وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Network Defense Fundamentals: Training for IT Beginners

سرفصل های دوره

Building Strong Foundations in Cybersecurity and Information Protection


1 - Introduction
  • 1 - Introduction to Network Defense Essential
  • 2 - The overview of the different types of network defense approaches
  • 3 - The different types of Network security controls
  • 4 - Basic Linux concepts

  • 2 - Identification authentication and authorization
  • 5 - The different types of identifications overview
  • 6 - The different types of authentications overview
  • 7 - The different types of authorization overview

  • 3 - Network security controls physical controls
  • 8 - The different physical security attack vectors
  • 9 - The different types of security controls
  • 10 - Understanding the various environmental controls

  • 4 - Network security controls technical controls
  • 11 - Understanding Network segmentation and its types
  • 12 - Understanding the different types of firewalls and their roles
  • 13 - Understanding the different types of IDSIPS and their roles
  • 14 - The different types of proxy servers and their benefits
  • 15 - The fundamental understanding of VPN and their importance in a network
  • 16 - VPN fundamental part 2
  • 17 - Overview of antivirus antimalware software

  • 5 - Virtualization and cloud computing
  • 18 - understanding virtualization and its components
  • 19 - OS virtualization security
  • 20 - Cloud computing and its benefits
  • 21 - Overview of different types of cloud computing service
  • 22 - Importance of cloud computing and its best practice

  • 6 - Wireless network security
  • 23 - Wireless network encryption mechanism
  • 24 - Understanding the different types of wireless network authentication methods
  • 25 - Wireless security measures and wireless security tools

  • 7 - IoT device Security
  • 26 - Understanding IoT architecture and communication models
  • 27 - Understanding the best practice tool for IoT for security

  • 8 - Cryptography and public key infrastructure
  • 28 - Cryptography techniques
  • 29 - The different Encryption algorithm
  • 30 - The different hashing algorithm
  • 31 - Different cryptography tools and hash calculators
  • 32 - PKI infrastructure

  • 9 - Data security
  • 33 - The different data security controls for data encryption
  • 34 - File encryption removablemedia encryption and disk encryption
  • 35 - Methods and tools for data backup retention
  • 36 - Methods and tools for data backup retention 2
  • 37 - DLPS data loss prevention and solutions

  • 10 - Mini Projects
  • 38 - The implementation of an IDSIPS Snort on a Linux based system
  • 39 - Installation of snort and its libraries Both Linux and ubuntu
  • 40 - Configuration of snort for IDS IPS functionalities
  • 41 - 103 Configuration of snort for IDSIPS functionalities
  • 42 - How to setup a VPN
  • 43 - Firewall installation configuration
  • 44 - Timezone configuration and swap files in firewalld
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38549
    حجم: 1017 مگابایت
    مدت زمان: 206 دقیقه
    تاریخ انتشار: 26 تیر 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید