وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Secure your IT Systems & Network: For Sys Admins + Engineers

سرفصل های دوره

Learn all about Cybersecurity...and how to improve security across your systems and network


1. Securing your Systems and Network
  • 1. Becoming a Security Expert
  • 2. Security Devices for Sys Admins
  • 3.1 Networking Protocols and Standards.docx
  • 3. Networking Protocols and Standards

  • 2. Common Threats
  • 1.1 Cybersecurity Threats and Attacks.docx
  • 1. Cybersecurity Threats and Attacks
  • 2.1 Malware.docx
  • 2. Malware
  • 3.1 Social engineering.docx
  • 3. Social Engineering
  • 4.1 Phishing.docx
  • 4. Phishing Attacks
  • 5.1 DDoS.docx
  • 5. DDoS

  • 3. Identity and Access Management
  • 1. How to Protect Your Systems and Data
  • 2.1 Passwords.docx
  • 2. Passwords Structure and Recommendations
  • 3.1 MFA.docx
  • 3. Multi-Factor Authentication
  • 4. Dont Use These Passwords
  • 5.1 Data Encryption.docx
  • 5. Data Encryption

  • 4. Securing Servers
  • 1. Server Security Top Tips
  • 2. Physical Server Security

  • 5. Securing Networks
  • 1.1 Introduction to Network Security.docx
  • 1.2 Network Security Devices.docx
  • 1. Network Security 101
  • 2.1 Firewalls.docx
  • 2. Firewalls
  • 3.1 Securing Networks - White and Blacklisting.docx
  • 3. Network Whitelists and Blacklists
  • 4.1 VPN Overview.docx
  • 4. Virtual Private Networks (VPN)
  • 5.1 Best ways to stay safe online.docx
  • 5.2 The Cloud - Pros and Cons.docx
  • 5.3 The Cloud - Security Top Tips.docx
  • 5.4 Web Security and Secure Web Browsing.docx
  • 5. Cloud Security
  • 6. WiFi Security
  • 7.1 Using Wireshark.pdf
  • 7. Using Wireshark

  • 6. Securing Computers + Portables
  • 1.1 How to Protect Your Systems and Data.docx
  • 1. Securing Desktops and Laptops
  • 2.1 Software Updates.docx
  • 2. Software Updates, Calendars and Schedules
  • 3. macOS Security
  • 4. Encrypting your Hard Drives (Windows 11 and macOS)
  • 5. iPhone Security
  • 6. iPad Security
  • 7. Staying Safe Online

  • 7. Securing Applications
  • 1. Apps & Security Importance of App Mgmt
  • 2.1 Securing Applications .docx
  • 2. Apps & Security Ensuring Security
  • 3.1 Securing Apps - White and Blacklisting.docx
  • 3. Apps & Security Approved App List

  • 8. Monitoring and Incident Response
  • 1. Security Monitoring
  • 2. Log Analysis & Management
  • 3.1 Incident Response.docx
  • 3. Incident Response

  • 9. Importance of Backups
  • 1.1 Data Retention Policy.pdf
  • 1. Backups at Work
  • 2.1 Backup Types.pdf
  • 2. Backup Types (Incremental, Differential, Full)
  • 3. The 3-2-1 Rule
  • 4. Immutable Backups
  • 5. Retention Periods

  • 10. Testing your Systems
  • 1.1 Cybersecurity Audit.docx
  • 1. Security Audits
  • 2.1 Penetration testing 101.docx
  • 2. Role of a PenTester (Ethical Hackers)
  • 3.1 Penetration Tester Engagement.docx
  • 3. Penetration Tester Engagement

  • 11. Becoming an Expert
  • 1.1 Cybersecurity Certs.docx
  • 1. Cybersecurity Certifications
  • 2.1 Cybersecurity awareness and training 101.docx
  • 2.2 Cybersecurity training Rollout Plan.docx
  • 2. Cybersecurity Awareness and Training
  • 3.1 Acceptable Use Policy.pdf
  • 3.2 Information Security Policy.pdf
  • 3.3 SOC 101.pdf
  • 3. Whats next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 19480
    حجم: 7245 مگابایت
    مدت زمان: 377 دقیقه
    تاریخ انتشار: 13 مهر 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید