وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ (SY0-601) Complete Course & Exam

سرفصل های دوره

CompTIA Security+ (SY0-601) Bootcamp - Your preparation for the world's best cybersecurity certification!


1 - Overview of Security
  • 1 - Quiz Overview of Security.html
  • 1 - Welcome
  • 2 - CompTIA-Security-601-Study-Guide.pdf
  • 2 - CompTIA-Security-SY0-601-Exam-Objectives.pdf
  • 2 - Download the Study Guide.html
  • 3 - Overview of Security
  • 4 - CIA Triad
  • 5 - AAA of Security OBJ 24
  • 6 - Security Threats OBJ 11 12
  • 7 - Mitigating Threats OBJ 51
  • 8 - Hackers OBJ 15
  • 9 - Threat Actors 15
  • 10 - Threat Intelligence and Sources OBJ 15
  • 11 - Threat Hunting OBJ 17
  • 12 - Attack Frameworks OBJ 42

  • 2 - Malware
  • 2 - Quiz Malware.html
  • 13 - Malware OBJ 12
  • 14 - Viruses OBJ 12
  • 15 - Worms OBJ 12
  • 16 - Trojans OBJ 12
  • 17 - Demo Viruses and Trojans OBJ 12
  • 18 - Ransomware OBJ 12
  • 19 - Spyware OBJ 12
  • 20 - Rootkits OBJ 12 13
  • 21 - Spam OBJ 11
  • 22 - Summary of Malware

  • 3 - Malware Infections
  • 3 - Quiz Malware Infection.html
  • 23 - Malware Infections
  • 24 - Common Delivery Methods OBJ 11 15
  • 25 - Demo Phishing OBJ 11 53
  • 26 - Botnets and Zombies OBJ 12 14
  • 27 - Active Interception and Privilege Escalation OBJ 13 14
  • 28 - Demo Privilege Escalation OBJ 13 18
  • 29 - Backdoors and Logic Bombs OBJ 12
  • 30 - Symptoms of Infection OBJ 12
  • 31 - Removing Malware OBJ 42
  • 32 - Preventing Malware OBJ 16 32
  • 33 - Malware Exploitation OBJ 12 14

  • 4 - Security Applications and Devices
  • 4 - Quiz Security Applications and Devices.html
  • 34 - Security Applications and Devices
  • 35 - Software Firewalls OBJ 32
  • 36 - Demo Software Firewalls OBJ 32
  • 37 - IDS OBJ 32 33
  • 38 - Popup Blockers OBJ 11 33 44
  • 39 - Data Loss Prevention DLP OBJ 21 32 44
  • 40 - Securing the BIOS OBJ 32
  • 41 - Securing Storage Devices OBJ 21 25 33
  • 42 - Disk Encryption OBJ 21 28 32
  • 43 - Endpoint Analysis OBJ 31 33

  • 5 - Mobile Device Security
  • 5 - Quiz Mobile Device Security.html
  • 44 - Mobile Device Security OBJ 15
  • 45 - Securing Wireless Devices OBJ 34 35
  • 46 - Mobile Malware OBJ 11 35
  • 47 - SIM Cloning ID Theft OBJ 11 24 26
  • 48 - Bluetooth Attacks OBJ 14 34
  • 49 - Mobile Device Theft OBJ 35
  • 50 - Security of Apps OBJ 31 35
  • 51 - BYOD OBJ 35
  • 52 - Hardening Mobile Devices OBJ 35

  • 6 - Hardening
  • 6 - Quiz Hardening.html
  • 53 - Hardening OBJ 32
  • 54 - Unnecessary Applications OBJ 16
  • 55 - Restricting Applications OBJ 32 44
  • 56 - Demo Unnecessary Services OBJ 32 33
  • 57 - Trusted Operating System OBJ 32
  • 58 - Updates and Patches OBJ 16 32
  • 59 - Patch Management OBJ 16 32
  • 60 - Group Policies OBJ 21
  • 61 - Demo Group Policies OBJ 32
  • 62 - File Systems and Hard Drives OBJ 21 32

  • 7 - Supply Chain Management
  • 7 - Quiz Supply Chain Management.html
  • 63 - Supply Chain Assessment OBJ 12 15 16
  • 64 - Root of Trust OBJ 32
  • 65 - Trusted Firmware OBJ 32
  • 66 - Secure Processing OBJ 32

  • 8 - Virtualization
  • 8 - Quiz Virtualization.html
  • 67 - Virtualization OBJ 22
  • 68 - Hypervisors OBJ 22
  • 69 - Demo How to create a VM OBJ 22
  • 70 - Threats to VMs OBJ 22
  • 71 - Securing VMs OBJ 22
  • 72 - Demo Securing VMs

  • 9 - Application Security
  • 9 - Quiz Application Security.html
  • 73 - Application Security
  • 74 - Web Browser Security OBJ 32 33
  • 75 - Web Browser Concerns OBJ 32 33
  • 76 - Demo Web Browser Configuration OBJ 32 33
  • 77 - Securing Applications OBJ 14 32

  • 10 - Secure Software Development
  • 10 - Quiz Secure Software Development.html
  • 78 - Software Development OBJ 21 23
  • 79 - SDLC Principles OBJ 16 23 32 53
  • 80 - Testing Methods OBJ 23 32
  • 81 - Software Vulnerabilities and Exploits OBJ 12 13 16
  • 82 - Buffer Overflows OBJ 13
  • 83 - Demo Buffer Overflow Attack OBJ 13
  • 84 - XSS and XSRF OBJ 13
  • 85 - SQL Injection OBJ 13
  • 86 - Demo SQL Injection OBJ 12 13
  • 87 - XML Vulnerabilities OBJ 13
  • 88 - Race Conditions OBJ 13
  • 89 - Design Vulnerabilities OBJ 13

  • 11 - Network Design
  • 11 - Quiz Network Design.html
  • 90 - Network Security
  • 91 - The OSI Model OBJ 33 36
  • 92 - Switches OBJ 14 27
  • 93 - Routers OBJ 33
  • 94 - Network Zones OBJ 33
  • 95 - Jumpbox OBJ 35
  • 96 - Network Access Control OBJ 33 44
  • 97 - VLANs OBJ 33
  • 98 - Subnetting OBJ 36
  • 99 - Network Address Translation OBJ 33
  • 100 - Telephony OBJ 31

  • 12 - Perimeter Security
  • 12 - Quiz Perimeter Security.html
  • 101 - Perimeter Security
  • 102 - Firewalls OBJ 33 44
  • 103 - Demo SOHO Firewall OBJ 33 44
  • 104 - Proxy Servers OBJ 33 44
  • 105 - Honeypots and Honeynets OBJ 21
  • 106 - Data Loss Prevention OBJ 21 32 44
  • 107 - NIDS and NIPS OBJ 33
  • 108 - Unified Threat Management OBJ 32 33

  • 13 - Cloud Security
  • 13 - Quiz Cloud Security.html
  • 109 - Cloud Computing OBJ 15 22 35 36
  • 110 - Cloud Types OBJ 22 36
  • 111 - As a Service OBJ 22
  • 112 - Cloud Security OBJ 25 36
  • 113 - Defending Servers OBJ 17 31 and 32
  • 114 - Cloudbased Infrastructure OBJ 12 16 22 24 25 36
  • 115 - CASB OBJ 21
  • 116 - API OBJ 21
  • 117 - FAAS and Serverless OBJ 22
  • 118 - Cloud Threats OBJ 13 16 21 22

  • 14 - Automation
  • 14 - Quiz Automation.html
  • 119 - Workflow Orchestration OBJ 23
  • 120 - CICD OBJ 23
  • 121 - DevSecOps OBJ 23
  • 122 - IAC OBJ 22
  • 123 - Machine Learning OBJ 12

  • 15 - Network Attacks
  • 15 - Quiz Network Attacks.html
  • 124 - Network Attacks OBJ 14
  • 125 - Ports and Protocols OBJ 31
  • 126 - Memorization of Ports OBJ 31
  • 127 - Unnecessary Ports OBJ 16 32
  • 128 - Denial of Service OBJ 13 14
  • 129 - DDoS OBJ 12 13 14
  • 130 - Stopping a DDoS OBJ 21 23
  • 131 - Spoofing OBJ 14 33
  • 132 - Hijacking OBJ 13 14
  • 133 - Replay Attack OBJ 13
  • 134 - Demo Null Sessions OBJ 16
  • 135 - Transitive Attacks OBJ 24
  • 136 - DNS Attacks OBJ 11 14 31
  • 137 - ARP Poisoning OBJ 14

  • 16 - Securing Networks
  • 16 - Quiz Securing Networks.html
  • 138 - Securing Networks OBJ 33
  • 139 - Securing Network Devices OBJ 12 16 33 37
  • 140 - Securing Network Media OBJ 27
  • 141 - Securing WiFi Devices OBJ 14 34
  • 142 - Wireless Encryption OBJ 16 34
  • 143 - Wireless Access Points OBJ 14 34
  • 144 - Wireless Attacks OBJ 12 14 18
  • 145 - Demo Wireless Attack OBJ 14
  • 146 - WPA3 OBJ 34
  • 147 - Other Wireless Technologies OBJ 14 35

  • 17 - Physical Security
  • 17 - Quiz Physical Security.html
  • 148 - Physical Security OBJ 27
  • 149 - Surveillance OBJ 27
  • 150 - Door Locks OBJ 27
  • 151 - Demo Lock Picking OBJ 27
  • 152 - Biometric Readers OBJ 24

  • 18 - Facilities Security
  • 18 - Quiz Facilities Security.html
  • 153 - Facilities Security OBJ 27
  • 154 - Fire Suppression OBJ 27
  • 155 - HVAC OBJ 25 26 27
  • 156 - Shielding OBJ 27
  • 157 - Vehicular Vulnerabilities OBJ 26 27
  • 158 - IoT Vulnerabilities OBJ 26
  • 159 - Embedded System Vulnerabilities OBJ 26
  • 160 - ICS and SCADA Vulnerabilities OBJ 26
  • 161 - Mitigating Vulnerabilities OBJ 26
  • 162 - Premise System Vulnerabilities OBJ 12 13 17 26

  • 19 - Authentication
  • 19 - Quiz Authentication.html
  • 163 - Authentication OBJ 24 35 38
  • 164 - Authentication Models OBJ 24 35 38 39
  • 165 - 8021x OBJ 34 38
  • 166 - LDAP and Kerberos OBJ 31 38
  • 167 - Remote Desktop Services OBJ 31
  • 168 - Remote Access Service OBJ 31 38
  • 169 - VPN OBJ 33
  • 170 - RADIUS vs TACACS OBJ 38
  • 171 - Authentication Summary OBJ 38
  • 172 - Authentication Attacks OBJ 12

  • 20 - Access Control
  • 20 - Quiz Access Control.html
  • 173 - Access Control OBJ 38
  • 174 - Access Control Models OBJ 38
  • 175 - Best Practices OBJ 27 38 53
  • 176 - Users and Groups OBJ 37 38
  • 177 - Permissions OBJ 38
  • 178 - Usernames and Passwords OBJ 16 37
  • 179 - Demo Policies OBJ 37
  • 180 - User Account Control OBJ 37 38

  • 21 - Risk Assessments
  • 21 - Quiz Risk Assessments.html
  • 181 - Risk Assessments OBJ 54
  • 182 - Qualitative Risk OBJ 54
  • 183 - Quantitative Risk OBJ 54
  • 184 - Methodologies OBJ 17 54
  • 185 - Security Controls OBJ 51
  • 186 - Types of Risk OBJ 16 54

  • 22 - Vulnerability Management
  • 22 - Quiz Vulnerability Management.html
  • 187 - Vulnerability Management OBJ 17 41 54
  • 188 - Penetration Testing OBJ 18
  • 189 - Training and Exercises OBJ 18 42
  • 190 - OVAL OBJ 17
  • 191 - Vulnerability Assessments OBJ 17 41
  • 192 - Demo Nmap Scanning OBJ 41
  • 193 - Demo Vulnerability Scanning OBJ 17 41 43
  • 194 - Password Analysis OBJ 12
  • 195 - Demo Password Cracking OBJ 41

  • 23 - Monitoring and Auditing
  • 23 - Quiz Monitoring and Auditing.html
  • 196 - Monitoring Types OBJ 33
  • 197 - Performance Baselining OBJ 21
  • 198 - Protocol Analyzers OBJ 33 41
  • 199 - SNMP OBJ 31
  • 200 - Demo Analytical Tools OBJ 41
  • 201 - Auditing OBJ 17
  • 202 - Demo Auditing Files OBJ 17
  • 203 - Logging OBJ 17 43 45
  • 204 - Log Files OBJ 43
  • 205 - SIEM OBJ 17 43
  • 206 - Syslog OBJ 17 43
  • 207 - SOAR OBJ 17 44

  • 24 - Cryptography
  • 24 - Quiz Cryptography.html
  • 208 - Cryptography OBJ 21 28
  • 209 - Symmetric vs Asymmetric OBJ 28
  • 210 - Symmetric Algorithms OBJ 28
  • 211 - Public Key Cryptography OBJ 28
  • 212 - Asymmetric Algorithms OBJ 28
  • 213 - Pretty Good Privacy OBJ 28
  • 214 - Key Management OBJ 28
  • 215 - OneTime Pad OBJ 28
  • 216 - Demo Steganography OBJ 28
  • 217 - Cryptography Considerations OBJ 28

  • 25 - Hashing
  • 25 - Quiz Hashing.html
  • 218 - Hashing OBJ 12 28 32
  • 219 - Demo Hashing OBJ 28
  • 220 - Hashing Attacks OBJ 1213 28
  • 221 - Increasing Hash Security OBJ 28 37

  • 26 - Public Key Infrastructure
  • 26 - Quiz Public Key Infrastructure.html
  • 222 - Public Key Infrastructure OBJ 31 33 39
  • 223 - Digital Certificates OBJ 39
  • 224 - Demo Certificates OBJ 28 39
  • 225 - Certificate Authorities OBJ 32 39
  • 226 - Web of Trust OBJ 39

  • 27 - Security Protocols
  • 27 - Quiz Security Protocols.html
  • 227 - Security Protocols OBJ 31
  • 228 - SMIME OBJ 31
  • 229 - SSL and TLS OBJ 12 21 31 33
  • 230 - SSH OBJ 31 41
  • 231 - VPN Protocols OBJ 31 33
  • 232 - Demo Setting up a VPN OBJ 33

  • 28 - Planning for the Worst
  • 28 - Quiz Planning for the Worst.html
  • 233 - Planning for the Worst OBJ 25 54
  • 234 - Redundant Power OBJ 25
  • 235 - Backup Power OBJ 25
  • 236 - Data Redundancy OBJ 25
  • 237 - Demo RAIDs OBJ 25
  • 238 - Network Redundancy OBJ 25
  • 239 - Server Redundancy OBJ 25 33
  • 240 - Redundant Sites OBJ 21
  • 241 - Data Backup OBJ 25
  • 242 - Tape Rotation OBJ 25
  • 243 - Disaster Recovery Plan OBJ 21 25 42 54
  • 244 - Business Impact Analysis OBJ 54

  • 29 - Social Engineering
  • 29 - Quiz Social Engineering.html
  • 245 - Social Engineering OBJ 11
  • 246 - Demo Pretexting OBJ 11 53
  • 247 - Insider Threat OBJ 15
  • 248 - Phishing OBJ 11 53
  • 249 - Motivation Factors OBJ 11
  • 250 - More Social Engineering OBJ 11 12
  • 251 - Fraud and Scams OBJ 11
  • 252 - Influence Campaigns OBJ 11
  • 253 - User Education OBJ 53

  • 30 - Policies and Procedures
  • 30 - Quiz Policies and Procedures.html
  • 254 - Policies and Procedures OBJ 52 53
  • 255 - Data Classifications OBJ 53 55
  • 256 - Data Ownership
  • 257 - PII and PHI OBJ 52 55
  • 258 - Legal Requirements OBJ 52 55
  • 259 - Privacy Technologies OBJ 55
  • 260 - Security Policies OBJ 53 55
  • 261 - User Education OBJ 53
  • 262 - Vendor Relationships OBJ 53
  • 263 - Disposal Policies OBJ 27 41
  • 264 - IT Security Frameworks OBJ 52
  • 265 - Key Frameworks OBJ 52

  • 31 - Incident Response and Forensics
  • 31 - Quiz Incident Response and Forensics.html
  • 266 - Incident Response Procedures OBJ 42
  • 267 - Incident Response Planning OBJ 42
  • 268 - Investigative Data OBJ 43
  • 269 - Forensic Procedures OBJ 45
  • 270 - Data Collection Procedures OBJ 41 45
  • 271 - Demo Disk Imaging OBJ 41
  • 272 - Security Tools OBJ 41

  • 32 - Conclusion
  • 273 - Conclusion
  • 274 - BONUS Whats Next
  • 274 - Connect with Jason at Dion Training.txt
  • 274 - Join our official Facebook group.txt

  • 33 - Practice Exam
    53,700 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 27565
    حجم: 16023 مگابایت
    مدت زمان: 1284 دقیقه
    تاریخ انتشار: 27 آذر 1402

    53,700 تومان
    افزودن به سبد خرید