وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Linux Professional Institute Security Essentials (020-100) Online Training

سرفصل های دوره

1.Goals Roles and Actors
  • 1.Course Introduction1C30C
  • 2.IT Goal Making Resources Available1C30C
  • 3.IT Goal Making Resources Secure1C30C
  • 4.Four Pillars of Security1C30C
  • 5.Common Hacker Goals1C30C
  • 6.Types of Hackers1C30C
  • 7.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-Anonymous Hacking Group.txt

  • 2.Risk Assessment and Management
  • 1.Zero-Day and Bug Bounty 1C30C
  • 2.Privilege Escalation1C30C
  • 3.1C30C
  • 4.Privilege Escalation Demo1C30C
  • 5.1C30C
  • 6.Penetration Testing1C30C
  • 7.ISMS IRPs and CERT1C30C
  • 8.1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-APTs by Nation-State Actors.txt
  • saved url-Analysis of drive-by malware.txt
  • saved url-Atomic Wallet 1 Million Dollar Bounty.txt
  • saved url-Bounty Earnings.txt
  • saved url-Carnegie Mellon Official CERT Page.txt
  • saved url-Common APTs.txt
  • saved url-Drive-by Download.txt
  • saved url-Introduction to Bug Bounty.txt
  • saved url-NIST Vulnerability Database.txt
  • saved url-Original CVE Site from Mitre.txt
  • saved url-What is a CERT .txt

  • 3.Ethical Behavior
  • 1.Intro IT Access and Responsibility1C30C
  • 2.Case Study Edward Snowden1C30C
  • 3.Personal and Private Data1C30C
  • 4.Web Data Visibility1C30C
  • 5.Regulatory Compliance1C30C
  • 6.Example of Data Breach Disclosure1C30C
  • 7.Your Data on Social Media1C30C
  • 8.Handling Potentially Illegal Information1C30C
  • 9.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • Question 13-question.txt
  • saved url-Edward Snowden Data Leak.txt
  • saved url-Edward Snowden Interview.txt
  • saved url-Ten Things to Know About Instagrams TOS.txt
  • saved url-Who Owns Your Content and How Can it Be Used .txt

  • 4.Implement Encryption
  • 1.Describe Encryption and its Use1C30C
  • 2.Encrypt Data at Rest1C30C
  • 3.Encrypt Data in Transit1C30C
  • 4.Data in Use1C30C
  • 5.Validation1C30C
  • 17.zip
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-A Robot Stealing Data from RAM.txt
  • saved url-Cryptomator.txt
  • saved url-How Hackers Scrape RAM.txt
  • saved url-Keepass Weakness.txt
  • saved url-VeraCrypt Disk Encryption.txt
  • saved url-Windows 11.txt

  • 5.Encryption Types and Protocols
  • 1.The Symmetric Encryption Concept1C30C
  • 2.The Case for Symmetric Encryption1C30C
  • 3.Symmetric Encryption Details1C30C
  • 4.Symmetric Encryption Algorithms1C30C
  • 6.Perfect Forward Secrecy1C30C
  • 7.RSA and ECC Encryption Algorithms1C30C
  • 8.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-How AES Works.txt
  • saved url-How Secure is AES Against Brute Force.txt
  • saved url-The AES Symmetric Block Cipher.txt
  • saved url-Understanding the Diffie Helman Key Exchange Process.txt

  • 6.Public Key Infrastructure (PKI)
  • 1.Understanding PKI Operation1C30C
  • 2.Identifying and Extracting a Web Cert1C30C
  • 3.Handling Untrusted Certificates1C30C
  • 4.Certificate Signing Requests1C30C
  • 5.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • saved url-Test various types of web certs.txt

  • 7.X.509 Web Certificates and Hashing
  • 1.X.509 Concepts and Fields1C30C
  • 2.Obtaining and Using Web Certificates1C30C
  • 3.How SSL TLS Operate1C30C
  • 4.Hash Data1C30C
  • 5.Compare Hashing and Encryption1C30C
  • 6.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-Get free 90-day certificates for your web server.txt
  • saved url-Instructions to install certs on your webserver.txt
  • saved url-Understanding the shadow file.txt
  • saved url-this site.txt
  • saved url-this site .txt

  • 8.Email Encryption and Signatures
  • 1.PGP and GPG Overview1C30C
  • 2.Configure Thunderbird for OpenPGP1C30C
  • 3.Encrypt and Sign Email with PGP1C30C
  • 4.Encrypt and Sign Email with S MIME1C30C
  • 5.Encryption and Gmail1C30C
  • 6.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-Actalis Italian.txt
  • saved url-FlowCrypt.txt
  • saved url-Free email certificate for S MIME.txt
  • saved url-PGP Encrypted email.txt
  • saved url-PGP Tool.txt
  • saved url-PGP Tool to issue keys.txt
  • saved url-Skiff encrypted email.txt

  • 9.Intro to PC Hardware
  • 1.1C30C
  • 2.Motherboard Overview1C30C
  • 3.Motherboard Diagram1C30C
  • 4.Motherboard Form Factors and BIOS1C30C
  • 5.Processors1C30C
  • 6.Memory (RAM)1C30C
  • 7.Hard Disk Drive Physical Characteristics1C30C
  • 8.Solid State Drive Characteristics1C30C
  • 9.Peripherals and Other Miscellaneous Devices1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • saved url-Motherboard Form Factors.txt

  • 10.Application and OS Sources
  • 1.Firmware and its Risks1C30C
  • 2.Mobile Software1C30C
  • 3.Jailbreaking Rooting and the Risks1C30C
  • 4.Securing Applications and Operating Systems1C30C
  • 5.1C30C
  • 6.Protection via Isolation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Apple policy on jailbreaking.txt
  • saved url-Windows Sandbox.txt

  • 11.Updates Common Vulnerabilities and Firewalls
  • 1.Update Mobile Devices1C30C
  • 2.Update Linux Devices1C30C
  • 3.Update Windows1C30C
  • 4.Buffer Overflow1C30C
  • 5.SQL Injection1C30C
  • 6.Implement Firewall Protection1C30C
  • 7.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • saved url-Windows 11.txt

  • 12.Malware
  • 1.Common Types of Malware Part 11C30C
  • 2.Common Types of Malware Part 21C30C
  • 3.Camera Microphone Hijacking1C30C
  • 4.Symptoms of Malware1C30C
  • 5.Understanding Virus and Malware Scanners1C30C
  • 6.Validation1C30C
  • 7.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Bonzi Buddy.txt
  • saved url-Caesars and MGM Ransomware Attack.txt
  • saved url-Microsoft Endpoint Protection.txt

  • 13.Data Availability
  • 1.Understand the Importance of Backups1C30C
  • 2.Recovery Point Objective and Recovery Time Objective1C30C
  • 3.1C30C
  • 4.Backup Location Strategy1C30C
  • 5.Backup Type Full1C30C
  • 6.1C30C
  • 7.Backup Type Differential1C30C
  • 8.Backup Type Incremental1C30C
  • 9.Backup Media and Drives1C30C
  • 10.Backup Security1C30C
  • 11.Backup Solutions1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-Dropbox Security.txt
  • saved url-Iron Mountain.txt
  • saved url-OneDrive Security.txt
  • saved url-Retention policy Dropbox.txt
  • saved url-Spectra Data Archive.txt
  • saved url-Tape Library.txt
  • saved url-Windows Server 2022.txt
  • saved url-iCloud Security.txt

  • 14.Networks and the Internet
  • 1.Network Equipment1C30C
  • 2.IP Basics1C30C
  • 3.Binary Subnet Masks1C30C
  • 4.Classful Subnet Masks and Private IP Addresses1C30C
  • 5.Routing Network Traffic1C30C
  • 6.Switch Traffic1C30C
  • 7.Validation1C30C
  • IP Addressing.txt
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt

  • 15.Protocols and Vulnerabilities
  • 1.TCP and UDP Vulnerabilities1C30C
  • 2.TCP and UDP Ports1C30C
  • 3.Other Common Protocol Vulnerabilities1C30C
  • 4.Validation1C30C
  • 5.Hands-On Lab or Other Video1C30C
  • 6.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • saved url-Open Ports and Their Vulnerabilities.txt

  • 16.DHCP DNS IPv6 and Cloud Computing
  • 1.Introduction1C30C
  • 2.Understanding DHCP1C30C
  • 3.Understanding DNS1C30C
  • 4.Forward and Reverse DNS1C30C
  • 5.IPv6 Addresses1C30C
  • 6.Understanding the Cloud1C30C
  • 7.1C30C
  • 8.A Quick Tour of Azure1C30C
  • 9.The Cloud - Its Not Just in the Sky!1C30C
  • 10.IaaS PaaS and SaaS1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • saved url-How Many IPv6 Addresses .txt
  • saved url-Microsoft Datacenters.txt
  • saved url-Pizza as a Service.txt
  • saved url-Project Natik.txt
  • saved url-Underwater Datacenter.txt

  • 17.Wireless Networking
  • 1.Wired Equivalency Protocol (WEP)1C30C
  • 2.1C30C
  • 3.WiFi Protected Access (WPA) + WPA2 and WPA31C30C
  • 4.WiFi Passwords1C30C
  • 5.1C30C
  • 6.Configure WiFi Security1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • saved url-Netspot WiFi Survey Tool.txt

  • 18.Network Encryption and Anonymity
  • 1.Virtual Private Network (VPN) Overview1C30C
  • 2.VPN Common Uses1C30C
  • 3.Common VPN Features1C30C
  • 4.VPN Disadvantages1C30C
  • 5.Proxy Servers1C30C
  • 6.The Onion Router (TOR)1C30C
  • 7.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Download Tor Browser.txt
  • saved url-More Details about Tor.txt
  • saved url-Starting point for finding .onion sites.txt

  • 19.Principles of Digital Identity
  • 1.Authentication1C30C
  • 2.Using a Security Key1C30C
  • 3.Windows Hello Facial and Fingerprint Recognition1C30C
  • 4.Security Questions and Account Recovery Tools1C30C
  • 5.Authorization and Accounting1C30C
  • 6.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt

  • 20.Passwords
  • 1.Password Practices to Avoid1C30C
  • 2.Password Best Practices1C30C
  • 3.1C30C
  • 4.How Passwords are Stored1C30C
  • 5.Common Attacks Against Passwords1C30C
  • 6.Password Leaks1C30C
  • 7.Using a Password Manager1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Explanation of Rainbow Tables.txt
  • saved url-Free Rainbow Tables.txt
  • saved url-KeePass.txt
  • saved url-Password Complexity.txt

  • 21.Confidentiality and Secure Communication
  • 1.The Email & Marketing Landscape 1C30C
  • 2.Spam and its Impact1C30C
  • 3.Spam Filters1C30C
  • 4.Handling Attachments and Links1C30C
  • 5.Advantages of Messaging Apps1C30C
  • 6.Social Media Messaging1C30C
  • 7.E2EE Messaging Apps1C30C
  • 8.Validation1C30C
  • 9.Hands-On Lab or Other Video1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • saved url-Spam Statistics.txt

  • 22.Social Engineering and Handling Information
  • 1.Introduction to Social Engineering1C30C
  • 2.Social Engineering Psychology1C30C
  • 3.Social Engineering Attacks1C30C
  • 4.Social Engineering Improvements and Protection1C30C
  • 5.Data Classification and NDAs1C30C
  • 6.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt

  • 23.Privacy Protection
  • 1.Where is Personal Data Exposed 1C30C
  • 2.Cyberbullying1C30C
  • 3.Cyberstalking1C30C
  • 4.Cybermobbing Doxxing and Fraudulent Accounts1C30C
  • 5.Cookie Handling1C30C
  • 6.Browser Privacy Settings1C30C
  • 7.Browser Security Settings1C30C
  • 8.Validation1C30C
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • saved url-Ethical Behavior.txt
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38574
    حجم: 5968 مگابایت
    مدت زمان: 1195 دقیقه
    تاریخ انتشار: ۹ مرداد ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید