وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

ISC2 CISSP Full Course & Practice Exam

سرفصل های دوره

Pass the ISC2 CISSP exam on your 1st attempt, includes a full practice exam!


1 - Introduction
  • 1 - Introduction
  • 2 - CISSP-Study-Plan.pdf
  • 2 - Download your free study guide.html
  • 2 - ISC2-CISSP-Study-Guide.pdf
  • 3 - Exam Tips

  • 2 - Security Management Concepts
  • 4 - Security Management Concepts
  • 5 - Code of Ethics OBJ 11
  • 6 - Information Security Concepts OBJ 12
  • 7 - Aligning Security And The Organization OBJ 13
  • 8 - Organizational Roles and Responsibilities OBJ 13
  • 9 - Security Awareness Training And Education OBJ 112
  • 10 - Social Engineering OBJ 112
  • 11 - Personnel Security Policies OBJ 18
  • 12 - Personnel Safety and Security OBJ 715

  • 3 - Security Governance and Compliance
  • 13 - Security Governance and Compliance
  • 14 - Due Care and Due Diligence OBJ 13
  • 15 - Important Laws and Regulations OBJ 14
  • 16 - Licensing and Property Rights OBJ 14
  • 17 - Export and Import Controls OBJ 14
  • 18 - Cybercrime And Data Breaches OBJ 14
  • 19 - Determine Compliance Requirements OBJ 14
  • 20 - Security Compliance Artifacts OBJ 16

  • 4 - Risk Management
  • 21 - Risk Management
  • 22 - Risk Management Concepts OBJ 19
  • 23 - Risk Response And Monitoring OBJ 19
  • 24 - Controls and Countermeasures OBJ 19
  • 25 - Continuous Monitoring OBJ 19 72
  • 26 - Supply Chain Risk Management OBJ 111

  • 5 - Risk Frameworks
  • 27 - Risk Frameworks
  • 28 - Risk Frameworks OBJ 19
  • 29 - NIST Cybersecurity Framework OBJ 19
  • 30 - ISOIEC 27001 OBJ 19
  • 31 - Understanding PCI DSS OBJ 19
  • 32 - Understanding SABSA OBJ 19

  • 6 - Risk Assessments
  • 33 - Risk Assessments
  • 34 - Understanding Risk Assessments OBJ 19
  • 35 - Conducting Risk Assessments OBJ 19
  • 36 - Control Assessments OBJ 19
  • 37 - Privacy Control Assessments OBJ 19
  • 38 - PCI DSS Assessments OBJ 19
  • 39 - Threat Modeling Concepts OBJ 110
  • 40 - Threat Modeling Methodologies OBJ 110

  • 7 - Asset Security
  • 41 - Asset Security
  • 43 - Information and Asset Handling Requirements OBJ 22
  • 44 - Managing System Assets OBJ 23
  • 45 - Data Roles And Responsibilities OBJ 24
  • 46 - Managing The Data Lifecycle OBJ 24
  • 47 - The Information System Lifecycle Part 1 OBJ 310
  • 48 - The Information System Lifecycle Part 2 OBJ 310

  • 8 - Data Security Controls
  • 49 - Data Security Controls
  • 50 - Understanding Data States OBJ 26 75
  • 51 - Security Control Frameworks OBJ 13
  • 52 - Determining Security Controls OBJ 26
  • 53 - Selecting Security Controls OBJ 26 33
  • 54 - Data Protection Methods OBJ 26
  • 55 - Data Retention Requirements OBJ 24
  • 56 - Managing Data Remanence OBJ 24

  • 9 - Secure Design Principles
  • 57 - Secure Design Principles
  • 58 - Understanding Secure Design OBJ 35
  • 59 - Secure Design Principles OBJ 31
  • 60 - Zero Trust Architecture OBJ 31 54
  • 61 - Privacy By Design OBJ 31
  • 62 - System Security Capabilities OBJ 34
  • 63 - Understanding Security Models OBJ 32
  • 64 - Security Models Part 1 OBJ 32
  • 65 - Security Models Part 2 OBJ 32

  • 10 - Secure Architecture Design
  • 66 - Secure Architecture Design
  • 67 - System Architectures OBJ 35
  • 68 - Database Systems OBJ 35
  • 69 - Common Criteria OBJ 35
  • 70 - Industrial Control Systems OBJ 35
  • 71 - Secure Access Service Edge OBJ 31
  • 72 - Internet of Things OBJ 35
  • 73 - Microservices OBJ 35
  • 74 - Embedded Systems OBJ 35
  • 75 - HighPerformance Computing OBJ 35
  • 76 - Edge Computing Systems OBJ 35

  • 11 - Virtualization and Cloud Computing
  • 77 - Virtualization and Cloud Computing
  • 78 - Virtualized Systems OBJ 35
  • 79 - Containerization OBJ 35
  • 80 - Cloud Deployment Models OBJ 35
  • 81 - Cloud Service Models OBJ 35
  • 82 - Shared Responsibility Model OBJ 35
  • 83 - Virtual Private Cloud OBJ 41
  • 84 - Serverless Computing OBJ 35

  • 12 - Cryptographic Solutions
  • 85 - Cryptographic Solutions
  • 86 - Understanding Cryptography OBJ 36
  • 87 - Cryptographic Methods OBJ 36
  • 88 - Symmetric Ciphers OBJ 36
  • 89 - Asymmetric Ciphers OBJ 36
  • 90 - Quantum Cryptography OBJ 36
  • 91 - Hash Functions OBJ 36
  • 92 - Cryptographic Key Management OBJ 36
  • 93 - Digital Signatures and Certificates OBJ 36
  • 94 - Public Key Infrastructure OBJ 36

  • 13 - Cryptanalytic Attacks
  • 95 - Cryptanalytic Attacks
  • 96 - Vulnerabilities In Cryptographic Systems OBJ 35
  • 97 - Cryptanalytic Attacks Part 1 OBJ 37
  • 98 - Cryptanalytic Attacks Part 2 OBJ 37
  • 99 - Cryptanalytic Attacks Part 3 OBJ 37

  • 14 - Physical Security
  • 100 - Physical Security
  • 101 - Site Design Principles OBJ 38
  • 102 - Facility Design Principles OBJ 39
  • 103 - Facility Security Controls OBJ 39
  • 104 - Facility Infrastructure Security OBJ 39
  • 105 - Fire Prevention Detection and Suppression OBJ 39
  • 106 - Physical Security Controls OBJ 714

  • 15 - Network Components
  • 107 - Network Components
  • 108 - Hardware Operations OBJ 42
  • 109 - Network Infrastructure Operations OBJ 42
  • 110 - Transmission Media Part 1 OBJ 42
  • 111 - Transmission Media Part 2 OBJ 42
  • 112 - Network Monitoring OBJ 41

  • 16 - Networking Concepts
  • 113 - Networking Concepts
  • 114 - TCPIP and OSI Models OBJ 41
  • 115 - IP Networking OBJ 41
  • 116 - LAN Communications OBJ 41
  • 117 - Communication Protocols OBJ 41
  • 118 - Multilayer Protocols OBJ 41
  • 119 - Converged Protocols OBJ 41
  • 120 - Data Communications OBJ 43
  • 121 - Virtualized Networks OBJ 43

  • 17 - Network Architectures
  • 122 - Network Architectures
  • 123 - Content Distribution Networks OBJ 41
  • 124 - Software Defined Networks OBJ 41
  • 125 - Application Programming Interfaces OBJ 41
  • 126 - Network Functions Virtualization OBJ 41

  • 18 - Secure Network Design
  • 127 - Secure Network Design
  • 128 - Transport Architecture OBJ 41
  • 129 - Performance Metrics OBJ 41
  • 130 - Network Traffic Flows OBJ 41
  • 131 - Physical Network Segmentation OBJ 41
  • 132 - Logical Network Segmentation OBJ 41
  • 133 - MicroSegmentation OBJ 41
  • 134 - Edge Networks OBJ 41
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 45180
    حجم: 7994 مگابایت
    مدت زمان: 1314 دقیقه
    تاریخ انتشار: ۱۰ تیر ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید