وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ – SY0-701

سرفصل های دوره

1. Identify Types and Categories of Security Controls
  • 1. Welcome to Security Control Categories and Types
  • 2. Security Controls Overview
  • 3. Security Control Category Technical Controls
  • 4. Security Control Category Managerial Controls
  • 5. Security Control Category Operational Controls
  • 6. Security Control Category Physical Controls
  • 7. Validation
  • 8. Part 2

  • 2. Summarize Security Concepts
  • 1. Intro to summarize Security Concepts
  • 2. CIA
  • 3. Non-repudiation
  • 4. AAA
  • 5. Zero-Trust and Gap Analysis
  • 6. Physical Security
  • 7. Physical Security
  • 8. Validation of Security Concepts
  • 9. Validation of Security Concepts part 2

  • 3. Maintain Security With Change Management
  • 1. Intro to Change Management
  • 2. Change Management Overview
  • 3. Business Processes Impacting Security Operation
  • 4. Technical Implications and Documentation
  • 5. Practical Example for Change Control
  • 6. Validation of Change Control with Security
  • 7. Validation of Change Control with Security Part 2

  • 4. Use Symmetrical Encryption
  • 1. Intro to Using Symmetrical Encryption
  • 2. Symmetric Encryption Overview
  • 3. Algorithm and Key Examples
  • 4. Data at Rest Encryption Example
  • 5. Data in Motion Encryption Examples with IPsec
  • 6. Establishing a Shared Key
  • 7. Reinforce and Validate
  • 8. Reinforce and Validate Part 2

  • 5. Use Asymmetrical Encryption
  • 1. Intro to Asymmetrical Encryption
  • 2. Asymmetrical Encryption Overview
  • 3. Delivering Public Keys Using Digital Certificates
  • 4. Using Digital Signatures
  • 5. Using a Public Key to Encrypt
  • 6. Using a Public Key to Encrypt
  • 7. Validation
  • 8. Validation Part 2

  • 6. Use Certificates and PKI
  • 1. Intro to PKI and Certificates
  • 2. PKI and Certs Overview
  • 3. Self Signed Certs
  • 4. Adding an Internal CA to as a Trusted CA
  • 5. Using a CSR for Requesting a Certificate
  • 6. Reinforce and Validate What We Have Learned
  • 7. Reinforce and Validate What We Have Learned Part 2

  • 7. Use Cryptography Tools and Methods
  • 1. Intro to Cryptography Tools and Methods
  • 2. Cryptography Tools and Methods Overview
  • 3. Security Modules
  • 4. Obfuscation
  • 5. Salting and Key Stretching
  • 6. Open Public Ledger
  • 7. Validation
  • 8. Validation Part 2

  • 8. Threat Actors and Motivations
  • 1. Lets compare common themes in cybersecurity threats
  • 2. Who are the attackers
  • 3. What information do we use to classify threats
  • 4. Where do we gain information on target systems
  • 5. Where do we gain information on target systems Part 2
  • 6. With all this information, what do we do with it
  • 7. Challenge
  • 8. Solution

  • 9. Common Threat Vectors
  • 1. Threat vectors
  • 2. Threat indicators tell us more about threat vectors
  • 3. Whos behind all this
  • 4. ishing a subcategory
  • 5. ishing a subcategory Part 2
  • 6. Password Attacks
  • 7. Challenge
  • 8. Solution

  • 10. Various Vulnerabilities
  • 1. The Attack Vector
  • 2. Injection Attacks
  • 3. Authentication Vulnerabilities
  • 4. Session Attacks
  • 5. Authentication Vulnerabilities
  • 6. Authorization Vulnerabilities
  • 7. Cross-Site Scripting - XSS
  • 8. Memory Management
  • 9. Challenge
  • 10. Solution

  • 11. Indicators of Malicious Activity
  • 1. Indicators of Malicious Activity
  • 2. Social Engineering Indicators
  • 3. Network Indicators
  • 4. System Indications
  • 5. Access Indicators
  • 6. Pathways for malicious activity
  • 7. Challenge
  • 8. Solution

  • 12. Mitigation Techniques
  • 1. Identifying those indicators
  • 2. Social Engineering Remedies
  • 3. Network Remedies
  • 4. System Remedies
  • 5. Access Remedies
  • 6. Challenge
  • 7. Solution

  • 13. Software Development Life Cycle
  • 1. Software Development Life Cycle - SDLC
  • 2. Software Development Life Cycle - SDLC Part 2
  • 3. Software Testing
  • 4. Security Testing
  • 5. Application Security Controls
  • 6. Challenge
  • 7. Solution

  • 14. IDSIPS
  • 1. Introducing IDS and IPS
  • 2. Lets start by understanding what IDS and IPS is.
  • 3. Understanding Rules
  • 4. IDS and IPS Placement
  • 5. Bringing all of them together
  • 6. What is a SOAR
  • 7. What is a SIEM
  • 8. Challenge
  • 9. Solution

  • 15. Describe How Architecture Impacts Security
  • 1. Introduction
  • 2. Overview
  • 3. Cloud Architectures
  • 4. Application Architectures
  • 5. Network Architectures
  • 6. Segmentation Example
  • 7. Validation
  • 8. Solution
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 42974
    حجم: 15515 مگابایت
    مدت زمان: 784 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید