وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Fundamental Cloud Security Online Training

سرفصل های دوره

This entry-level Fundamental Cloud Security training prepares learners to provide protection to your cloud network's assets with a fundamental understanding of security in the cloud.

There are many different ways to get to the cloud and each vendor or service provider has their own security tools and features to consider. But the fundamentals of cloud network security are universal, no matter what vendor or service gets you onto the cloud.

  • 1. Cloud Security and Compliance
  • 2. Threats and Vulnerabilities
  • 3. Proactive Security Scanning
  • 4. Data Security
  • 5. Application and Infrastructure Security
  • 6. Compliance Standards and Certifications
  • 7. Plan for Cloud Cybersecurity
  • 8. Security Patterns and Controls
  • 9. Cloud Storage Security
  • 10. Cloud Network Security
  • 11. Cloud Compute Security
  • 12. Cloud Security Solutions
  • 13. Intro to Digital Certificates and the PKI
  • 14. Symmetrical vs Asymmetrical Encryption
  • 15. Digital Certificates Overview
  • 16. Digital Signatures
  • 17. Creating an HTTPS Session Key
  • 18. Public Key Infrastructure
  • 19. Quiz and Review
  • 20. Intro to Secure Network Design
  • 21. Network Segmentation
  • 22. Network Firewalls
  • 23. ACL Case Study
  • 24. Load Balancing
  • 25. Virtual private network (VPN)
  • 26. Layer 2 Security
  • 27. Network-based IDSIPS
  • 28. Quiz and Review
  • 29. Intro to Secure Protocols
  • 30. IPsec and VPNs
  • 31. Secure Shell (SSH)
  • 32. Domain Name System (DNS)
  • 33. HTTPS
  • 34. Weak Protocols
  • 35. IP Addressing and Routing
  • 36. Email Protocols
  • 37. LDAP
  • 38. SNMP, NTP, & SRTP
  • 39. Quiz and Review
  • 40. Intro to Host and App Security
  • 41. Device Hardening
  • 42. Boot integrity
  • 43. Local Endpoint Protection
  • 44. Network Based Protection
  • 45. Secure Applications
  • 46. Quiz and Review
  • 47. Scanning, Monitoring & Patching Scanning Overview
  • 48. Scanning, Monitoring & Patching Network Scanning Methodology
  • 49. Scanning, Monitoring & Patching Port Scanning and Discovery
  • 50. Scanning, Monitoring & Patching OS Discovery and Fingerprinting
  • 51. Scanning, Monitoring & Patching Motivators for Vulnerability Management
  • 52. Scanning, Monitoring & Patching Vulnerability Scanning
  • 53. Scanning, Monitoring & Patching Logging and Review
  • 54. Scanning, Monitoring & Patching Packet and Traffic Analysis
  • 55. Scanning, Monitoring & Patching Packet Capture and Analysis Lab
  • 56. Scanning, Monitoring & Patching Remediation and Patch Management
  • 57. Scanning, Monitoring & Patching Network Scanning with NMAP and Zenmap Lab
  • 58. Scanning, Monitoring & Patching Baselines
  • 59. Plan for Cloud Governance
  • 60. Risk Management
  • 61. Resource Management
  • 62. Vendor Lock-In and Data Portability
  • 63. Documentation
  • 64. Policies and Procedures
  • 65. Dealing with Prohibited Activities
  • 66. Incident Response
  • 67. The Chain of Custody
  • 68. Software Licensing
  • 69. Sensitive Data
  • 70. Identifying an Incident
  • 71. Containing and Mitigating an Outbreak
  • 72. Forensic Data Collection
  • 73. Forensics In the Cloud
  • 74. Forensic Evidence Management
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    مدرس:
    شناسه: 6700
    حجم: 81686 مگابایت
    مدت زمان: 645 دقیقه
    تاریخ انتشار: 8 اسفند 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید