وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ SY0-701: General Security Concepts-Vol 1

سرفصل های دوره

Vol 1: Mastering Core Cybersecurity Fundamentals & Concepts


1 - Comptia Security 701 Course Introduction
  • 1 - Cyber Security 2024 Forecast
  • 2 - Course Author Introduction

  • 2 - Compare and contrast various types of security controls
  • 3 - Chapter Introduction
  • 4 - Technical Controls
  • 5 - Managerial controls
  • 6 - Operations Controls
  • 7 - Physical Controls
  • 8 - Control Types Introduction
  • 9 - Preventive Control types
  • 10 - Deterrent Controls
  • 11 - Detective Controls
  • 12 - What are organizations doing to implement Detective controls
  • 13 - Corrective control
  • 14 - Compensating Control
  • 15 - Directive Controls

  • 3 - Summarize Fundamental Security Concepts
  • 16 - CIA triad Introduction
  • 17 - Confidentiality
  • 18 - Integrity
  • 19 - Availability
  • 20 - NonRepudiation
  • 21 - AAA
  • 22 - Gap Analysis in Cyber Security
  • 23 - Zero Trust Control Plane
  • 24 - Zero Trust Data Plane
  • 25 - Physical Security
  • 26 - Physical Controls Sensors
  • 27 - Deception and Disruption Technologies

  • 4 - Various types of Change Management Processes amd their impact on Cyber Security
  • 28 - Chapter Introduction
  • 29 - Approval Process
  • 30 - Ownership
  • 31 - Stakeholders
  • 32 - Impact Analysis
  • 33 - Test Results
  • 34 - Backout Plans
  • 35 - Maintenance Window
  • 36 - Standard Operating Procedures
  • 37 - Technical Implications
  • 38 - Documentation
  • 39 - Version Control

  • 5 - The importance of using appropriate cryptographic solutions
  • 40 - Chapter Introduction
  • 41 - Chocolate Cake Recipe PKI Example 1
  • 42 - The digital treasure PKI Example 2
  • 43 - Browser to Webserver E2E Encryption
  • 44 - PKI
  • 45 - Encryption What will we learn
  • 46 - Encryption Levels
  • 47 - Transport Encryption
  • 48 - Symmetric Encryption
  • 49 - Asymmetric Encryption
  • 50 - Key exchange Part 1
  • 51 - Key Exchange Algorithms Part 2
  • 52 - Encryption Key Lengths
  • 53 - Encryption and PKI Tools Introduction
  • 54 - TPM
  • 55 - HSM
  • 56 - KMS
  • 57 - Secure Enclaves
  • 58 - Obfuscation
  • 59 - Steganography
  • 60 - Tokenization
  • 61 - Data Masking
  • 62 - Data Masking Types
  • 63 - Masking Techniques
  • 64 - Hashing Introduction What are Hash Functions
  • 65 - Real word usage of Hash Functions
  • 66 - Journey of Hashing Algorithm
  • 67 - Strengths Weaknesses of Hashing Algorithms
  • 68 - Using Right Hashing Algorithms
  • 69 - Hashing Vulnerabilities and Historical Exploits
  • 70 - Salting
  • 71 - Salting Under the hood
  • 72 - Definition and basic concept History of digital signatures
  • 73 - The importance of digital signatures in modern communication
  • 74 - The cryptographic principles behind digital signatures
  • 75 - The process of creating and verifying a digital signature
  • 76 - How digital signatures ensure the integrity and nonrepudiation of data
  • 77 - Common algorithms used for digital signatures
  • 78 - Digital signature standards
  • 79 - Advanced cryptographic concepts related to digital signatures
  • 80 - Key stretching
  • 81 - Contributors in the field of Key stretching
  • 82 - Blockchain Introduction
  • 83 - Blockchain as a decentralized digital ledger
  • 84 - Adoption of block chain
  • 85 - The Dawn of Internet Security and the Rise of Digital Certificates
  • 86 - A brief history of cryptographic methods
  • 87 - The introduction of SSL by Netscape
  • 88 - How SSL became the standard for securing internet communications
  • 89 - Why SSL evolved into TLS
  • 90 - Poodle Attack
  • 91 - Key improvements and differences between SSL and TLS protocols
  • 92 - Versions of TLS and their Enhancements
  • 93 - Certificate Authorities and their history
  • 94 - Understanding Types of CAs Public vs Private
  • 95 - Hierarchical Trust Model Example
  • 96 - Hierarchical Trust Model Overview and Best Practices
  • 97 - What is a Root CA
  • 98 - The Need for Intermediate Certificate Authorities
  • 99 - What are CRLs
  • 100 - The need for OCSPs
  • 101 - How does the browser identify the OCSP Server
  • 102 - What are Self Signed Certificates
  • 103 - What are Third party Certificates
  • 104 - What is a CSR What are its Key Components
  • 105 - Wild Card Certificates
  • 106 - Buying a domain Lab
  • 106 - Heres-a-step-by-step-guide-to-encrypting-your-web-application-on-a-Linux-based-system.pdf
  • 107 - Building a Linux VM
  • 108 - Mapping A record in DNS
  • 109 - Configuring the webserver with LetsEncrypt certificate
  • 110 - Verifying the LetsEncrypt Certificate chain of Trust
  • 111 - Certbot Supporting and helpful commands
  • 112 - Its LAB Time What next Step by Step Verifying SELF SIGNED KEYS
  • 112 - Self-Signed-Certificate-Step-by-Step-Lab.pdf
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 33934
    حجم: 12061 مگابایت
    مدت زمان: 444 دقیقه
    تاریخ انتشار: 28 فروردین 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید