وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

SSCP Online Training

سرفصل های دوره

1.Discussing Ethics and Security Concepts
  • 1.Introduction1C30C
  • 2.Code of Ethics1C30C
  • 3.The CIA Triad1C30C
  • 4.Accountability Privacy and Non-repudiation1C30C
  • 5.Least privilege & Segregation of Duties1C30C
  • 6.Security Controls1C30C
  • 7.Security Control Categories1C30C
  • 8.Other Security Concepts1C30C

  • 2.Exploring Security Controls and Asset Protection
  • 1.Introduction1C30C
  • 2.Functions of Security Controls1C30C
  • 3.Asset Management Lifecycle Pt11C30C
  • 4.Asset Management Lifecycle Pt21C30C
  • 5.Change Management Lifecycle1C30C
  • 6.Implementing Security Awareness Training1C30C
  • 7.Physical Security Operations1C30C

  • 3.Exploring Access Controls
  • 1.Introduction1C30C
  • 2.Methods of Authentication1C30C
  • 3.Biometric Factors1C30C
  • 4.SSO and Device Authentication1C30C
  • 5.Identity Federations1C30C
  • 6.Trust Relationships1C30C
  • 7.Zero Trust Architecture1C30C
  • 8.Zero Trust In Action1C30C

  • 4.Learning Network Trust Architecture
  • 1.Introduction1C30C
  • 2.1C30C
  • 3.Support Internetwork Trust Architectures1C30C
  • 4.Third Party Connections1C30C
  • 5.The Identity Management Lifecycle1C30C
  • 6.Seeing the Identity Management Lifecycle in Action1C30C

  • 5.Understand the risk management process
  • 1.Introduction1C30C
  • 2.Risk Visibility and Reporting1C30C
  • 3.Methods of Risk Analysis1C30C
  • 4.Vulnerability Management and CVSS1C30C
  • 5.Risk Management Concepts1C30C
  • 6.Risk Management Frameworks1C30C
  • 7.Risk Tolerance1C30C
  • 8.Risk Treatment1C30C

  • 6.Examining Security Monitoring and Analysis
  • 1.Introduction1C30C
  • 2.Legal and Regulatory Concerns1C30C
  • 3.Security Assessment Activities 1C30C
  • 4.Organizational Risk Reviews1C30C
  • 5.Vulnerability Management Lifecycle1C30C
  • 6.Source Systems and Events of Interest1C30C
  • 7.Log Management and Event Analysis Systems1C30C
  • 8.Analyze Monitoring Results1C30C

  • 7.Supporting the Incident Response Lifecycle
  • 1.Introduction1C30C
  • 2.The Incident Response Lifecycle1C30C
  • 3.Security Event vs Security Incident1C30C
  • 4.Phase 1 Preparation1C30C
  • 5.Phase 2 Detection Analysis and Escalation 1C30C
  • 6.Phase 3 Containment1C30C
  • 7.Phase 3 Continued Eradication & Recovery1C30C
  • 8.Phase 4 Lessons Learned1C30C
  • 9.Validation1C30C

  • 8.Understanding BC and DR Planning
  • 1.Introduction1C30C
  • 2.Disaster Recovery and Business Continuity1C30C
  • 3.BCDR Planning Process1C30C
  • 4.Interim or Alternate Processing Strategies1C30C
  • 5.Creating a Business Continuity Plan1C30C
  • 6.Creating a Disaster Recovery Plan1C30C
  • 7.Resiliency and Redundancy1C30C
  • 8.Testing and Drills1C30C

  • 9.Understand and Support Forensic Investigations
  • 1.Introduction1C30C
  • 2.Legality and the Process1C30C
  • 3.Ethical Principles1C30C
  • 4.1C30C
  • 5.Identifying Forensic Evidence 1C30C
  • 6.Evidence Collection Part 11C30C
  • 7.Evidence Collection Part 21C30C
  • 8.Preserving Forensic Evidence1C30C

  • 10.Examining the Basics of Cryptography
  • 1.Introduction1C30C
  • 2.What Does Cryptography Provide 1C30C
  • 3.Data Sensitivity1C30C
  • 4.1C30C
  • 5.Regulatory and Industry Best Practice1C30C
  • 6.Basics of Encryption1C30C
  • 7.Encryption Cipher Types1C30C
  • 8.Strength of Encryption Algorithms and Keys1C30C

  • 11.Discussing Cryptography and Its Uses
  • 1.Introduction1C30C
  • 2.Symmetric and Asymmetric Encryption1C30C
  • 3.Elliptic Curve Cryptography1C30C
  • 4.Hashing and Salting1C30C
  • 5.Non-Repudiation1C30C
  • 6.Secure Protocols1C30C
  • 7.1C30C

  • 12.Understanding Networking Fundamentals
  • 1.Introduction1C30C
  • 2.The Open System Interconnection (OSI) Model1C30C
  • 3.The TCP IP Model1C30C
  • 4.Network Topologies and Relationships1C30C
  • 5.Transmission Media Types1C30C
  • 6.1C30C
  • 7.Software Defined Networking (SDN)1C30C
  • 8.1C30C

  • 13.Managing Network Security
  • 1.Introduction1C30C
  • 2.Types of Network Attacks1C30C
  • 3.Managing Network Access1C30C
  • 4.Virtual Private Networks (VPNs)1C30C
  • 5.Network Device Placement1C30C
  • 6.Network Segmentation1C30C
  • 7.Secure Device Management1C30C

  • 14.Securing Networks and Wireless Communications
  • 1.Introduction1C30C
  • 2.Firewalls1C30C
  • 3.Web Application Firewall (WAF)1C30C
  • 4.Intrusion Detection Prevention Systems 1C30C
  • 5.LANs Routers and Switches1C30C
  • 6.Traffic Shaping1C30C
  • 7.Wireless Technologies1C30C
  • 8.Internet of Things (IoT)1C30C

  • 15.Identify Malicious Code and Endpoint Security
  • 1.Introduction 1C30C
  • 2.Malware and Countermeasures Part 11C30C
  • 3.Malware and Countermeasures Part 21C30C
  • 4.Malicious activities and Countermeasures Part 11C30C
  • 5.Malicious activities and Countermeasures Part 21C30C
  • 6.Endpoint Device Security Part 11C30C
  • 7.Endpoint Device Security Part 21C30C
  • 8.Endpoint Device Security In Action1C30C

  • 16.Understanding Cloud Security
  • 1.Introduction1C30C
  • 2.Cloud Deployment Models1C30C
  • 3.Cloud Service Models1C30C
  • 4.Virtualization1C30C
  • 5.Containerization1C30C
  • 6.Legal and Regulatory Concerns1C30C
  • 7.Data Storage Processing and Transmission1C30C
  • 8.Third Party Outsourcing Requirements1C30C
  • 9.Shared Responsibility Model1C30C

  • 17.Managing Mobile Devices and Virtual Environments
  • 1.Introduction1C30C
  • 2.Mobile Device Management1C30C
  • 3.MDM Models1C30C
  • 4.MDM Containerization and MAM1C30C
  • 5.Securing Virtualized Systems1C30C
  • 6.Virtualization Components1C30C
  • 7.Virtualization Vulnerabilities1C30C
  • 8.Hypervisor Tour1C30C
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38565
    حجم: 4044 مگابایت
    مدت زمان: 897 دقیقه
    تاریخ انتشار: 9 مرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید