وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ SY0-701 with Cloud and Data Center

سرفصل های دوره

Prepare for CompTIA Security+ SY0-701 and Explore Cisco, F5, Linux, and AWS Technologies.


1. Introduction
  • 1. Course Introduction
  • 2. About the Course
  • 3. About the Instructor
  • 4. Motivation
  • 5. Course Flow
  • 6. Updates

  • 2. CompTIA Security+ SY0-701 Lab
  • 1. CompTIA Security+ SY0-701 Lab Overview
  • 2. Security+ Lab Guides

  • 3. Security Basics
  • 1. Security Basics Overview
  • 2. CIA Triage
  • 3. Confidentiality
  • 4. Integrity
  • 5. Availability
  • 6. Risk and Security Controls
  • 7. Managerial Controls
  • 8. Operational Controls
  • 9. Technical Controls
  • 10. Preventive Controls
  • 11. Detective Controls
  • 12. Corrective and Recovery Controls
  • 13. Deterrent Controls
  • 14. Compensating Controls
  • 15. Response Controls

  • 4. Network Fundamentals (Cisco Switches, Cisco Routers)
  • 1. Network Fundamentals Overview
  • 2. Connectivity Basics
  • 3. MAC Learning
  • 4. Intranet vs Extranet
  • 5. OSI Model
  • 6. Demo 1 - MAC Address.html
  • 7. IP Addressing
  • 8. Subnetting
  • 9. TCPIP Model
  • 10. Point to point networks
  • 11. Netmask
  • 12. Routed Ports
  • 13. Demo 2 - IP Adressing.html
  • 14. IPv4 vs IPv6
  • 15. UDP
  • 16. TCP
  • 17. Virtual LAN (VLAN)
  • 18. 802.1Q
  • 19. Default Gateway
  • 20. Inter VLAN Communication
  • 21. Network Segmentation
  • 22. Demo 3 - VLANs.html
  • 23. Routing
  • 24. Static Routes
  • 25. NAT
  • 26. Demo 4 - Routing.html
  • 27. Zero Trust

  • 5. Network and Application Use Cases
  • 1. Network and Application Use Cases Overview
  • 2. TCP and UDP Applications
  • 3. Active FTP
  • 4. Passive FTP
  • 5. Demo 1 - FTP and TFTP.html
  • 6. Email
  • 7. Web - HTTP Basics
  • 8. Web - HTTP Connections
  • 9. Web - Development Stack
  • 10. Demo 2 - Web.html
  • 11. Telnet
  • 12. SSH
  • 13. Demo 3 - Telnet and SSH.html
  • 14. NTP
  • 15. Dynamic Host Configuration Protocol (DHCP)
  • 16. Demo 4 - DHCP and DNS.html

  • 6. Network Security Solutions
  • 1. Network and Security Solutions Overview
  • 2. Ethernet Switches
  • 3. Securing Switches with Port Security
  • 4. Securing Switches with DHCP Snooping
  • 5. Demo 1 - Securing Ethernet Switches.html
  • 6. Routers
  • 7. Securing Routers with ACL
  • 8. Router ACL in Action
  • 9. Demo 2 - Securing Routers.html
  • 10. Firewalls
  • 11. Stateless Firewall
  • 12. Stateful Firewall
  • 13. Demo 3 - Stateless vs Stateful Firewalls.html
  • 14. IPS
  • 15. IDS
  • 16. Cisco Firepower Basics
  • 17. Cisco Firepower Malware Protection
  • 18. Demo 4 - Cisco Firepower Basics.html
  • 19. Demo 5 - Cisco Firepower Configuration.html
  • 20. Forwarding Proxy
  • 21. Reverse Proxy
  • 22. Load Balancer
  • 23. F5 BIG-IP Basics
  • 24. Demo 6 - F5 BIG-IP Basics.html
  • 25. Web Application Firewall (WAF)
  • 26. F5 BIG-IP ASMWAF Basics
  • 27. Demo 7 - F5 BIG-IP ASMWAF Basics.html
  • 28. SD-WAN

  • 7. Network Security Use Cases (Cisco Switches, Routers Firewalls)
  • 1. Network Security Overview
  • 2. Demo 1 - Cisco Firepower NGFW vs NGIPS.html
  • 3. Switch Loop Prevention
  • 4. Securing Switch Loop Prevention
  • 5. Demo 2 - Securing Switch Loop Prevention.html
  • 6. VPN Basics
  • 7. Site-Site VPN
  • 8. Demo 3- Site-Site VPN.html
  • 9. Remote Access VPN
  • 10. SSLTLS VPN
  • 11. Split Tunnel vs Full Tunnel
  • 12. Other Tunnels and VPNs
  • 13. Demo 4 - Remote Access VPN.html
  • 14. 802.1X
  • 15. AAA Server
  • 16. Network Access Control (NAC)
  • 17. NAC Health Checks
  • 18. AAA-enabled NAC
  • 19. Remote VPN AAA
  • 20. Demo 5 - Remote VPN AAA.html

  • 8. Wireless Security
  • 1. Wireless Security Overview
  • 2. Wireless Basics
  • 3. Wireless SSID
  • 4. Wireless Solutions
  • 5. Demo 1 - Wireless Solutions.html
  • 6. Wireless Authentication
  • 7. Captive Portal

  • 9. Network and Security Command-Line Tools (Linux)
  • 1. Network and Security Command-Line Tools Overview
  • 2. Linux Basics
  • 3. Basic Linux Commands
  • 4. Demo 1 - Basic Linux Commands.html
  • 5. Linux Network Tools
  • 6. Demo 2 - Linux Network Tools.html
  • 7. Common Linux Services
  • 8. Reconnaissance and Discovery
  • 9. Demo 3 - Reconnaissance and Discovery.html
  • 10. Linux Web Dev Stack
  • 11. Linux File System
  • 12. Centralized Logging

  • 10. Endpoint Security
  • 1. Endpoint Security Overview
  • 2. Virtualization
  • 3. Hypervisors
  • 4. Virtualization Features
  • 5. VMs vs Containers
  • 6. Containerization
  • 7. Protecting Host Data
  • 8. Securing Internet of Things (IoT)
  • 9. Securing Embedded System

  • 11. Cloud Security
  • 1. Cloud Security Overview
  • 2. Cloud Computing Basics
  • 3. Cloud Deployment Models
  • 4. Cloud Security Controls
  • 5. Cloud Components
  • 6. Hybrid Cloud
  • 7. Cloud Security Organizations
  • 8. AWS Basics
  • 9. AWS Instances
  • 10. AWS Infrastructure
  • 11. Demo 1 - AWS Account Creation.html
  • 12. AWS Network Access Control List (NACL)
  • 13. AWS Security Groups
  • 14. Demo 2 - AWS EC2
  • 15. AWS Load Balancer
  • 16. Demo 3 - AWS ELB
  • 17. AWS Web Application Firewall
  • 18. Demo 4 - AWS WAF
  • 19. Demo 5 - AWS Threat Detection.html

  • 12. Identity and Access Management (IAM)
  • 1. Identity and Access Management (IAM) Overview
  • 2. Identification and AAA
  • 3. Something you know
  • 4. Something you have
  • 5. Something you are
  • 6. 2FA and MFA
  • 7. Managing Accounts
  • 8. Authentication Services
  • 9. Role Based Access Control (RBAC)
  • 10. Access Control Scheme
  • 11. Demo - AWS User Creation.html
  • 12. AWS Password Policy
  • 13. Demo - AWS Password Policy.html
  • 14. Demo - AWS RBAC.html
  • 15. Demo - AWS MFA.html

  • 13. Threats, Vulnerabilities and Attacks
  • 1. Threats vs Vulnerabilities and Attacks Overview
  • 2. Threat Actors
  • 3. Malware
  • 4. Types of Malware
  • 5. Ransomware and Cryptomalware
  • 6. Social Engineering
  • 7. Effectiveness of Social Engineering
  • 8. Email Attack
  • 9. Phone Attack

  • 14. Advanced Attacks
  • 1. Advanced Attacks Overview
  • 2. Cyber Kill Chain
  • 3. Cyber Kill Chain in Action
  • 4. Network Attacks
  • 5. OWASP
  • 6. Web Application Attacks
  • 7. Secure Coding on Web Vulnerabilities
  • 8. Advanced Web Application Attacks
  • 9. Secure Coding on Advanced Web Vulnerabilities

  • 15. Security Risks
  • 1. Security Risks Overview
  • 2. Risk Management
  • 3. Frameworks and Standards
  • 4. Threat Hunting
  • 5. Bug Bounty
  • 6. Bug Bounty in Action

  • 16. Security Controls
  • 1. Security Controls Overview
  • 2. Doors and Locks
  • 3. Physical Attacks
  • 4. Redundancy and Fault Tolerance
  • 5. Server Redundancy
  • 6. Network Redundancy

  • 17. Security Policies
  • 1. Security Policies Overview
  • 2. Corporate Security Policies
  • 3. Incident Response Policies
  • 4. Data Governance
  • 5. Security Training
  • 6. Security Awareness

  • 18. Completion
  • 1. Wrap Up
  • 2. Moving On
  • 3. Message from the Instructor
  • 4. Course Completion
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38720
    حجم: 13069 مگابایت
    مدت زمان: 931 دقیقه
    تاریخ انتشار: 29 تیر 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید