وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Core Cyber Security Concepts

سرفصل های دوره

1. Attacks, Threats and Vulnerabilities
  • 1.1 1.Contrast & Compare Information Security Roles - CompTIA Security+ Attacks, Threats and Vulnerabilities.pdf
  • 1. Compare and Contrast Information Security Roles
  • 2.1 2.Compare and Contrast Security Controls and Framework Types.pdf
  • 2.2 How To Use (And Not Use) The NIST CSF.html
  • 2. Compare and Contrast Security Controls and Framework Types
  • 3.1 3.Types of Threat Actors and Attack Vectors.pdf
  • 3. Types of Threat Actors and Attack Vectors
  • 4.1 4.Threat Intelligence & Threat research Sources.pdf
  • 4. Threat Intelligence & Threat Research
  • 5.1 5. Commands used in Assessing Network layout & Security.pdf
  • 5. Commands used in Assessing Network layout & Security
  • 6.1 6. Security concerns regarding Vulnerabilities.pdf
  • 6. Security concerns regarding Vulnerabilities
  • 7.1 7.Vulnerability Scanning Techniques and Vulnerability scores & exposures.pdf
  • 7. Vulnerability Scanning Techniques and Vulnerability scores & exposures
  • 8.1 9.Social Engineering Attacks & Principles.pdf
  • 8. Social Engineering Attacks & Principles
  • 9.1 10.Malware and Types of malwares.pdf
  • 9. Malware and Types of malwares

  • 2. Overview of Penetration Testing
  • 1. Penetration Testing Concepts
  • 2.1 8.Penetration Testing Concepts in detail.pdf
  • 2. Information gathering
  • 3. Scanning
  • 4. Exploitation
  • 5. Post Exploitation Maintaining access
  • 6. Reporting

  • 3. Architecture and Design
  • 1.1 1.Encryption, Cryptography it's types and Cryptographic algorithms.pdf
  • 1. Encryption, Cryptography, types of Cryptography and Cryptographic algorithms
  • 2.1 2. Digital Signatures & Digital Certificates.pdf
  • 2. Digital Signatures & Digital Certificates
  • 3.1 3. Digital certificate Authorities.pdf
  • 3. Digital Certificate Authorities
  • 4.1 4. Public Key Infrastructure - PKI.pdf
  • 4. Public Key Infastructure
  • 5.1 5. PKI Management.pdf
  • 5. PKI Management
  • 6.1 6.Identification, Authentication & Access Control Systems.pdf
  • 6. Identification, Authentication & Access Control Systems
  • 7. Knowledge based Authentication
  • 8.1 8. Technology implementing Secure Authentication.pdf
  • 8. Technology behind Secure Authentication
  • 9.1 9. Biometric Authentication Concepts.pdf
  • 9. Biometric Authentication

  • 4. Implementation
  • 1. Wireless Networks & Security Controls
  • 2.1 11. Identity Management Controls.pdf
  • 2. Identity Management Controls
  • 3.1 Cloud, Virtualization, BYOD and Security Testing.pdf
  • 3. Cloud, Virtualization, BYOD & Security Testing
  • 4.1 Implementing Personnel Policies.pdf
  • 4. Implementing Personnel Policies
  • 5.1 12.Implementing Account Policies & Authorization Solutions.pdf
  • 5. Account Policies & Authorization

  • 5. Operations and Incident Response
  • 1.1 Incident Management.pdf
  • 1. Incident Management
  • 2.1 Digital Forensics.pdf
  • 2. Digital Forensics

  • 6. Governance, Risk and Compliance
  • 1.1 Information Security Governance.pdf
  • 1. Information Security Governance
  • 2.1 Information Security Programs.pdf
  • 2. Information Security programs
  • 3.1 Risk Management.pdf
  • 3. Risk Management
  • 179,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 9019
    حجم: 2831 مگابایت
    مدت زمان: 284 دقیقه
    تاریخ انتشار: ۱۱ فروردین ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    179,000 تومان
    افزودن به سبد خرید