وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Implementation of Secure Solutions for CompTIA Security+

سرفصل های دوره

This course will teach you the fundamentals and key concepts around secure protocols, hardware and software technologies, and various use cases to illustrate how they function to keep a company’s assets and data secure.


1. Course Overview
  • 1. Course Overview

  • 02. Implementing Secure Protocols
  • 01. Module Intro
  • 02. Networking Protocols and TCP Three-way Handshake
  • 03. DNSSEC
  • 04. SSH
  • 05. SMIME
  • 06. Secure Real-Time Transport Protocol (SRTP)
  • 07. Lightweight Directory Access Protocol over SSL (LDAPS)
  • 08. FTPS and SFTP
  • 09. SNMP v3
  • 10. SSLTLS
  • 11. HTTPS
  • 12. Secure POPIMAP
  • 13. Use Cases
  • 14. Module Review

  • 03. Understanding Host or Application Security Solutions
  • 01. Module Overview
  • 02. Antivirus
  • 03. Endpoint Detection and Response (EDR)
  • 04. Data Loss Prevention (DLP)
  • 05. Next-generation Firewall (NGFW)
  • 06. HIDSHIPS
  • 07. Host-based Firewall
  • 08. Boot Loader Protections and Secure Boot
  • 09. Measured Launch
  • 10. Integrity Measurement Architecture (IMA)
  • 11. BIOSUEFI
  • 12. Hashing
  • 13. Salt
  • 14. Secure Coding Techniques
  • 15. Code Quality and Testing
  • 16. Static Code Analysis
  • 17. Fuzzing
  • 18. Additional Secure Coding Concepts
  • 19. Peripherals Security
  • 20. Hardening the Environment
  • 21. Common Ports
  • 22. Registry Hardening
  • 23. Self-encrypting Drives (SED)
  • 24. Hardware Root of Trust
  • 25. Hardware Based Encryption
  • 26. Sandboxing

  • 04. Implementing Secure Network Designs Part 1
  • 01. Module Overview
  • 02. Load Balancers
  • 03. Security Segmentation Models
  • 04. Virtualization
  • 05. Air Gaps
  • 06. East-west Traffic
  • 07. Zero Trust
  • 08. VPN
  • 09. Split Tunnel
  • 10. IPSec and Transport Encryption
  • 11. VPN Concentrator
  • 12. DNSSEC
  • 13. Network Access Control (NAC)
  • 14. In-band vs. Out-of-band Management
  • 15. Port Security and 802.1x
  • 16. Loop Protection and Flood Guards
  • 17. Spanning Tree Protocol (STP)
  • 18. DHCP Snooping
  • 19. MAC Filtering
  • 20. Module Review

  • 05. Implementing Secure Network Designs Part 2
  • 01. Module Overview
  • 02. Jump Server
  • 03. Proxies
  • 04. Web Security Gateways
  • 05. Intrusion Detection and Prevention
  • 06. IDSIPS Component Workflow
  • 07. Four Approaches to IDS
  • 08. Network-based IDS
  • 09. Security Device Placement
  • 10. Firewalls
  • 11. Web Application Firewalls
  • 12. Unified Threat Management (UTM)
  • 13. Content Filters
  • 14. Implicit Deny and ACLs
  • 15. Route Security
  • 16. Quality of Service (QoS)
  • 17. Implications of IPv6
  • 18. Port Mirroring, Port Spanning, and Port Taps
  • 20. Module Review

  • 06. Installing and Configuring Wireless Security Settings
  • 01. Module Review
  • 02. Wireless Definitions
  • 03. WEPWPAWPA2
  • 04. WPA and WPA2 Security
  • 05. WPA3
  • 06. Wireless Security Examples
  • 07. Wireless Security and Pen Testing Tools
  • 08. EAP, PEAP, and LEAP
  • 09. 802.11x Wireless Protocols
  • 10. RADIUS Federation
  • 11. Wi-Fi Protected Setup (WPS)
  • 12. Captive Portal
  • 13. Installation Considerations
  • 14. Access PointsWi-Fi Security
  • 15. Band SelectionWidth
  • 16. Fat vs. Thin Access Points and Stand-alone vs. Controller-based
  • 17. Module Review

  • 07. Implementing Secure Mobile Solutions
  • 01. Module Overview
  • 02. Cellular
  • 03. Securing Wi-Fi
  • 04. Near Field Communication (NFC)
  • 05. Additional Areas of Concern
  • 06. MicroSD HSM
  • 07. Mobile Device Management (MDM, MAM, and UEM)
  • 08. SEAndroid
  • 09. Device Security
  • 10. Application Security and Key Credential Management
  • 11. Authentication
  • 12. Geo-tagging
  • 13. Context-aware Authentication
  • 14. Enforcement and Monitoring
  • 15. BYOD Concerns and Deployment Models
  • 16. Additional BYOD Concerns
  • 17. Module Review

  • 08. Applying Cybersecurity Solutions to the Cloud
  • 01. Module Intro
  • 02. High Availability
  • 03. Resource Policies
  • 04. Secrets Management
  • 05. Storage in the Cloud
  • 06. Virtual Networks
  • 07. API Inspection and Integration
  • 08. Growth of Enterprise Cloud Application
  • 09. Cyber Kill Chain in the Cloud
  • 10. Compute in the Cloud
  • 11. Cloud Access Security Broker (CASB)
  • 12. Application Security
  • 13. Next-gen Secure Web Gateway (NG-SWG)
  • 14. Firewall Considerations in a Cloud Environment
  • 15. TCPIP and OSI Models
  • 16. Application Layer, Protocol Layer, and Volumetric Attacks
  • 17. Cost
  • 18. Cloud Native Controls vs. Third-party Solutions

  • 09. Implementing Identity and Account Management Controls
  • 01. Module Review
  • 02. Identity Provider (IdP)
  • 03. IdP Example
  • 04. Certificates, Tokens, and SSH Keys
  • 05. Certificate Issues
  • 06. Smart Cards
  • 07. User Accounts
  • 08. Account Management
  • 09. Password Complexity
  • 10. Password History
  • 11. Password Reuse
  • 12. Time of Day Restrictions
  • 13. User Access Best Practices
  • 14. Permissions Auditing and Review
  • 15. Recertification
  • 16. Group Policy
  • 17. Expiration
  • 18. Recovery
  • 19. Impossible TravelRisky Login
  • 20. Lockout
  • 21. Disablement
  • 22. Module Review

  • 10. Implementing Authentication and Authorization Solutions
  • 01. Module Overview
  • 02. Authentication Management
  • 03. Extensible Authentication Protocol (EAP)
  • 04. Challenge Handshake Authentication Protocol (CHAP)
  • 05. Password Authentication Protocol (PAP)
  • 06. Port Security and 802.1x Authentication
  • 07. RADIUS
  • 08. Single Sign-on (SSO)
  • 09. SAML
  • 10. TACACS
  • 11. TACACS+
  • 12. oAUTH
  • 13. OpenID and Shibboleth
  • 14. Kerberos
  • 15. Attribute Based Access Control (ABAC)
  • 16. Rule-basedRole-based Access Control (RBAC)
  • 17. Access Control Methods
  • 18. Mandatory Access Control (MAC)
  • 19. Discretionary Access Control (DAC)
  • 20. Conditional Access
  • 21. Privileged Accounts
  • 22. Filesystem Permissions

  • 11. Implementing Public Key Infrastructure
  • 01. Module Overview
  • 02. Certificate Authorities and Digital Certificates
  • 03. Certificate Authority
  • 04. CRLs
  • 05. OCSP
  • 06. CSR and PKCS Standards
  • 07. PKI
  • 08. Public Key
  • 09. Private Key
  • 10. Object Identifiers (OID)
  • 11. Types of Certificates
  • 12. Certificate Formats
  • 13. Online vs. Offline Certificate Authority (CA)
  • 14. Stapling and Pinning
  • 15. Trust Models
  • 16. Key Escrow
  • 17. Certificate Chaining
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 5773
    حجم: 685 مگابایت
    مدت زمان: 373 دقیقه
    تاریخ انتشار: 20 بهمن 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید