SIEM
  • 3. Continuous Monitoring
  • 4. Quiz.html

  • 36. Controls
  • 1. Understanding Control Types
  • 2. Control Goals
  • 3. Quiz.html
  • 4. Quiz.html

  • 37. Cryptography and PKI
  • 1. Introducing Cryptography Concepts
  • 2. Hashing
  • 3. MD5
  • 4. SHA
  • 5. HMAC
  • 6. Hashing Files
  • 7. Digital Signatures, Certificates and non-repudiation
  • 8. Block Versus Stream Ciphers
  • 9. Symmetric Encryption
  • 10. Symmetric Encryption Methods
  • 11. Asymmetric Encryption
  • 12. Certificates
  • 13. Steganography And Obfuscation
  • 14. Using Cryptographic Protocols
  • 15. Cipher Suites
  • 16. Exploring PKI Components
  • 17. Comparing Certificate Types
  • 18. Quiz.html

  • 38. Secure Web Page
  • 1. HTTPS Transport Encryption
  • 2. Quiz.html

  • 39. Risk Mitigation Methods
  • 1. Exploring Security Policies
  • 2. Personnel Management Policies
  • 3. Background Check
  • 4. NDA
  • 5. Policy Violations and Adverse Actions
  • 6. Agreement Types
  • 7. PII and PHI
  • 8. Responding to Incidents
  • 9. Providing Training
  • 10. Troubleshooting Personnel Issues
  • 11. Incident Response-Education
  • 12. Quiz.html

  • 40. CompTIA Security+ (SY0-701) Practice Test
  • 1. CompTIA Security+ (SY0-701) Practice Test.html

  • 41. Extra
  • 1. CompTIA Security Plus (SY0-701) Course CompTIA Security+.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38293
    حجم: 6177 مگابایت
    مدت زمان: 1030 دقیقه
    تاریخ انتشار: ۱۹ تیر ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید