وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

CompTIA Security+ – SY0-701

سرفصل های دوره

1. Identify Types and Categories of Security Controls
  • 1. Welcome to Security Control Categories and Types
  • 2. Security Controls Overview
  • 3. Security Control Category Technical Controls
  • 4. Security Control Category Managerial Controls
  • 5. Security Control Category Operational Controls
  • 6. Security Control Category Physical Controls
  • 7. Validation
  • 8. Part 2

  • 2. Summarize Security Concepts
  • 1. Intro to summarize Security Concepts
  • 2. CIA
  • 3. Non-repudiation
  • 4. AAA
  • 5. Zero-Trust and Gap Analysis
  • 6. Physical Security
  • 7. Physical Security
  • 8. Validation of Security Concepts
  • 9. Validation of Security Concepts part 2

  • 3. Maintain Security With Change Management
  • 1. Intro to Change Management
  • 2. Change Management Overview
  • 3. Business Processes Impacting Security Operation
  • 4. Technical Implications and Documentation
  • 5. Practical Example for Change Control
  • 6. Validation of Change Control with Security
  • 7. Validation of Change Control with Security Part 2

  • 4. Use Symmetrical Encryption
  • 1. Intro to Using Symmetrical Encryption
  • 2. Symmetric Encryption Overview
  • 3. Algorithm and Key Examples
  • 4. Data at Rest Encryption Example
  • 5. Data in Motion Encryption Examples with IPsec
  • 6. Establishing a Shared Key
  • 7. Reinforce and Validate
  • 8. Reinforce and Validate Part 2

  • 5. Use Asymmetrical Encryption
  • 1. Intro to Asymmetrical Encryption
  • 2. Asymmetrical Encryption Overview
  • 3. Delivering Public Keys Using Digital Certificates
  • 4. Using Digital Signatures
  • 5. Using a Public Key to Encrypt
  • 6. Using a Public Key to Encrypt
  • 7. Validation
  • 8. Validation Part 2

  • 6. Use Certificates and PKI
  • 1. Intro to PKI and Certificates
  • 2. PKI and Certs Overview
  • 3. Self Signed Certs
  • 4. Adding an Internal CA to as a Trusted CA
  • 5. Using a CSR for Requesting a Certificate
  • 6. Reinforce and Validate What We Have Learned
  • 7. Reinforce and Validate What We Have Learned Part 2

  • 7. Use Cryptography Tools and Methods
  • 1. Intro to Cryptography Tools and Methods
  • 2. Cryptography Tools and Methods Overview
  • 3. Security Modules
  • 4. Obfuscation
  • 5. Salting and Key Stretching
  • 6. Open Public Ledger
  • 7. Validation
  • 8. Validation Part 2

  • 8. Threat Actors and Motivations
  • 1. Lets compare common themes in cybersecurity threats
  • 2. Who are the attackers
  • 3. What information do we use to classify threats
  • 4. Where do we gain information on target systems
  • 5. Where do we gain information on target systems Part 2
  • 6. With all this information, what do we do with it
  • 7. Challenge
  • 8. Solution

  • 9. Common Threat Vectors
  • 1. Threat vectors
  • 2. Threat indicators tell us more about threat vectors
  • 3. Whos behind all this
  • 4. ishing a subcategory
  • 5. ishing a subcategory Part 2
  • 6. Password Attacks
  • 7. Challenge
  • 8. Solution

  • 10. Various Vulnerabilities
  • 1. The Attack Vector
  • 2. Injection Attacks
  • 3. Authentication Vulnerabilities
  • 4. Session Attacks
  • 5. Authentication Vulnerabilities
  • 6. Authorization Vulnerabilities
  • 7. Cross-Site Scripting - XSS
  • 8. Memory Management
  • 9. Challenge
  • 10. Solution

  • 11. Indicators of Malicious Activity
  • 1. Indicators of Malicious Activity
  • 2. Social Engineering Indicators
  • 3. Network Indicators
  • 4. System Indications
  • 5. Access Indicators
  • 6. Pathways for malicious activity
  • 7. Challenge
  • 8. Solution

  • 12. Mitigation Techniques
  • 1. Identifying those indicators
  • 2. Social Engineering Remedies
  • 3. Network Remedies
  • 4. System Remedies
  • 5. Access Remedies
  • 6. Challenge
  • 7. Solution

  • 13. Software Development Life Cycle
  • 1. Software Development Life Cycle - SDLC
  • 2. Software Development Life Cycle - SDLC Part 2
  • 3. Software Testing
  • 4. Security Testing
  • 5. Application Security Controls
  • 6. Challenge
  • 7. Solution

  • 14. IDSIPS
  • 1. Introducing IDS and IPS
  • 2. Lets start by understanding what IDS and IPS is.
  • 3. Understanding Rules
  • 4. IDS and IPS Placement
  • 5. Bringing all of them together
  • 6. What is a SOAR
  • 7. What is a SIEM
  • 8. Challenge
  • 9. Solution

  • 15. Describe How Architecture Impacts Security
  • 1. Introduction
  • 2. Overview
  • 3. Cloud Architectures
  • 4. Application Architectures
  • 5. Network Architectures
  • 6. Segmentation Example
  • 7. Validation
  • 8. Solution
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42974
    حجم: 15515 مگابایت
    مدت زمان: 784 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید