وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ (SY0-701) Practical Skills

سرفصل های دوره

CompTIA Security+ (SY0-701) practical skills


1 - Introduction
  • 1 - Introduction
  • 2 - Free 10 Days Practice Exam Information.html
  • 3 - Quick Prerequisite or Expectation Check.html
  • 4 - Build a Sec Home Lab

  • 2 - Security Concept Fundamentals
  • 5 - Trainer Knowledge Share Video
  • 6 - Introduction Security Concept Fundamentals
  • 7 - Exercise 1 Configure RAID 1
  • 8 - Exercise 2 Configure and Test File Integrity Monitoring
  • 9 - Interview Questions Answers.html

  • 3 - Cryptographic Solutions
  • 10 - Introduction Cryptographic Solutions
  • 11 - Exercise 1 Create and Verify a Digital Signature
  • 13 - Interview Questions and Answers.html

  • 4 - Threat Vectors and Attack Surfaces
  • 14 - Trainer Knowledge Share Video
  • 15 - Introduction Threat Vectors and Attack Surfaces
  • 16 - Exercise 1 Open Service Ports
  • 17 - Exercise 2 Default Credentials
  • 18 - Exercise 3 Vulnerable Applications
  • 19 - Interview Questions and Answers.html

  • 5 - Identifying Security Vulnerabilities
  • 20 - Trainer Knowledge Share Video
  • 21 - Introduction Identifying Security Vulnerabilities
  • 22 - Exercise 1 Identify LM Hash Vulnerabilities
  • 23 - Exercise 2 Identify DNS Transfer Vulnerabilities
  • 24 - Interview Questions and Answers.html

  • 6 - Analyze Malicious Activity
  • 25 - Trainer Knowledge Share Video
  • 26 - Introduction Analyze Malicious Activity
  • 27 - Exercise 1 Observe Indications of a Brute Force Attack
  • 28 - Exercise 3 Observe Indications of a SYN Flood Attack
  • 29 - Interview Questions and Answers.html

  • 7 - Mitigation Techniques
  • 30 - Trainer Knowledge Share Video
  • 31 - Introduction Mitigation Techniques
  • 32 - Exercise 1 Configure Router Access
  • 33 - Exercise 2 Harden Router Access
  • 34 - Exercise 3 Configure Router Logging

  • 8 - Security Architecture Models
  • 35 - Trainer Knowledge Share Video
  • 36 - Introduction Security Architecture Models
  • 37 - Exercise 1 Create a VM
  • 38 - Exercise 2 Use Containers
  • 39 - Exercise 3 Complete VM Deployment.html

  • 9 - Securing Enterprise Infrastructures
  • 40 - Trainer Knowledge Share Video
  • 41 - Introduction Securing Enterprise Infrastructures
  • 42 - Exercise 1 Install and Configure a VPN Server
  • 43 - Exercise 2 Create a VPN User and Client
  • 44 - Exercise 3 Configure a L2TPIPsec VPN
  • 45 - Interview Questions and Answers.html

  • 10 - Data Protection Strategies
  • 46 - Trainer Knowledge Share Video
  • 47 - Introduction Data Protection Strategies
  • 48 - Exercise 1 Encryption
  • 49 - Exercise 2 Hashing
  • 50 - Exercise 3 Obfuscation
  • 51 - Interview Questions and Answers.html

  • 11 - Resilience in Security Architecture
  • 52 - Trainer Knowledge Share Video
  • 53 - Introduction Resilience in Security Architecture
  • 54 - Exercise 1 Prepare WIN11 and Install EaseUS Todo Backup
  • 55 - Exercise 2 Conduct and Restore from Incremental Backups
  • 56 - Exercise 3 Conduct Differential Backups and Examine all Backup Files
  • 57 - Exercise 4 Investigate the Archive Bit

  • 12 - Securing Computing Resources
  • 58 - Trainer Knowledge Share Video
  • 59 - Introduction Securing Computing Resources
  • 60 - Exercise 1 Establish a Baseline
  • 61 - Exercise 2 Input Validation
  • 62 - Exercise 3 Sandboxing

  • 13 - Asset Management Techniques
  • 63 - Trainer Knowledge Share Video
  • 64 - Introduction Asset Management Techniques
  • 65 - Exercise 1 Deploy an Asset and License
  • 66 - Exercise 2 Secure Data Sanitization

  • 14 - Vulnerability Management
  • 67 - Introduction Vulnerability Management
  • 68 - Trainer Knowledge Share Video
  • 69 - Exercise 1 Detect Web Application Vulnerabilities
  • 70 - Exercise 2 Monitor Devices for Vulnerabilities
  • 71 - Interview Questions and Answers.html
  • 72 - Information Tips.html
  • 73 - Security Assessments and Tools Lecture
  • 74 - Conduct a Software Vulnerability Scan Using AlienVault
  • 75 - Conduct a Software Vulnerability Scan using Nessus
  • 76 - Review a Template Incident Response Documentation

  • 15 - Monitoring Computing Resources
  • 77 - Introduction Monitoring Computing Resources
  • 78 - Exercise 1 Monitoring Device Resource Utilization
  • 79 - Interview Questions and Answers.html

  • 16 - Enhancing Enterprise Security
  • 80 - Trainer Knowledge Share Video
  • 81 - Introduction Enhancing Enterprise Security
  • 82 - Exercise 1 Linux Server Hardening Techniques
  • 83 - Exercise 2 Windows Server Hardening Techniques

  • 17 - Implement Identity Access Management
  • 84 - Trainer Knowledge Share Video
  • 85 - Introduction Implement Identity Access Management
  • 86 - Exercise 1 Provisioning User Accounts on a Microsoft Server
  • 87 - Exercise 2 Provisioning User Accounts on a Linux Server

  • 18 - Implementation of Automation Orchestration for Security Operations
  • 88 - Trainer Knowledge Share Video
  • 89 - Introduction Implementation of Automation Orchestration for Security Operation
  • 90 - Exercise 1 Creating Automation Scripts

  • 19 - Investigative Data Sources
  • 91 - Trainer Knowledge Share Video
  • 92 - Introduction Investigative Data Sources
  • 93 - Exercise 1 Log File Analysis

  • 20 - Cloud and Security
  • 94 - Information Tips.html
  • 95 - Introductory Lecture Securing Cloud Infrastructure Resources
  • 96 - Encrypt an Azure VM OS and Data Disks
  • 97 - Investigating AWS Artifact
  • 98 - Security Groups in AWS
  • 99 - Next Course to take.html
  • 100 - Bonus Lecture
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38294
    حجم: 6559 مگابایت
    مدت زمان: 699 دقیقه
    تاریخ انتشار: 19 تیر 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید