وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ SY0-701: General Security Concepts-Vol 1

سرفصل های دوره

Vol 1: Mastering Core Cybersecurity Fundamentals & Concepts


1 - Comptia Security 701 Course Introduction
  • 1 - Cyber Security 2024 Forecast
  • 2 - Course Author Introduction

  • 2 - Compare and contrast various types of security controls
  • 3 - Chapter Introduction
  • 4 - Technical Controls
  • 5 - Managerial controls
  • 6 - Operations Controls
  • 7 - Physical Controls
  • 8 - Control Types Introduction
  • 9 - Preventive Control types
  • 10 - Deterrent Controls
  • 11 - Detective Controls
  • 12 - What are organizations doing to implement Detective controls
  • 13 - Corrective control
  • 14 - Compensating Control
  • 15 - Directive Controls

  • 3 - Summarize Fundamental Security Concepts
  • 16 - CIA triad Introduction
  • 17 - Confidentiality
  • 18 - Integrity
  • 19 - Availability
  • 20 - NonRepudiation
  • 21 - AAA
  • 22 - Gap Analysis in Cyber Security
  • 23 - Zero Trust Control Plane
  • 24 - Zero Trust Data Plane
  • 25 - Physical Security
  • 26 - Physical Controls Sensors
  • 27 - Deception and Disruption Technologies

  • 4 - Various types of Change Management Processes amd their impact on Cyber Security
  • 28 - Chapter Introduction
  • 29 - Approval Process
  • 30 - Ownership
  • 31 - Stakeholders
  • 32 - Impact Analysis
  • 33 - Test Results
  • 34 - Backout Plans
  • 35 - Maintenance Window
  • 36 - Standard Operating Procedures
  • 37 - Technical Implications
  • 38 - Documentation
  • 39 - Version Control

  • 5 - The importance of using appropriate cryptographic solutions
  • 40 - Chapter Introduction
  • 41 - Chocolate Cake Recipe PKI Example 1
  • 42 - The digital treasure PKI Example 2
  • 43 - Browser to Webserver E2E Encryption
  • 44 - PKI
  • 45 - Encryption What will we learn
  • 46 - Encryption Levels
  • 47 - Transport Encryption
  • 48 - Symmetric Encryption
  • 49 - Asymmetric Encryption
  • 50 - Key exchange Part 1
  • 51 - Key Exchange Algorithms Part 2
  • 52 - Encryption Key Lengths
  • 53 - Encryption and PKI Tools Introduction
  • 54 - TPM
  • 55 - HSM
  • 56 - KMS
  • 57 - Secure Enclaves
  • 58 - Obfuscation
  • 59 - Steganography
  • 60 - Tokenization
  • 61 - Data Masking
  • 62 - Data Masking Types
  • 63 - Masking Techniques
  • 64 - Hashing Introduction What are Hash Functions
  • 65 - Real word usage of Hash Functions
  • 66 - Journey of Hashing Algorithm
  • 67 - Strengths Weaknesses of Hashing Algorithms
  • 68 - Using Right Hashing Algorithms
  • 69 - Hashing Vulnerabilities and Historical Exploits
  • 70 - Salting
  • 71 - Salting Under the hood
  • 72 - Definition and basic concept History of digital signatures
  • 73 - The importance of digital signatures in modern communication
  • 74 - The cryptographic principles behind digital signatures
  • 75 - The process of creating and verifying a digital signature
  • 76 - How digital signatures ensure the integrity and nonrepudiation of data
  • 77 - Common algorithms used for digital signatures
  • 78 - Digital signature standards
  • 79 - Advanced cryptographic concepts related to digital signatures
  • 80 - Key stretching
  • 81 - Contributors in the field of Key stretching
  • 82 - Blockchain Introduction
  • 83 - Blockchain as a decentralized digital ledger
  • 84 - Adoption of block chain
  • 85 - The Dawn of Internet Security and the Rise of Digital Certificates
  • 86 - A brief history of cryptographic methods
  • 87 - The introduction of SSL by Netscape
  • 88 - How SSL became the standard for securing internet communications
  • 89 - Why SSL evolved into TLS
  • 90 - Poodle Attack
  • 91 - Key improvements and differences between SSL and TLS protocols
  • 92 - Versions of TLS and their Enhancements
  • 93 - Certificate Authorities and their history
  • 94 - Understanding Types of CAs Public vs Private
  • 95 - Hierarchical Trust Model Example
  • 96 - Hierarchical Trust Model Overview and Best Practices
  • 97 - What is a Root CA
  • 98 - The Need for Intermediate Certificate Authorities
  • 99 - What are CRLs
  • 100 - The need for OCSPs
  • 101 - How does the browser identify the OCSP Server
  • 102 - What are Self Signed Certificates
  • 103 - What are Third party Certificates
  • 104 - What is a CSR What are its Key Components
  • 105 - Wild Card Certificates
  • 106 - Buying a domain Lab
  • 106 - Heres-a-step-by-step-guide-to-encrypting-your-web-application-on-a-Linux-based-system.pdf
  • 107 - Building a Linux VM
  • 108 - Mapping A record in DNS
  • 109 - Configuring the webserver with LetsEncrypt certificate
  • 110 - Verifying the LetsEncrypt Certificate chain of Trust
  • 111 - Certbot Supporting and helpful commands
  • 112 - Its LAB Time What next Step by Step Verifying SELF SIGNED KEYS
  • 112 - Self-Signed-Certificate-Step-by-Step-Lab.pdf
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 33934
    حجم: 12061 مگابایت
    مدت زمان: 444 دقیقه
    تاریخ انتشار: ۲۸ فروردین ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید