وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Security+ | CompTIA Security Plus SY0-701 Certification Prep

سرفصل های دوره

CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job


1 - Introduction to Security CompTIA Security Plus SY0701 Certification Prep
  • 1 - Introduction to security

  • 2 - Basic Security Concepts
  • 2 - What is Security
  • 3 - PrivacyIntegrityAvailability
  • 4 - Encryption and Access Control
  • 5 - 3 A Rule Authentication Authorization and Accounting
  • 6 - Threat
  • 7 - What is a Hacker
  • 8 - What is Attack What are the Stages
  • 9 - Single Point Of Failure SPOF
  • 10 - Introducing Basic Risk Concepts

  • 3 - Identity Management
  • 11 - What is Identity Management
  • 12 - KERBEROS NTLMLDAP
  • 13 - Single SignOn SSO
  • 14 - Smart Cards
  • 15 - Tokens or Key Fobs
  • 16 - Biometric Methods
  • 17 - DualFactor and Multifactor Authentication
  • 18 - PAP CHAP MSCHAP
  • 19 - RADIUS

  • 4 - Users in CompTIA
  • 20 - Create a User in comptia
  • 21 - Managing Accounts 1
  • 22 - Managing Accounts 2
  • 23 - Passwords
  • 24 - Password Policy

  • 5 - Comparing Access Control Models
  • 25 - Comparing Access Control Models
  • 26 - RoleBased Access Control
  • 27 - Establishing Access with GroupBased Privileges
  • 28 - Rule Based and Discretionary Access Control
  • 29 - Mandatory Access Control

  • 6 - Virtualization
  • 30 - What is Virtualization
  • 31 - Virtualization Technologies
  • 32 - Benefits of Virtualization
  • 33 - Security Issues of Virtualization

  • 7 - Network Technologies
  • 34 - Basic Network Concepts
  • 35 - Domain Name ServicesDNS
  • 36 - What is the port How does it work
  • 37 - What is the Network Address
  • 38 - Combining the IP Address and the Port
  • 39 - Switches
  • 40 - Bridge
  • 41 - Understanding NAT and PAT
  • 42 - Network Separation
  • 43 - Proxy Servers
  • 44 - Types of Using Network Technologies 1
  • 45 - Routers
  • 46 - Types of Using Network Technologies 2

  • 8 - Wireless Networks
  • 47 - Reviewing Basic Wireless Network Information
  • 48 - Wireless Cryptographic Protocols
  • 49 - Authentication Protocols for Wireless Networks

  • 9 - Network Security Technologies
  • 50 - Firewalls
  • 51 - Network Access Control
  • 52 - Implementing a Secure Network

  • 10 - Intrusion Detection Systems
  • 53 - Understanding IDSs and IPSs
  • 54 - Detection Methods
  • 55 - Honeypots

  • 11 - Virtual Private Network VPN Technologies
  • 56 - Using VPNs for Remote Access
  • 57 - VPN Tunnel Protocols
  • 58 - SitetoSite VPNs

  • 12 - Security Threats
  • 59 - Understanding Threat Actors
  • 60 - Viruses
  • 61 - Logic Bombs
  • 62 - Trojans
  • 63 - Ransomware
  • 64 - Spyware
  • 65 - Bots and Botnets
  • 66 - Unified Threat ManagementUTM

  • 13 - Securing Wireless Networks
  • 67 - Disable SSID Broadcasting or Not
  • 68 - Enable MAC Filtering

  • 14 - Understanding Wireless Attacks
  • 69 - Disassociation Attacks
  • 70 - WPS and WPS Attacks
  • 71 - Rogue AP
  • 72 - Evil Twin
  • 73 - Jamming Attacks
  • 74 - Bluetooth Attacks
  • 75 - RFID Attacks
  • 76 - Wireless Replay Attacks

  • 15 - Network Attacks
  • 77 - Network Attacks
  • 78 - SYN Flood Attack
  • 79 - MAC Flood Attacks
  • 80 - ManintheMiddle Attacks
  • 81 - ARP Poisoning Attacks
  • 82 - DNS Attacks

  • 16 - Password Attacks
  • 83 - Brute Force Attacks
  • 84 - Password Hashes
  • 85 - Birthday Attacks
  • 86 - Replay Attacks
  • 87 - Hijacking and Related Attacks
  • 88 - Driver Manipulation

  • 17 - ZeroDay Attacks
  • 89 - ZeroDay Attacks

  • 18 - Code Attacks
  • 90 - Code Reuse and SDKs
  • 91 - Code Quality and Testing
  • 92 - Development LifeCycle Models
  • 93 - Secure DevOps
  • 94 - Version Control and Change Management
  • 95 - Provisioning and Deprovisioning

  • 19 - Web Server Attacks
  • 96 - Web Servers
  • 97 - SQL Injection Attacks
  • 98 - Protecting Against SQL Injection Attacks
  • 99 - DLL Injection
  • 100 - CrossSite Scripting

  • 20 - Social Engineering Attacks
  • 101 - Social Engineering
  • 102 - Shoulder Surfing
  • 103 - Tricking Users with Hoaxes
  • 104 - Tailgating and Mantraps
  • 105 - Dumpster Diving
  • 106 - Watering Hole Attacks
  • 107 - Spam
  • 108 - Phishing
  • 109 - Whaling
  • 110 - Vishing

  • 21 - Memory Buffer Vulnerabilities
  • 111 - Buffer Overflow Attacks
  • 112 - Pointer Dereference
  • 113 - Compiled Versus Runtime Code
  • 114 - Proper Input Validation
  • 115 - Side Input Validation
  • 116 - Avoiding Race Conditions
  • 117 - Proper Error Handling
  • 118 - Cryptographic Techniques

  • 22 - Preventing Attacks
  • 119 - Protecting Systems from Malware
  • 120 - Antivirus and AntiMalware Software
  • 121 - Advanced Malware Tools
  • 122 - Educating Users

  • 23 - Server Security
  • 123 - Implementing Secure Systems
  • 124 - Operating systems
  • 125 - Secure Operating System Configurations
  • 126 - Resiliency and Automation Strategies
  • 127 - Change Management Policy
  • 128 - Secure Staging and Deployment
  • 129 - Peripherals
  • 130 - EMI and EMP
  • 131 - Hardware Security Module
  • 132 - Cloud Deployment Models
  • 133 - Cloud Services
  • 134 - Security Responsibilities with Cloud Models
  • 135 - Advanced Cloud Services

  • 24 - Mobile Devices
  • 136 - Deploying Mobile Devices Securely
  • 137 - Deployment Models
  • 138 - Mobile Device Management
  • 139 - Unauthorized Connections
  • 140 - Hardware Control

  • 25 - Data Security
  • 141 - Protecting Data
  • 142 - Data Loss Prevention

  • 26 - Database Security
  • 143 - Database Concepts
  • 144 - Normalization
  • 145 - SQL Queries
  • 146 - Database Security

  • 27 - Risk Management
  • 147 - Understanding Risk Management
  • 148 - Risk Management
  • 149 - Threats and Threat Assessments
  • 150 - Vulnerabilities
  • 151 - Risk Assessment
  • 152 - Risk Registers

  • 28 - Cloud Vendors Relationships
  • 153 - Finding and Evaluating Cloud Vendors
  • 154 - Job Notification
  • 155 - Conducting Evaluations
  • 156 - Negotiating Contracts and Billing
  • 157 - Professional Services
  • 158 - Chargebacks
  • 159 - Laws Regulations And Safety Standards

  • 29 - Advising
  • 160 - Key Stakeholders
  • 161 - Using Baselines
  • 162 - Conducting Feasibility Study
  • 163 - Making GAP Analysis
  • 164 - Using Reporting
  • 165 - Understanding Benchmarks

  • 30 - Checking for Vulnerabilities
  • 166 - Checking for Vulnerabilities
  • 167 - Password Crackers
  • 168 - Network Scanners
  • 169 - Wireless Scanners Cracker
  • 170 - Banner Grabbing
  • 171 - Vulnerability Scanning

  • 31 - Penetration Tests
  • 172 - Penetration Tests
  • 173 - Passive Active Reconnaissance
  • 174 - Initial Exploitation
  • 175 - White Gray and Black Box Testing
  • 176 - Intrusive and NonIntrusive Testing
  • 177 - Passive Versus Active Tools

  • 32 - Physical Security Precautions
  • 178 - Comparing Physical Security Controls
  • 179 - Comparing Door Lock Types
  • 180 - Preventing Tailgating with Mantraps
  • 181 - Increasing Physical Security with Guards
  • 182 - Using Hardware Locks
  • 183 - Asset Management
  • 184 - Implementing Environmental Controls

  • 33 - Single Point of Failure
  • 185 - Single Point of Failure
  • 186 - Disk Redundancies
  • 187 - Server Redundancy and High Availability
  • 188 - Backup

  • 34 - Business Continuity Plans
  • 189 - Comparing Business Continuity Elements
  • 190 - Impact
  • 191 - Recovery Time Objective
  • 192 - Recovery Sites
  • 193 - Disaster Recovery

  • 35 - Examination of Logs
  • 194 - Monitoring Logs for Event Anomalies
  • 195 - OtherLogsSIEM
  • 196 - Continuous Monitoring

  • 36 - Controls
  • 197 - Understanding Control Types
  • 198 - Control Goals

  • 37 - Cryptography and PKI
  • 199 - Introducing Cryptography Concepts
  • 200 - Hashing
  • 201 - MD5
  • 202 - SHA
  • 203 - HMAC
  • 204 - Hashing Files
  • 205 - Digital Signatures Certificates and Nonrepudiation
  • 206 - Providing Confidentiality with Encryption
  • 207 - Block Versus Stream Ciphers
  • 208 - Symmetric Encryption
  • 209 - Symmetric Encryption Methods
  • 210 - Asymmetric Encryption
  • 211 - Certificates
  • 212 - Steganography And Obfuscation
  • 213 - Using Cryptographic Protocols
  • 214 - Cipher Suites
  • 215 - Exploring PKI Components
  • 216 - Comparing Certificate Types

  • 38 - Secure Web Page
  • 217 - HTTPS Transport Encryption

  • 39 - Risk Mitigation Methods
  • 218 - Exploring Security Policies
  • 219 - Personnel Management Policies
  • 220 - Background Check
  • 221 - NDA
  • 222 - Policy Violations and Adverse Actions
  • 223 - Agreement Types
  • 224 - PII and PHI
  • 225 - Responding to Incidents
  • 226 - Providing Training
  • 227 - Troubleshooting Personnel Issues
  • 228 - Incident ResponseEducation

  • 40 - Extra
  • 229 - Security CompTIA Security Plus SY0701 Certification Prep.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 29350
    حجم: 4090 مگابایت
    مدت زمان: 1074 دقیقه
    تاریخ انتشار: ۲۵ دی ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید