وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Network Defense Fundamentals: Training for IT Beginners

سرفصل های دوره

Building Strong Foundations in Cybersecurity and Information Protection


1 - Introduction
  • 1 - Introduction to Network Defense Essential
  • 2 - The overview of the different types of network defense approaches
  • 3 - The different types of Network security controls
  • 4 - Basic Linux concepts

  • 2 - Identification authentication and authorization
  • 5 - The different types of identifications overview
  • 6 - The different types of authentications overview
  • 7 - The different types of authorization overview

  • 3 - Network security controls physical controls
  • 8 - The different physical security attack vectors
  • 9 - The different types of security controls
  • 10 - Understanding the various environmental controls

  • 4 - Network security controls technical controls
  • 11 - Understanding Network segmentation and its types
  • 12 - Understanding the different types of firewalls and their roles
  • 13 - Understanding the different types of IDSIPS and their roles
  • 14 - The different types of proxy servers and their benefits
  • 15 - The fundamental understanding of VPN and their importance in a network
  • 16 - VPN fundamental part 2
  • 17 - Overview of antivirus antimalware software

  • 5 - Virtualization and cloud computing
  • 18 - understanding virtualization and its components
  • 19 - OS virtualization security
  • 20 - Cloud computing and its benefits
  • 21 - Overview of different types of cloud computing service
  • 22 - Importance of cloud computing and its best practice

  • 6 - Wireless network security
  • 23 - Wireless network encryption mechanism
  • 24 - Understanding the different types of wireless network authentication methods
  • 25 - Wireless security measures and wireless security tools

  • 7 - IoT device Security
  • 26 - Understanding IoT architecture and communication models
  • 27 - Understanding the best practice tool for IoT for security

  • 8 - Cryptography and public key infrastructure
  • 28 - Cryptography techniques
  • 29 - The different Encryption algorithm
  • 30 - The different hashing algorithm
  • 31 - Different cryptography tools and hash calculators
  • 32 - PKI infrastructure

  • 9 - Data security
  • 33 - The different data security controls for data encryption
  • 34 - File encryption removablemedia encryption and disk encryption
  • 35 - Methods and tools for data backup retention
  • 36 - Methods and tools for data backup retention 2
  • 37 - DLPS data loss prevention and solutions

  • 10 - Mini Projects
  • 38 - The implementation of an IDSIPS Snort on a Linux based system
  • 39 - Installation of snort and its libraries Both Linux and ubuntu
  • 40 - Configuration of snort for IDS IPS functionalities
  • 41 - 103 Configuration of snort for IDSIPS functionalities
  • 42 - How to setup a VPN
  • 43 - Firewall installation configuration
  • 44 - Timezone configuration and swap files in firewalld
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38549
    حجم: 1017 مگابایت
    مدت زمان: 206 دقیقه
    تاریخ انتشار: ۲۶ تیر ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید