وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

CompTIA Security+ SY0-701

سرفصل های دوره

Introduction
  • 001. CompTIA Security+ SY0-701 Introduction

  • Lesson 1 Compare and Contrast Various Types of Security Controls
  • 001. Learning objectives
  • 002. 1.1 Control Objectives
  • 003. 1.2 Control Categories and Classifications
  • 004. 1.3 Deep Dive Quiz

  • Lesson 2 Summarize Fundamental Security Concepts
  • 001. Learning objectives
  • 002. 2.1 Security and Privacy Principles
  • 003. 2.2 Zero Trust
  • 004. 2.3 Physical Security
  • 005. 2.4 Environmental Impact
  • 006. 2.5 Deception and Disruption
  • 007. 2.6 Deep Dive Quiz

  • Lesson 3 Explain the Importance of Change Management Processes and the Impact to Security
  • 001. Learning objectives
  • 002. 3.1 Configuration Management
  • 003. 3.2 Change Management
  • 004. 3.3 Deep Dive Quiz

  • Lesson 4 Explain the Importance of Using Appropriate Cryptographic Solutions
  • 001. Learning objectives
  • 002. 4.1 Cryptography Primer
  • 003. 4.2 Encryption
  • 004. 4.3 Hashing and Digital Signatures
  • 005. 4.4 Digital Certificates
  • 006. 4.5 Emerging Cryptography
  • 007. 4.6 Steganography
  • 008. 4.7 Deep Dive Quiz

  • Lesson 5 Compare and Contrast Common Threat Actors and Motivations
  • 001. Learning objectives
  • 002. 5.1 Threat Actors and Attributes
  • 003. 5.2 Threat Modeling and Intelligence
  • 004. 5.3 Deep Dive Quiz

  • Lesson 6 Explain Common Threat Vectors and Attack Surfaces
  • 001. Learning objectives
  • 002. 6.1 Operational Threat Vectors
  • 003. 6.2 Third-Party and Supply Chain Threat Vectors
  • 004. 6.3 Social Engineering
  • 005. 6.4 Deep Dive Quiz

  • Lesson 7 Explain Various Types of Vulnerabilities
  • 001. Learning objectives
  • 002. 7.1 Vulnerability Primer
  • 003. 7.2 Network, OS, and Cloud Vulnerabilities
  • 004. 7.3 Deep Dive Quiz

  • Lesson 8 Given a Scenario, Anaylze Indicators of Malicious Activity
  • 001. Learning objectives
  • 002. 8.1 Indicators of Malicious Activity
  • 003. 8.2 Malware Attacks
  • 004. 8.3 Brute Force Attacks
  • 005. 8.4 Digital Infrastructure Attacks
  • 006. 8.5 Application Attacks
  • 007. 8.6 Wireless Attacks
  • 008. 8.7 Cryptographic Attacks
  • 009. 8.8 Deep Dive Quiz

  • Lesson 9 Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise
  • 001. Learning objectives
  • 002. 9.1 Secure Design Principles
  • 003. 9.2 Segmentation
  • 004. 9.3 Deep Dive Quiz

  • Lesson 10 Compare and Contrast Security Implications of Different Architecture Models
  • 001. Learning objectives
  • 002. 10.1 Computing Architecture Models
  • 003. 10.2 Cloud Services
  • 004. 10.3 Cloud Infrastructure
  • 005. 10.4 Data Center Solution Elements
  • 006. 10.5 Virtualization
  • 007. 10.6 Embedded Systems
  • 008. 10.7 Internet of Things (IoT)
  • 009. 10.8 Deep Dive Quiz

  • Lesson 11 Given a Scenario, Apply Security Principles to Secure the Enterprise
  • 001. Learning objectives
  • 002. 11.1 Network Devices
  • 003. 11.2 Network Access Control
  • 004. 11.3 Firewalls
  • 005. 11.4 Secure Communications
  • 006. 11.5 Deep Dive Quiz

  • Lesson 12 Compare and Contrast Concepts and Strategies to Protect Data
  • 001. Learning objectives
  • 002. 12.1 Data Types
  • 003. 12.2 Data Classification
  • 004. 12.3 Data Protection
  • 005. 12.4 Deep Dive Quiz

  • Lesson 13 Explain the Importance of Resilience and Recovery in Security Architecture
  • 001. Learning objectives
  • 002. 13.1 Backup and Recovery
  • 003. 13.2 Resiliency Concepts
  • 004. 13.3 Continuity of Operations
  • 005. 13.4 Deep Dive Quiz

  • Lesson 14 Given a Scenario, Apply Common Security Techniques to Computing Resources
  • 001. Learning objectives
  • 002. 14.1 Secure Baselines and Hardening Targets
  • 003. 14.2 Wireless Configuration
  • 004. 14.3 Wireless Design
  • 005. 14.4 Mobile Connectivity
  • 006. 14.5 Mobile Device Management
  • 007. 14.6 Application Security
  • 008. 14.7 Secure Coding
  • 009. 14.8 Deep Dive Quiz

  • Lesson 15 Explain the Security Implications of Proper Hardware, Software, and Data Asset Management
  • 001. Learning objectives
  • 002. 15.1 Asset Management
  • 003. 15.2 Deletion, Disposal, and Destruction
  • 004. 15.3 Deep Dive Quiz

  • Lesson 16 Explain Various Activities Associated with Vulnerability Management
  • 001. Learning objectives
  • 002. 16.1 Vulnerability Identification
  • 003. 16.2 Vulnerability Response and Remediation
  • 004. 16.3 Deep Dive Quiz

  • Lesson 17 Explain Security Alerting and Monitoring Concepts and Tools
  • 001. Learning objectives
  • 002. 17.1 Logging and Analysis
  • 003. 17.2 SNMP, NetFlow, and SCAP
  • 004. 17.3 Deep Dive Quiz

  • Lesson 18 Given a Scenario, Modify Enterprise Capabilities to Enhance Security
  • 001. Learning objectives
  • 002. 18.1 Enhancing Security with Network Devices
  • 003. 18.2 TCPIP and Secure Protocols
  • 004. 18.3 Email Security
  • 005. 18.4 Group Policy and SELinux
  • 006. 18.5 Deep Dive Quiz

  • Lesson 19 Given a Scenario, Implement and Maintain Identity and Access Management
  • 001. Learning objectives
  • 002. 19.1 Identity and Access Management (IAM)
  • 003. 19.2 Federated Identity
  • 004. 19.3 Authentication
  • 005. 19.4 Biometrics
  • 006. 19.5 Access Control and Authorization
  • 007. 19.6 Privileged Access Management
  • 008. 19.7 Deep Dive Quiz

  • Lesson 20 Explain the Importance of Automation and Orchestration Related to Secure Operations
  • 001. Learning objectives
  • 002. 20.1 Scripting, Automation, and Orchestration
  • 003. 20.2 Deep Dive Quiz

  • Lesson 21 Explain Appropriate Incident Response Activities
  • 001. Learning objectives
  • 002. 21.1 Incident Management
  • 003. 21.2 Incident Response
  • 004. 21.3 Evidence Handling
  • 005. 21.4 Forensic Examination
  • 006. 21.5 Disclosure and Notification
  • 007. 21.6 Deep Dive Quiz

  • Lesson 22 Given a Scenario, Use Data Sources to Support an Investigation
  • 001. Learning objectives
  • 002. 22.1 Data Sources
  • 003. 22.2 Deep Dive Quiz

  • Lesson 23 Summarize Effective Security Governance
  • 001. Learning objectives
  • 002. 23.1 Governance Structure
  • 003. 23.2 Governance Documents
  • 004. 23.3 Deep Dive Quiz

  • Lesson 24 Explain Elements of the Risk Management Process
  • 001. Learning objectives
  • 002. 24.1 Risk Concepts
  • 003. 24.2 Risk Assessment and Analysis
  • 004. 24.3 Risk Response and Treatment
  • 005. 24.4 Business Impact Analysis
  • 006. 24.5 Deep Dive Quiz

  • Lesson 25 Explain the Processes Associated with Third-Party Risk Assessment and Management
  • 001. Learning objectives
  • 002. 25.1 Third-party Risk Management
  • 003. 25.2 Deep Dive Quiz

  • Lesson 26 Summarize Elements of Effective Security Compliance
  • 001. Learning objectives
  • 002. 26.1 Compliance Monitoring
  • 003. 26.2 Privacy Principles
  • 004. 26.3 Deep Dive Quiz

  • Lesson 27 Explain Types and Purposes of Audits and Assessment
  • 001. Learning objectives
  • 002. 27.1 Audit and Assurance
  • 003. 27.2 Penetration Testing Concepts
  • 004. 27.3 Penetration Testing Tools and Techiques
  • 005. 27.4 Deep Dive Quiz

  • Lesson 28 Given a Scenario, Implement Security Awareness Practices
  • 001. Learning objectives
  • 002. 28.1 Education, Training, and Awareness
  • 003. 28.2 Deep Dive Quiz

  • Lesson 29 Attaining Your SY0-701 Security+ Certification
  • 001. Learning objectives
  • 002. 29.1 Understanding the SY0-701 Security+ Exam Structure
  • 003. 29.2 SY0-701 Exam Testing Options
  • 004. 29.3 SY0-701 Exam Testing Strategies
  • 005. 29.4 Congratulations! Whats Next

  • Module 1 Closer Look Labs
  • 001. Honeypots
  • 002. Hashing and HMACS
  • 003. Digital Certificates

  • Module 1 General Security Concepts
  • 001. Module introduction

  • Module 2 Closer Look Labs
  • 001. Phone and Text Spoofing
  • 002. Malware Analysis
  • 003. Constructing Error Messages
  • 004. Threat Intelligence Workflow
  • 005. Zero-day Vulnerabilities

  • Module 2 Threats, Vulnerabilities and Mitigations
  • 001. Module introduction

  • Module 3 Closer Look Labs
  • 001. RAID
  • 002. SSL and TLS Packet Capture
  • 003. Cloud Controls

  • Module 3 Security Architecture
  • 001. Module introduction

  • Module 4 Closer Look Labs
  • 001. PowerShell
  • 002. Pwned Passwords
  • 003. IPv6 Addressing
  • 004. Wireless Heat Maps
  • 005. ZenMap
  • 006. Log files
  • 007. Ram Capture

  • Module 4 Security Operations
  • 001. Module introduction

  • Module 5 Closer Look Labs
  • 001. Passive Reconnaissance
  • 002. Policies and standards
  • 003. Quantitative Risk Analysis
  • 004. Privacy Walkthrough

  • Module 5 Security Program Management and Oversight
  • 001. Module introduction

  • Module 6 Preparing for the Exam
  • 001. Module introduction

  • Summary
  • 001. CompTIA Security+ SY0-701 Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 25371
    حجم: 6312 مگابایت
    مدت زمان: 1643 دقیقه
    تاریخ انتشار: ۲۱ آذر ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید