وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

(ISC)² CC Online Training

سرفصل های دوره

This entry-level (ISC)² CC training prepares learners to perform the basic and essential tasks of an entry-level cybersecurity analyst without supervision or guidance.

(ISC)2 is already one of the most respected professional organizations in the IT training world for cybersecurity professionals who need to demonstrate their competency with advanced security techniques and technologies. Their new Certified in Cybersecurity certification is an ideal starting point for someone early in their career.


1. Understanding Information Assurance
  • 1. Understanding Information Assurance -
  • 2. Methods of Authentication -
  • 3. Multi-Factor Authentication (MFA) -
  • 4. Biometrics Factors -
  • 5. Data Privacy - -1

  • 2. Discussing Risk Management, Controls, Ethics and Governance
  • 1. Risk Management -
  • 2. Risk Treatment -
  • 3. Security Controls -
  • 4. Security Control Categories - -1
  • 5. ISC2 Code of Ethics -
  • 6. Policies and Procedures -
  • 7. Standards, Regulations and Laws -

  • 3. Exploring BC, DR & IR Concepts
  • 1. Intro -
  • 2. Business Continuity -
  • 3. Business Continuity Planning -
  • 4. Disaster Recovery -
  • 5. Disaster Recovery Planning -
  • 6. Incident Response -
  • 7. After Action and Training -

  • 4. Reviewing Access Control Concepts
  • 1. Physical Security Controls -
  • 2. Monitoring Controls -
  • 3. Authorized Personnel vs Unauthorized Personnel -
  • 4. Principle of Least Privilege -
  • 5. Segregation of Duties - -1
  • 6. Types of Access Control -
  • 7. Data and Media Access Control -

  • 5. Exploring Security Policies and Training
  • 1. Data Handling Policy -
  • 2. Password Policy -
  • 3. Acceptable Use Policy -
  • 4. Bring Your Own Device (BYOD) Policy -
  • 5. Change Management Policy -
  • 6. Privacy Policy -
  • 7. Security Awareness Training -

  • 6. Understanding Data Security and System Hardening
  • 1. Encryption Basics -
  • 2. Types of Encryption -
  • 3. Data Hashing with Encryption -
  • 4. Digital Signatures with Hashing -
  • 5. Data Handling -
  • 6. Data Logging -
  • 7. Configuration Management -

  • 7. Discussing Network Security Infrastructure
  • 1. Network Segmentation - -1
  • 2. Embedded System Security -
  • 3. Virtual Private Networks (VPNs) -
  • 4. Defense In Depth and Zero Trust - -1
  • 5. Network Access Control (NAC) -
  • 6. SLAs and MSPs -
  • 7. The Cloud -

  • 8. Exploring Network Threats and Attacks
  • 1. Types of Threats - DoS, DDoS and Malware -
  • 2. Types of Threats - Main-in-the-middle and Side Channel -
  • 3. Intrusion Detection Prevention Systems (IDSIPS) -
  • 4. Endpoint Protection and Management -
  • 5. Vulnerability Scanning -
  • 6. Firewalls -

  • 9. Understanding Computer Networking
  • 1. Computer Networking Basics -
  • 2. OSI Model -
  • 3. TCPIP Model -
  • 4. IP Addresses -
  • 5. Wireless Networking -
  • 6. Networking Ports -
  • 7. Common Applications -

  • 10. Exploring On-Premise Network Infrastructure
  • 1. Power -
  • 2. Data Centers and Closets -
  • 3. Heating, Ventilation and Air Conditioning (HVAC)
  • 4. Dealing with Fire -
  • 5. Redundancy -
  • 6. Working with 3rd Parties -
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 17454
    حجم: 2026 مگابایت
    مدت زمان: 505 دقیقه
    تاریخ انتشار: 13 مرداد 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید