وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ SY0-601 Lab Course with Simulations/PBQ

سرفصل های دوره

Pass your Security+ SY0-601 exam on the first try with a lab base approach to learning. Tons of labs.


1 - Exam Info
  • 1 - About Me
  • 2 - Exam Information
  • 3 - My Experience Taking the Exam
  • 4 - Building a lab
  • 5 - Join me for a Live Q and A Session
  • 6 - MUST WATCH Exam Objectives and layout of this course
  • 6 - comptia-security-sy0-501-exam-objectives.pdf
  • 6 - comptia-security-sy0-601-exam-objectives-1-0.pdf

  • 2 - Security Basics
  • 7 - CIA Triade
  • 8 - IAAA
  • 9 - Basic security controls

  • 3 - 11 Social engineering techniques
  • 10 - Phishing Smishing Vishing Spear phishing Whaling
  • 11 - Dumpster diving and Shoulder surfing
  • 12 - Eliciting information and the principles of social engineering
  • 13 - Pharming
  • 14 - Spam
  • 15 - Tailgating
  • 16 - Other types Social Engineer techniques

  • 4 - 12 Potential indicators of attacks
  • 17 - Introduction to Malware
  • 18 - Ransomeware and Cryptomalware
  • 19 - Trojans and RATs
  • 20 - Bot and Command and control
  • 21 - Fileless Virus Logic bombs spyware rootkit backdoor
  • 22 - Adversarial artificial intelligence AI
  • 23 - Malicious USB cables drives and Card Cloning
  • 24 - Supply chain attacks
  • 25 - Keyloggers
  • 26 - How passwords are stored
  • 27 - Using hashcat to crack passwords
  • 28 - Using a brute force and rainbow tables to attack passwords

  • 5 - 13 Analyze potential indicators associated with application attacks
  • 29 - Privilege escalation SSL stripping Pass the hash
  • 30 - Crosssite scripting XSS and Injections
  • 31 - Pointer Dereference directory traversal buffer overflows and tocttou
  • 32 - Replay attacks
  • 33 - Request forgeries
  • 34 - API Attacks
  • 35 - Driver manipulation
  • 36 - Integer overflow Resource exhaustion Memory leak

  • 6 - 14 Analyze potential indicators associated with network attacks
  • 37 - Evil Twin and Rouge Access Point
  • 38 - Bluesnarfing and Bluejacking
  • 39 - Cracking WEP
  • 40 - Disassociation and Jamming
  • 41 - Man in the Middle browser and APR Poisoning
  • 42 - IV RFID NFC Attacks
  • 43 - MAC Flooding and Cloning
  • 44 - DDOS Attacks
  • 45 - Malicious Code

  • 7 - 15 Different threat actors vectors and intelligence sources
  • 46 - Actors and threats
  • 47 - Threat intelligence sources
  • 48 - Research sources

  • 8 - 16 Security concerns associated with various types of vulnerabilities
  • 49 - Cloudbased vs onpremises Zero Day
  • 50 - Weak configurations
  • 51 - Thirdparty risks Improper or weak patch legacy platforms
  • 52 - Impacts

  • 9 - 17 Techniques used in security assessments
  • 53 - Threat hunting
  • 54 - Vulnerability scans
  • 55 - SIEM and SOAR

  • 10 - 18 Techniques used in penetration testing
  • 56 - Penetration testing
  • 57 - Passive and active reconnaissance
  • 58 - Exercise types

  • 11 - Domain 1 Quiz

    12 - 21 Security concepts in an enterprise environment
  • 59 - Configuration management
  • 60 - Data Sovereignty and Protection
  • 61 - Other Security Consideration
  • 62 - Site Resiliency Hot Warm Cold
  • 63 - Deception and disruption

  • 13 - 22 Virtualization and cloud computing concepts
  • 64 - IaaS
  • 65 - PaaS
  • 66 - SaaS XaaS
  • 67 - Cloud Deployment
  • 68 - Cloud Application terms
  • 69 - IaC
  • 70 - Virtualization Issues

  • 14 - 23 Secure application development deployment and automation concepts
  • 71 - Software Development Environment
  • 72 - Secure Coding Techniques
  • 73 - DevOps and Automation

  • 15 - 24 Authentication and authorization design concepts
  • 74 - Authentication methods
  • 75 - Biometrics
  • 76 - MFA
  • 77 - Authentication authorization and accounting

  • 16 - 25 Implement cybersecurity resilience
  • 78 - Redundancy
  • 79 - Replication and storages
  • 80 - Backup Types
  • 81 - Nonpersistence high availability diversity
  • 82 - RAID

  • 17 - 26 Security implications of embedded and specialized systems
  • 83 - Embedded Systems
  • 84 - Industrial control system
  • 85 - IoT
  • 86 - IoT Communication and considerations

  • 18 - 27 Physical security controls
  • 87 - Physical Security Controls
  • 88 - Other physical security controls
  • 89 - Locks and Fencings
  • 90 - Fire Suppression
  • 91 - Secure data destruction

  • 19 - 29 Basics of cryptographic concepts
  • 92 - Introduction to cryptography
  • 93 - Goals of cryptography
  • 94 - Algorithm and Keys
  • 95 - Block and stream ciphers
  • 96 - Symmetric Ciphers
  • 97 - Asymmetric Ciphers
  • 98 - Hashing
  • 99 - Hybrid cryptography
  • 100 - Digital signatures
  • 101 - Block Chain
  • 102 - Steganography
  • 103 - Key stretching
  • 104 - Salting
  • 105 - Quantum
  • 106 - Ephemeral PFS Homomorphic
  • 107 - Cipher Modes
  • 108 - Lightweight cryptography
  • 109 - Ellipticcurve cryptography
  • 110 - Cipher suites
  • 111 - Common use cases
  • 112 - Limitations of encryptions

  • 20 - Domain 2 Quiz

    21 - 31 Implement secure protocols
  • 113 - DNSSEC
  • 114 - Email security with SMIME and PMP
  • 115 - Installing Wireshark on Windows 10
  • 116 - Install and setup an FTP Server and Client
  • 117 - Using Wireshark to capture an FTP Password and securing FTP Server
  • 118 - Lightweight Directory Access Protocol Over SSL
  • 119 - SRPT FTPS SFTP SNMP IMAP
  • 120 - SSH
  • 121 - VPN and IPSEC
  • 122 - Use Cases for secure protocols

  • 22 - 32 Implement host or application security solutions
  • 123 - Endpoint Protection
  • 124 - Boot integrity
  • 125 - Databases
  • 126 - Application Security
  • 127 - Hardening systems
  • 128 - Drive Encryption and sandboxing

  • 23 - 33 Implement secure network designs
  • 129 - Load Balancing
  • 130 - Network segmentation
  • 131 - How to download and install packet tracer
  • 132 - VLANs and Port Security
  • 133 - Firewalls
  • 134 - Configuring firewall rules
  • 135 - Jump and Proxy servers
  • 136 - IDS and IPS
  • 137 - Other network secure concepts

  • 24 - 34 Install and configure wireless security settings
  • 138 - Wireless Security
  • 139 - Wireless Installation Considerations

  • 25 - 35 Implement secure mobile solutions Given
  • 140 - Mobile Connection methods and receivers
  • 141 - Mobile device management MDM
  • 142 - UEM and MAM
  • 143 - Enforcement and monitoring of mobile devices
  • 144 - Mobile Deployment Models

  • 26 - 36 Apply cybersecurity solutions to the cloud
  • 145 - Cloud Solutions controls
  • 146 - Cloud Network and computing
  • 147 - Cloud Security terms

  • 27 - 37 Implement identity and account management controls
  • 148 - Identity and account types
  • 149 - Account policies

  • 28 - 38 Implement authentication and authorization solutions
  • 150 - Authentication management
  • 151 - Authentication Protocols
  • 152 - Access control schemes

  • 29 - 39 Implement public key infrastructure
  • 153 - Introduction to PKI
  • 154 - Process of getting a certificate
  • 155 - PKI Setup
  • 156 - Fields on a certificate
  • 157 - Certificate formats
  • 158 - Certificate types

  • 30 - Domain 3 Quiz

    31 - 41 Tool to assess organizational security
  • 159 - Introductions to commands
  • 160 - ARP and Route
  • 161 - hping
  • 162 - Curl
  • 163 - IP scanner
  • 164 - ipconfig ping tracert
  • 165 - Linux file manipulation head tail cat
  • 166 - Log
  • 167 - Cuckoo
  • 168 - thehavester
  • 169 - Nslookup and Dig
  • 170 - tcpdump
  • 171 - NetCat
  • 172 - Sniper
  • 173 - scanless
  • 174 - nmap
  • 175 - Managing Linux Permissions
  • 176 - Shell and script environments
  • 177 - Exploitation frameworks
  • 178 - Forensics tools

  • 32 - 42 Policies processes and procedures for incident response
  • 179 - Incident response process
  • 180 - Attack Frameworks
  • 181 - Incidents plans and exercises

  • 33 - 43 support an investigation
  • 182 - Log Files
  • 183 - Capture log files

  • 34 - 44 Apply mitigation techniques or controls to secure an environment
  • 184 - Incident mitigation techniques

  • 35 - 45 Key aspects of digital forensics
  • 185 - Documentation and evidence
  • 186 - Integrity of evidence
  • 187 - Order of volatility

  • 36 - Domain 4 Quiz

    37 - 51 Various types of controls
  • 188 - Control Types and category

  • 38 - 52 Regulations standards or frameworks that impact security
  • 189 - Regulations standards and legislation
  • 190 - Key frameworks
  • 191 - Secure configuration guides

  • 39 - 53 Policies to organizational security
  • 192 - Personnel Controls
  • 193 - Thirdparty risk management
  • 194 - Credential and organizations policies

  • 40 - 54 Risk management processes and concepts
  • 195 - Risk types terms and Process
  • 196 - Risk management strategies
  • 197 - Risk Assessments
  • 198 - Business impact analysis

  • 41 - 55 Privacy and sensitive data concepts in relation to security
  • 199 - Privacy breaches
  • 200 - Data types
  • 201 - Privacy technologies and roles

  • 42 - Domain 5 Quiz

    43 - Performance Based Questions
  • 202 - Performance Based Questions Introduction
  • 203 - PBQ Attack Types and Response
  • 204 - PBQ Incident Response
  • 205 - PBQ Social Engineering
  • 206 - PBQ Firewalls

  • 44 - Mock Exam

    45 - Ending
  • 207 - The End
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 13372
    حجم: 30596 مگابایت
    مدت زمان: 1463 دقیقه
    تاریخ انتشار: ۲۰ خرداد ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید