وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Secure your IT Systems & Network: For Sys Admins + Engineers

سرفصل های دوره

Learn all about Cybersecurity...and how to improve security across your systems and network


1. Securing your Systems and Network
  • 1. Becoming a Security Expert
  • 2. Security Devices for Sys Admins
  • 3.1 Networking Protocols and Standards.docx
  • 3. Networking Protocols and Standards

  • 2. Common Threats
  • 1.1 Cybersecurity Threats and Attacks.docx
  • 1. Cybersecurity Threats and Attacks
  • 2.1 Malware.docx
  • 2. Malware
  • 3.1 Social engineering.docx
  • 3. Social Engineering
  • 4.1 Phishing.docx
  • 4. Phishing Attacks
  • 5.1 DDoS.docx
  • 5. DDoS

  • 3. Identity and Access Management
  • 1. How to Protect Your Systems and Data
  • 2.1 Passwords.docx
  • 2. Passwords Structure and Recommendations
  • 3.1 MFA.docx
  • 3. Multi-Factor Authentication
  • 4. Dont Use These Passwords
  • 5.1 Data Encryption.docx
  • 5. Data Encryption

  • 4. Securing Servers
  • 1. Server Security Top Tips
  • 2. Physical Server Security

  • 5. Securing Networks
  • 1.1 Introduction to Network Security.docx
  • 1.2 Network Security Devices.docx
  • 1. Network Security 101
  • 2.1 Firewalls.docx
  • 2. Firewalls
  • 3.1 Securing Networks - White and Blacklisting.docx
  • 3. Network Whitelists and Blacklists
  • 4.1 VPN Overview.docx
  • 4. Virtual Private Networks (VPN)
  • 5.1 Best ways to stay safe online.docx
  • 5.2 The Cloud - Pros and Cons.docx
  • 5.3 The Cloud - Security Top Tips.docx
  • 5.4 Web Security and Secure Web Browsing.docx
  • 5. Cloud Security
  • 6. WiFi Security
  • 7.1 Using Wireshark.pdf
  • 7. Using Wireshark

  • 6. Securing Computers + Portables
  • 1.1 How to Protect Your Systems and Data.docx
  • 1. Securing Desktops and Laptops
  • 2.1 Software Updates.docx
  • 2. Software Updates, Calendars and Schedules
  • 3. macOS Security
  • 4. Encrypting your Hard Drives (Windows 11 and macOS)
  • 5. iPhone Security
  • 6. iPad Security
  • 7. Staying Safe Online

  • 7. Securing Applications
  • 1. Apps & Security Importance of App Mgmt
  • 2.1 Securing Applications .docx
  • 2. Apps & Security Ensuring Security
  • 3.1 Securing Apps - White and Blacklisting.docx
  • 3. Apps & Security Approved App List

  • 8. Monitoring and Incident Response
  • 1. Security Monitoring
  • 2. Log Analysis & Management
  • 3.1 Incident Response.docx
  • 3. Incident Response

  • 9. Importance of Backups
  • 1.1 Data Retention Policy.pdf
  • 1. Backups at Work
  • 2.1 Backup Types.pdf
  • 2. Backup Types (Incremental, Differential, Full)
  • 3. The 3-2-1 Rule
  • 4. Immutable Backups
  • 5. Retention Periods

  • 10. Testing your Systems
  • 1.1 Cybersecurity Audit.docx
  • 1. Security Audits
  • 2.1 Penetration testing 101.docx
  • 2. Role of a PenTester (Ethical Hackers)
  • 3.1 Penetration Tester Engagement.docx
  • 3. Penetration Tester Engagement

  • 11. Becoming an Expert
  • 1.1 Cybersecurity Certs.docx
  • 1. Cybersecurity Certifications
  • 2.1 Cybersecurity awareness and training 101.docx
  • 2.2 Cybersecurity training Rollout Plan.docx
  • 2. Cybersecurity Awareness and Training
  • 3.1 Acceptable Use Policy.pdf
  • 3.2 Information Security Policy.pdf
  • 3.3 SOC 101.pdf
  • 3. Whats next
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 19480
    حجم: 7245 مگابایت
    مدت زمان: 377 دقیقه
    تاریخ انتشار: ۱۳ مهر ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید