وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
3

CompTIA Security+ (SY0-701)

سرفصل های دوره

1.CompTIA Security+ (SY0-701) Webinars
  • 1.Mastering the CompTIA Security+ Certification

  • 2.CompTIA Security+ (SY0-701) Day 1
  • 1.Introduction to Course and Exam Objectives
  • 2.Categories and Types of Security Controls
  • 3.Practice Questions - Exam Objective 1.1
  • 4.Defense in Depth, CIA, and Non-Repudiation
  • 5.Authentication, Authorization, and Accounting (AAA)
  • 6.Gap Analysis and Zero Trust
  • 7.Physical Security
  • 8.Deception and Disruption Technology
  • 9.Practice Questions - Exam Objective 1.2
  • 10.Change Management
  • 11.Practice Questions - Exam Objective 1.3
  • 12.Symmetric and Asymmetric Encryption

  • 3.CompTIA Security+ (SY0-701) Day 2
  • 1.Hashing and Obfuscation
  • 2.Public Key Infrastructure
  • 3.Block Chain and the Open Public Ledger
  • 4.Data Encryption
  • 5.TPM, HSM, KMS, and Secure Enclave
  • 6.Practice Questions - Exam Objective 1.4
  • 7.Threat Actors and Their Motivations
  • 8.Practice Questions - Exam Objective 2.1
  • 9.Various Threat Vectors and Attack Surfaces

  • 4.CompTIA Security+ (SY0-701) Day 3
  • 1.Human Threat Vectors Social Engineering
  • 2.Practice Questions - Exam Objective 2.2
  • 3.Application and Web-based Vulnerabilities
  • 4.Operating System-based Vulnerabilities
  • 5.Hardware Vulnerabilities
  • 6.Virtualization and Cloud Vulnerabilities
  • 7.Supply Chain Vulnerabilities
  • 8.Zero-day Vulnerabilities and More
  • 9.Practice Questions - Exam Objective 2.3
  • 10.Malware Attacks
  • 11.Physical Attacks
  • 12.Network Attacks
  • 13.Application Attacks

  • 5.CompTIA Security+ (SY0-701) Day 4
  • 1.Cryptographic and Password Attacks
  • 2.Indicators of Malicious Activity
  • 3.Practice Questions - Exam Objective 2.4
  • 4.Mitigation Techniques Used to Secure the Enterprise
  • 5.Practice Questions - Exam Objective 2.5
  • 6.Security Implications of Different Architecture Models
  • 7.Considerations of Different Architecture Models
  • 8.Practice Questions - Exam Objective 3.1
  • 9.Infrastructure Considerations

  • 6.CompTIA Security+ (SY0-701) Day 5
  • 1.Secure Communication Access
  • 2.Practice Questions - Exam Objective 3.2
  • 3.Data Types and Classifications
  • 4.Methods to Secure Data
  • 5.Practice Questions - Exam Objective 3.3
  • 6.Resilience and Recovery in Security Architecture
  • 7.Practice Questions - Exam Objective 3.4
  • 8.Secure Baselines and Hardening Targets
  • 9.Wireless and Mobile Solutions Security

  • 7.CompTIA Security+ (SY0-701) Day 6
  • 1.Application Security and Sandboxing
  • 2.Practice Questions - Exam Objective 4.1
  • 3.Hardware, Software, and Data Asset Management
  • 4.Practice Questions - Exam Objective 4.2
  • 5.Vulnerability Management Identification Methods
  • 6.Vulnerability Management Analysis
  • 7.Vulnerability Management Response, Remediation, and Reporting
  • 8.Practice Questions - Exam Objective 4.3
  • 9.Monitoring Activities and Concepts
  • 10.Security Alerting and Monitoring Tools
  • 11.Practice Questions - Exam Objective 4.4
  • 12.Modify Enterprise Capabilities to Enhance Security
  • 13.Practice Questions - Exam Objective 4.5

  • 8.CompTIA Security+ (SY0-701) Day 7
  • 1.Identity and Access Management
  • 2.Multifactor Authentication
  • 3.Password Concepts and Privileged Access Management Tools
  • 4.Practice Questions - Exam Objective 4.6
  • 5.Automation and Orchestration for Security
  • 6.Practice Questions - Exam Objective 4.7
  • 7.Incident Response Process
  • 8.Incident Response Testing, Analysis, and Digital Forensics
  • 9.Practice Questions - Exam Objective 4.8
  • 10.Data Sources to Support an Investigation
  • 11.Practice Questions - Exam Objective 4.9
  • 12.Guidelines and Policies for Effective Security Governance
  • 13.Standards and Procedures of Effective Security Governance

  • 9.CompTIA Security+ (SY0-701) Day 8
  • 1.External Considerations of Effective Security Governance
  • 2.Monitoring and Revision for Effective Security Governance
  • 3.Types of Governance Structures of Effective Security Governance
  • 4.Roles and Responsibilities for Systems and Data of Effective Security Governance
  • 5.Practice Questions - Exam Objective 5.1
  • 6.Elements of the Risk Management Process
  • 7.Practice Questions - Exam Objective 5.2
  • 8.Third-Party Risk Assessment and Management
  • 9.Practice Questions - Exam Objective 5.3
  • 10.Security Compliance
  • 11.Privacy
  • 12.Practice Questions - Exam Objective 5.4
  • 13.Audits and Assessments
  • 14.Penetration Testing
  • 15.Practice Questions - Exam Objective 5.5
  • 16.Security Awareness Practices
  • 17.Practice Questions - Exam Objective 5.6
  • 18.Course Wrap Up!
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 44930
    حجم: 16503 مگابایت
    مدت زمان: 1791 دقیقه
    تاریخ انتشار: ۱ تیر ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید