وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ (SY0-701) Complete Course & Practice Exam

سرفصل های دوره

CompTIA Security+ (SY0-701) Bootcamp - Your preparation for the world's best cybersecurity certification!


1 - Introduction
  • 1 - How To Pass CompTIA Security SY0701

  • 2 - Domain 10 General Security Concepts
  • 1 - Domain 111 Quiz.html
  • 2 - Domain 111 Compare and contrast various types of security controls
  • 2 - Domain 121 Quiz.html
  • 2 - Domain-1.1.1-Compare-and-contrast-various-types-of-security-controls.pdf
  • 3 - Domain 121 Fundamental Security Concepts CIA Triad
  • 3 - Domain 122 Quiz.html
  • 3 - Domain-1.2.1-Summarize-fundamental-security-concepts-C.I.A-Triad.pdf
  • 4 - Domain 122 Fundamental Security Concepts AAA
  • 4 - Domain 123 Quiz.html
  • 4 - Domain-1.2.2-Summarize-fundamental-security-concepts-AAA.pdf
  • 5 - Domain 123 Fundamental Security Concepts Zero Trust Architecture
  • 5 - Domain 124 Quiz.html
  • 5 - Domain-1.2.3-Summarize-fundamental-security-concepts-Zero-Trust-Architecture.pdf
  • 6 - Domain 124 Fundamental Security Concepts Physical Security
  • 6 - Domain 125 Quiz.html
  • 6 - Domain-1.2.5-Summarize-fundamental-security-concepts-Physical-Security.pdf
  • 7 - Domain 125 Fundamental Security Concepts Deception Technologies
  • 7 - Domain 131 Quiz.html
  • 7 - Domain-1.2.4-Summarize-fundamental-security-concepts-Deception-Disruption-Technologies.pdf
  • 8 - Domain 131 Business ProcessesProcedures and its Impact on Security
  • 8 - Domain 132 Quiz.html
  • 8 - Domain-1.3.1-Explain-the-importance-of-change-management-processes-and-the-impact-to-security-Business-Processes.pdf
  • 9 - Domain 132 Change Management Processes and its Impact on Security
  • 9 - Domain 141 Quiz.html
  • 9 - Domain-1.3.2-Explain-the-importance-of-change-management-processes-and-the-impact-to-security-Technical-Implications.pdf
  • 10 - Domain 141 Using Appropriate Cryptographic Solutions Encryption Fundamentals
  • 10 - Domain 142 Quiz.html
  • 11 - Domain 142 Using Appropriate Cryptographic Solutions Levels of Encryption
  • 11 - Domain 143 Quiz.html
  • 11 - Domain-1.4.2-Explain-the-importance-of-using-appropriate-cryptographic-solutions-Levels-of-Encryption.pdf
  • 12 - Domain 143 Appropriate Cryptographic Solutions Public Key Infrastructure PKI
  • 12 - Domain 144 Quiz.html
  • 12 - Domain-1.4.3-Explain-the-importance-of-using-appropriate-cryptographic-solutions-Public-Key-Infrastructure.pdf
  • 13 - Domain 144 Using Appropriate Cryptographic Solutions PKI Components
  • 13 - Domain 145 Quiz.html
  • 13 - Domain-1.4.4-Explain-the-importance-of-using-appropriate-cryptographic-solutions-PKI-Components.pdf
  • 14 - Domain 145 Using Appropriate Cryptographic Solutions Cryptographic Tools
  • 14 - Domain-1.4.5-Explain-the-importance-of-using-appropriate-cryptographic-solutions-Cryptographic-Tools.pdf

  • 3 - Domain 20 Threats Vulnerabilities and Mitigations
  • 14 - Domain 211 Quiz.html
  • 15 - Domain 211 Compare and Contrast Common Threat Actors
  • 15 - Domain 221 Quiz.html
  • 15 - Domain-2.1.1-Compare-and-contrast-common-threat-actors-and-motivations.pdf
  • 16 - Domain 221 Explain Common Threat Vectors Images Files SMS Email Media
  • 16 - Domain 222 Quiz.html
  • 17 - Domain 222 Unsecure Networks Open Ports Supply Chain Vulnerabilities
  • 17 - Domain 223 Quiz.html
  • 18 - Domain 223 Human Vectors and Social Engineering
  • 18 - Domain 231 Quiz.html
  • 18 - Domain-2.2.3-Explain-Common-Threat-Vectors-and-Attack-Surfaces-Human-Vectors-Social-Engineering.pdf
  • 19 - Domain 231 Types of Vulnerabilities Application OS WebBased Attacks
  • 19 - Domain 232 Quiz.html
  • 19 - Domain-2.3.1-Explain-various-types-of-vulnerabilities-Application-Operating-System-and-Web-based-Attacks.pdf
  • 20 - Domain 232 Types of Vulnerabilities Hardware Virtualization Supply Chain
  • 20 - Domain 233 Quiz.html
  • 20 - Domain-2.3.2-Explain-Various-types-of-Vulnerabilities-Hardware-Virtualization-Cloud-specific-Supply-Chain.pdf
  • 21 - Domain 233 Types of Vulnerabilities Cryptographic Misconfiguration Mobile
  • 21 - Domain 241 Quiz.html
  • 21 - Domain-2.3.3-Explain-Various-types-of-Vulnerabilities-Cryptographic-Misconfiguration-Mobile-Device.pdf
  • 22 - Domain 241 Indicators of Malicious Activity Malware Physical Attacks
  • 22 - Domain 242 Quiz.html
  • 22 - Domain-2.4.1-Given-a-scenario-analyze-indicators-of-malicious-activity-Malware-Attacks-Physical-Attacks.pdf
  • 23 - Domain 242 Indicators of Malicious Activity Network Attacks
  • 23 - Domain 243 Quiz.html
  • 23 - Domain-2.4.2-Given-a-scenario-analyze-indicators-of-malicious-activity-Network-Attacks.pdf
  • 24 - Domain 243 Indicators of Malicious Activity Application AttacksCryptography
  • 24 - Domain 244 Quiz.html
  • 25 - Domain 244 Indicators of Malicious Activity Attack Indicators
  • 25 - Domain 251 Quiz.html
  • 25 - Domain-2.4.4-Given-a-scenario-analyze-indicators-of-malicious-activity-Indicators.pdf
  • 26 - Domain 251 Segmentation Access Control Least Privilege
  • 26 - Domain 252 Quiz.html
  • 27 - Domain 252 Configuration Enforcement and Hardening

  • 4 - Domain 30 Security Architecture
  • 27 - Domain 311 Quiz.html
  • 28 - Domain 311 Different Architecture Models Infrastructure Concepts Part 1
  • 28 - Domain 312 Quiz.html
  • 28 - Domain-3.1.1-Compare-and-contrast-security-implications-of-different-architecture-models-Infrastructure-Concepts-Part-1.pdf
  • 29 - Domain 312 Different Architecture Models Infrastructure Concepts Part 2
  • 29 - Domain 313 Quiz.html
  • 29 - Domain-3.1.2-Compare-and-contrast-security-implications-of-different-architecture-models-Infrastructure-Concepts-Part-2.pdf
  • 30 - Domain 313 Different Architecture Models Architecture Considerations
  • 30 - Domain 321 Quiz.html
  • 30 - -Domain-3.1.3-Compare-and-contrast-security-implications-of-different-architecture-models-Considerations.pdf
  • 31 - Domain 321 Secure Enterprise Infrastructure Infrastructure Considerations
  • 31 - Domain 322 Quiz.html
  • 31 - Domain-3.2.1-Given-a-scenario-apply-security-principles-to-secure-enterprise-infrastructure-Infrastructure-Considerations.pdf
  • 32 - Domain 322 Secure Enterprise Infrastructure Network Appliances
  • 32 - Domain 323 Quiz.html
  • 32 - Domain-3.2.2-Given-a-scenario-apply-security-principles-to-secure-enterprise-infrastructure-Network-Appliances.pdf
  • 33 - Domain 323 Secure Enterprise Infrastructure Secure Communications
  • 33 - Domain 331 Quiz.html
  • 34 - Domain 331 Strategies to Protect Data Data Types Classifications
  • 34 - Domain-3.3.1-Compare-and-contrast-concepts-and-strategies-to-protect-data-Data-Types-Data-Classifications.pdf
  • 35 - Domain 332 Strategies to Protect Data General Data Considerations
  • 35 - Domain 341 Quiz.html
  • 35 - Domain-3.3.2-Compare-and-contrast-concepts-and-strategies-to-protect-data-General-Data-Considerations-Methods-to-Secure-Data.pdf
  • 36 - Domain 341 Resilience and Recovery in Architecture High Availability
  • 36 - Domain 342 Quiz.html
  • 37 - Domain 342 Resilience Recovery in Architecture Testing Backups Power
  • 37 - Domain-3.4.2-Explain-the-importance-of-resilience-and-recovery-in-security-architecture-Testing-Backups-Power.pdf

  • 5 - Domain 40 Security Operations
  • 37 - Domain 411 Quiz.html
  • 38 - Domain 411 Secure Baselines Hardening
  • 38 - Domain 412 Quiz.html
  • 38 - Domain-4.1.1-Given-a-scenario-apply-common-security-techniques-to-computing-resources-Secure-Baselines-Hardening-Targets.pdf
  • 39 - Domain 412 Wireless Device Mobile Solutions
  • 39 - Domain 413 Quiz.html
  • 39 - Domain-4.1.2-Given-a-scenario-apply-common-security-techniques-to-computing-resources-Wireless-Device-Mobile-Solutions.pdf
  • 40 - Domain 413 Wireless Application Security
  • 40 - Domain 421 Quiz.html
  • 40 - Domain-4.1.3-Given-a-scenario-apply-common-security-techniques-to-computing-resources-Wireless-Security-Settings-Application-Security.pdf
  • 41 - Domain 421 Implications of Hardware Software Data Asset Management
  • 41 - Domain 431 Quiz.html
  • 41 - Domain-4.2.1-Explain-the-security-implications-of-proper-hardware-software-and-data-asset-management.pdf
  • 42 - Domain 431 Identification Methods
  • 42 - Domain 432 Quiz.html
  • 42 - Domain-4.3.1-Explain-the-security-implications-of-proper-hardware-software-and-data-asset-management-Identification-Methods.pdf
  • 43 - Domain 432 Vulnerability Management Analysis
  • 43 - Domain 433 Quiz.html
  • 43 - Domain-4.3.2-Explain-the-security-implications-of-proper-hardware-software-and-data-asset-management-Analysis.pdf
  • 44 - Domain 433 Vulnerability Management Response Remediation Reporting
  • 44 - Domain 441 Quiz.html
  • 45 - Domain 441 Monitoring Concepts Tools Compute Resources Activities
  • 45 - Domain 442 Quiz.html
  • 45 - Domain-4.4.1-Explain-security-alerting-and-monitoring-concepts-and-tools-Monitoring-Computing-Resources-Activities.pdf
  • 46 - Domain 442 Monitoring Concepts Tools Tools
  • 46 - Domain 451 Quiz.html
  • 46 - Domain-4.4.2-Explain-security-alerting-and-monitoring-concepts-and-tools-Tools.pdf
  • 47 - Domain 451 Enhance Enterprise Security Firewalls IDSIPS and Web Filtering
  • 47 - Domain 452 Quiz.html
  • 47 - Domain-4.5.1-Given-a-scenario-modify-enterprise-capabilities-to-enhance-security-Firewall-IDSIPS-Web-Filter.pdf
  • 48 - Domain 452 Enhance Enterprise Security OS Security DNS Secure Email
  • 48 - Domain 453 Quiz.html
  • 48 - Domain-4.5.2-Given-a-scenario-modify-enterprise-capabilities-to-enhance-security-OS-Security-Secure-Protocols-Email-Security-DNS-Filtering.pdf
  • 49 - Domain 453 Enhance Enterprise Security Enterprise Applications
  • 49 - Domain 461 Quiz.html
  • 49 - Domain-4.5.3-Given-a-scenario-modify-enterprise-capabilities-to-enhance-security-FIM-NAC-XDREDR-User-Behavior-Analytics.pdf
  • 50 - Domain 461 Identity Access Management Federation SSO Attestation
  • 50 - Domain 462 Quiz.html
  • 50 - Domain-4.6.1-Given-a-scenario-implement-and-maintain-identity-and-access-management-Federation-SSO-Interoperability-Attestation.pdf
  • 51 - Domain 462 Access Control Multifactor Authentication
  • 51 - Domain 463 Quiz.html
  • 51 - Domain-4.6.2-Given-a-scenario-implement-and-maintain-identity-and-access-management-Access-Control-MFA.pdf
  • 52 - Domain 463 Password Concepts Privileged Access Management
  • 52 - Domain 471 Quiz.html
  • 52 - Domain-4.6.3-Given-a-scenario-implement-and-maintain-identity-and-access-management-Password-Concepts-PAM.pdf
  • 53 - Domain 471 Automation and Scripting
  • 53 - Domain 472 Quiz.html
  • 53 - Domain-4.7.1-Explain-the-importance-of-automation-and-orchestration-related-to-secure-operations-Use-Cases-of-Automation-Scripting.pdf
  • 54 - Domain 472 Automation Considerations
  • 54 - Domain 481 Quiz.html
  • 54 - Domain-4.7.2-Explain-the-importance-of-automation-and-orchestration-related-to-secure-operations-Benefits-and-Other-Considerations.pdf
  • 55 - Domain 481 Incident Response
  • 55 - Domain 482 Quiz.html
  • 55 - Domain-4.8.1-Explain-appropriate-incident-response-activities-Process-Training-Testing.pdf
  • 56 - Domain 482 Root Cause Analysis Threat Hunting Digital Forensics
  • 56 - Domain 491 Quiz.html
  • 56 - Domain-4.8.2-Explain-appropriate-incident-response-activities-Process-Training-Testing.pdf
  • 57 - Domain 491 Log Data Data Sources
  • 57 - Domain-4.9.1-Given-a-scenario-use-data-sources-to-support-an-investigation.pdf

  • 6 - Domain 50 Security Program Management and Oversight
  • 57 - Domain 511 Quiz.html
  • 58 - Domain 511 Guidelines Policies Standards
  • 58 - Domain 512 Quiz.html
  • 58 - Domain-5.1.1-Summarize-elements-of-effective-security-governance-Guidelines-Policies-Standards.pdf
  • 59 - Domain 512 Procedures External Considerations
  • 59 - Domain 513 Quiz.html
  • 59 - Domain-5.1.2-Summarize-elements-of-effective-security-governance-Procedures-External-Considerations.pdf
  • 60 - Domain 513 Governance Structures RolesResponsibilities
  • 60 - Domain 521 Quiz.html
  • 61 - Domain 521 Risk Identification Assessment Analysis
  • 61 - Domain 522 Quiz.html
  • 61 - Domain-5.2.1-Explain-elements-of-the-risk-management-process-Risk-Identification-Risk-Assessment-Risk-Analysis.pdf
  • 62 - Domain 522 Risk Register Tolerance Appetite Strategies
  • 62 - Domain 523 Quiz.html
  • 63 - Domain 523 Risk Reporting Business Impact Analysis
  • 63 - Domain 531 Quiz.html
  • 63 - Domain-5.2.3-Explain-elements-of-the-risk-management-process-Risk-Register-Risk-Reporting-Business-Impact-Analysis.pdf
  • 64 - Domain 531 Vendor Assessment and Selection
  • 64 - Domain 532 Quiz.html
  • 65 - Domain 532 Agreement Types
  • 65 - Domain 541 Quiz.html
  • 66 - Domain 541 Reporting Noncompliance
  • 66 - Domain 542 Quiz.html
  • 66 - Domain-5.4.1-Summarize-elements-of-effective-security-compliance-Compliance-Reporting-Consequences-of-non-compliance.pdf
  • 67 - Domain 542 Monitoring and Privacy
  • 67 - Domain 551 Quiz.html
  • 67 - Domain-5.4.2-Summarize-elements-of-effective-security-compliance-Compliance-monitoring-Privacy.pdf
  • 68 - Domain 551 Attestation Internal External Audits
  • 68 - Domain 552 Quiz.html
  • 68 - Domain-5.5.1-Explain-types-and-purposes-of-audits-and-assessments-Attestation-Internal-External.pdf
  • 69 - Domain 552 Penetration Testing Overview
  • 69 - Domain 561 Quiz.html
  • 69 - Domain-5.5.2-Explain-types-and-purposes-of-audits-and-assessments-Penetration-Testing.pdf
  • 70 - Domain 561 Phishing and Anomalous Behavior
  • 70 - Domain 562 Quiz.html
  • 70 - Domain-5.6.1-Given-a-scenario-implement-security-awareness-practices-Phishing-Anomalous-Behavior-Recognition.pdf
  • 71 - Domain 562 Guidance Training Development

  • 7 - Practice Exam
  • 1 - Practice Exam 1.html

  • 8 - BONUS Performance Based Questions
  • 72 - PBQ 1 Compare and Contrast Security Control and Framework Types
  • 73 - PBQ 2 Compare and Contrast Social Engineering Techniques
  • 74 - PBQ 3 Identify Cryptographic Modes of Operation
  • 75 - PBQ 4 Implement Certificates and Certificate Authorities
  • 76 - PBQ 5 Implement an Access Control Model
  • 77 - PBQ 6 Implement Secure Remote Access Protocols
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 45432
    حجم: 15435 مگابایت
    مدت زمان: 1032 دقیقه
    تاریخ انتشار: ۲۵ مرداد ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید