وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Practical Cybersecurity Fundamentals

سرفصل های دوره

Introduction
  • 001. Practical Cybersecurity Fundamentals Introduction

  • Lesson 1 Security Principles
  • 001. Learning objectives
  • 002. 1.1 Understanding the Security Concepts of Information Assurance
  • 003. 1.2 Understanding the Risk Management Process
  • 004. 1.3 Understanding Security Controls
  • 005. 1.4 Understanding Governance Processes
  • 006. 1.5 Building Your Cybersecurity Lab

  • Lesson 2 Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts
  • 001. Learning objectives
  • 002. 2.1 Understanding Business Continuity (BC)
  • 003. 2.2 Understanding Disaster Recovery (DR)
  • 004. 2.3 Understanding Incident Response

  • Lesson 3 Access Control Concepts
  • 001. Learning objectives
  • 002. 3.1 Understanding Physical Access Controls
  • 003. 3.2 Exploring the Principle of Least Privilege
  • 004. 3.3 Understanding the Concept of Segregation of Duties
  • 005. 3.4 Introducing Discretionary Access Control (DAC)
  • 006. 3.5 Understanding Mandatory Access Control (MAC)
  • 007. 3.6 Understanding Role-based Access Control (RBAC)

  • Lesson 4 Network Security
  • 001. Learning objectives
  • 002. 4.1 Understanding Computer Networking
  • 003. 4.2 Understanding Network Threats and Attacks
  • 004. 4.3 Understanding Network Security Infrastructure
  • 005. 4.4 Introducing Network Segmentation
  • 006. 4.5 Introducing Cloud Security

  • Lesson 5 Security Operations
  • 001. Learning objectives
  • 002. 5.1 Understanding Data Security
  • 003. 5.2 Understanding Hashing
  • 004. 5.3 Understanding System Hardening
  • 005. 5.4 Understanding Best Practice Security Policies
  • 006. 5.5 Understanding Security Awareness Training

  • Lesson 6 Software Defined Networking and Infrastructure as Code
  • 001. Learning objectives
  • 002. 6.1 Software Defined Networking Security
  • 003. 6.2 Understanding the Threats Against SDN Solutions
  • 004. 6.3 Introducing Network Programmability
  • 005. 6.4 Introducing SD-WAN and Modern Architectures
  • 006. 6.5 Surveying the OWASP Top 10

  • Lesson 7 Cryptography
  • 001. Learning objectives
  • 002. 7.1 Introducing Cryptography and Cryptanalysis
  • 003. 7.2 Understanding Encryption Protocols
  • 004. 7.3 Describing Hashing Algorithms
  • 005. 7.4 Introducing Public Key Infrastructure (PKI)
  • 006. 7.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment
  • 007. 7.6 Surveying SSL and TLS Implementations
  • 008. 7.7 Surveying IPsec Implementations and Modern VPN Implementations

  • Lesson 8 AAA, Identity Management, Network Visibility, and Segmentation
  • 001. Learning objectives
  • 002. 8.1 Introducing AAA and Identity Management
  • 003. 8.2 Implementing Zero Trust and Multifactor Authentication
  • 004. 8.3 Understanding Identity Management in the Cloud
  • 005. 8.4 Surveying Single-Sign On (SSO) Implementations

  • Lesson 9 Incident Response Fundamentals
  • 001. Learning objectives
  • 002. 9.1 Exploring How to Get Started in Incident Response
  • 003. 9.2 Understanding the Incident Response Process
  • 004. 9.3 Defining Playbooks and Run Book Automation (RBA)
  • 005. 9.4 Understanding Cyber Threat Intelligence (CTI)
  • 006. 9.5 Understanding Data Normalization
  • 007. 9.6 Deconstructing Universal Data Formats and 5-tuple Correlation
  • 008. 9.7 Understanding Security Monitoring Fundamentals
  • 009. 9.8 Surveying Security Monitoring Tools

  • Lesson 10 Threat Hunting Fundamentals
  • 001. Learning objectives
  • 002. 10.1 Introducing the Threat Hunting Process
  • 003. 10.2 MITREs Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)
  • 004. 10.3 Understanding Automated Adversarial Emulation

  • Lesson 11 Digital Forensics
  • 001. Learning objectives
  • 002. 11.1 Introducing Digital Forensics
  • 003. 11.2 Introducing Reverse Engineering
  • 004. 11.3 Understanding Evidence Preservation and Chain of Custody
  • 005. 11.4 Collecting Evidence from Endpoints and Servers
  • 006. 11.5 Collecting Evidence from Mobile and IoT Devices
  • 007. 11.6 Exploring Memory Analysis with Volatility

  • Lesson 12 Introduction to Security Penetration Testing and Bug Hunting
  • 001. Learning objectives
  • 002. 12.1 How to Start a Career in Ethical Hacking
  • 003. 12.2 Understanding the Difference Between Traditional Pen Testing, Bug Bounties, and Red Team Assessments
  • 004. 12.3 Exploring Bug Bounty Programs
  • 005. 12.4 Understanding the Ethical Hacking and Bug Hunting Methodology
  • 006. 12.5 Planning and Scoping a Penetration Testing Assessment

  • Lesson 13 Passive Reconnaissance and OSINT
  • 001. Learning objectives
  • 002. 13.1 Understanding Information Gathering and Vulnerability Identification
  • 003. 13.2 Introducing Open Source Intelligence (OSINT) Techniques
  • 004. 13.3 Performing DNS-based Passive Recon
  • 005. 13.4 Identifying Cloud vs. Self-hosted Assets
  • 006. 13.5 Introducing Shodan, Maltego, AMass, Recon-NG, and other Recon Tools
  • 007. 13.6 Surveying Password Dumps, File Metadata, and Public Source-code Repositories
  • 008. 13.7 Introduction to Google Hacking and Search Engine Reconnaissance

  • Lesson 14 Active Reconnaissance, Enumeration, and Scanning
  • 001. Learning objectives
  • 002. 14.1 Introduction to Host and Service Enumeration
  • 003. 14.2 Mastering Nmap
  • 004. 14.3 Performing Website and Web Application Reconnaissance
  • 005. 14.4 Discovering Cloud Assets
  • 006. 14.5 Crafting Packets with Scapy to Perform Reconnaissance

  • Lesson 15 Exploiting Systems and Applications
  • 001. Learning objectives
  • 002. 15.1 Performing On-Path Attacks
  • 003. 15.2 Exploring the OWASP Top 10 Risks in Web Applications
  • 004. 15.3 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
  • 005. 15.4 Understanding Server-side Request Forgery (SSRF) Vulnerabilities
  • 006. 15.5 Hacking Databases
  • 007. 15.6 Exploiting Wireless Vulnerabilities
  • 008. 15.7 Exploiting Buffer Overflows and Creating Payloads

  • Lesson 16 Post Exploitation Techniques and Reporting
  • 001. Learning objectives
  • 002. 16.1 Avoiding Detection and Evading Security Tools
  • 003. 16.2 Introduction to Lateral Movement and Exfiltration
  • 004. 16.3 Exploring Command and Control (C2) Techniques
  • 005. 16.4 Understanding Living-off-the-land and Fileless Malware
  • 006. 16.5 Best Practices when Creating Pen Testing and Bug Bounty Reports
  • 007. 16.6 Understanding Post-Engagement Cleanup

  • Lesson 17 Cloud Security Concepts
  • 001. Learning objectives
  • 002. 17.1 Introducing the Different Cloud Deployment and Service Models
  • 003. 17.2 Surveying Patch Management in the Cloud
  • 004. 17.3 Performing Security Assessments in Cloud Environments
  • 005. 17.4 Exploring Cloud Logging and Monitoring Methodologies

  • Lesson 18 DevSecOps
  • 001. Learning objectives
  • 002. 18.1 Introducing DevSecOps
  • 003. 18.2 Securing Code, Applications, and Building DevSecOps Pipelines

  • Lesson 19 IoT Security
  • 001. Learning objectives
  • 002. 19.1 Introducing IoT Concepts
  • 003. 19.2 Surveying IoT Hacking Methodologies and IoT Hacking Tools
  • 004. 19.3 Introducing OT, ICS, and SCADA Concepts and Attacks

  • Lesson 20 Introduction to AI Security
  • 001. Learning objectives
  • 002. 20.1 Surveying the AI Landscape and Use Cases
  • 003. 20.2 Exploring LLMs, ChatGPT, Co-pilot and More
  • 004. 20.3 Understanding the Importance of AI Security
  • 005. 20.4 Exploring the OWASP Top 10 for LLMs

  • Lesson 21 A Deep Dive into the Different Types of AI Threats
  • 001. Learning objectives
  • 002. 21.1 Exploring Data Poisoning Attacks
  • 003. 21.2 Understanding Model Inversion Attacks
  • 004. 21.3 Discussing Membership Inference Attacks
  • 005. 21.4 Explaining the Model Theft Attack
  • 006. 21.5 Introducing MITREs ATLAS

  • Lesson 22 Principles of Secure AI Development
  • 001. Learning objectives
  • 002. 22.1 Exploring the Secure AI Development Lifecycle
  • 003. 22.2 Understanding Privacy-preserving AI Techniques
  • 004. 22.3 Understanding Robustness and Resilience in AI Models
  • 005. 22.4 Surveying AI Security Best Practices
  • 006. 22.5 Exploring AI Security Tools and Frameworks
  • 007. 22.6 Understanding the Legal Landscape and Potential New Regulations
  • 008. 22.7 Investigating Ethical Implications of Artificial Intelligence

  • Module 1 Cybersecurity Fundamentals
  • 001. Module Introduction

  • Module 2 Incident Response, Digital Forensics, and Threat Hunting
  • 001. Module Introduction

  • Module 3 Ethical Hacking, Penetration Testing, and Bug Hunting
  • 001. Module Introduction

  • Module 4 Cloud, DevOps, and IoT Security
  • 001. Module Introduction

  • Module 5 AI Security, Ethics, and Privacy Balancing Innovation with Protection
  • 001. Module Introduction

  • Summary
  • 001. Practical Cybersecurity Fundamentals Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 31590
    حجم: 3292 مگابایت
    مدت زمان: 860 دقیقه
    تاریخ انتشار: ۷ فروردین ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید