وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

SSCP Online Training

سرفصل های دوره

1.Discussing Ethics and Security Concepts
  • 1.Introduction1C30C
  • 2.Code of Ethics1C30C
  • 3.The CIA Triad1C30C
  • 4.Accountability Privacy and Non-repudiation1C30C
  • 5.Least privilege & Segregation of Duties1C30C
  • 6.Security Controls1C30C
  • 7.Security Control Categories1C30C
  • 8.Other Security Concepts1C30C

  • 2.Exploring Security Controls and Asset Protection
  • 1.Introduction1C30C
  • 2.Functions of Security Controls1C30C
  • 3.Asset Management Lifecycle Pt11C30C
  • 4.Asset Management Lifecycle Pt21C30C
  • 5.Change Management Lifecycle1C30C
  • 6.Implementing Security Awareness Training1C30C
  • 7.Physical Security Operations1C30C

  • 3.Exploring Access Controls
  • 1.Introduction1C30C
  • 2.Methods of Authentication1C30C
  • 3.Biometric Factors1C30C
  • 4.SSO and Device Authentication1C30C
  • 5.Identity Federations1C30C
  • 6.Trust Relationships1C30C
  • 7.Zero Trust Architecture1C30C
  • 8.Zero Trust In Action1C30C

  • 4.Learning Network Trust Architecture
  • 1.Introduction1C30C
  • 2.1C30C
  • 3.Support Internetwork Trust Architectures1C30C
  • 4.Third Party Connections1C30C
  • 5.The Identity Management Lifecycle1C30C
  • 6.Seeing the Identity Management Lifecycle in Action1C30C

  • 5.Understand the risk management process
  • 1.Introduction1C30C
  • 2.Risk Visibility and Reporting1C30C
  • 3.Methods of Risk Analysis1C30C
  • 4.Vulnerability Management and CVSS1C30C
  • 5.Risk Management Concepts1C30C
  • 6.Risk Management Frameworks1C30C
  • 7.Risk Tolerance1C30C
  • 8.Risk Treatment1C30C

  • 6.Examining Security Monitoring and Analysis
  • 1.Introduction1C30C
  • 2.Legal and Regulatory Concerns1C30C
  • 3.Security Assessment Activities 1C30C
  • 4.Organizational Risk Reviews1C30C
  • 5.Vulnerability Management Lifecycle1C30C
  • 6.Source Systems and Events of Interest1C30C
  • 7.Log Management and Event Analysis Systems1C30C
  • 8.Analyze Monitoring Results1C30C

  • 7.Supporting the Incident Response Lifecycle
  • 1.Introduction1C30C
  • 2.The Incident Response Lifecycle1C30C
  • 3.Security Event vs Security Incident1C30C
  • 4.Phase 1 Preparation1C30C
  • 5.Phase 2 Detection Analysis and Escalation 1C30C
  • 6.Phase 3 Containment1C30C
  • 7.Phase 3 Continued Eradication & Recovery1C30C
  • 8.Phase 4 Lessons Learned1C30C
  • 9.Validation1C30C

  • 8.Understanding BC and DR Planning
  • 1.Introduction1C30C
  • 2.Disaster Recovery and Business Continuity1C30C
  • 3.BCDR Planning Process1C30C
  • 4.Interim or Alternate Processing Strategies1C30C
  • 5.Creating a Business Continuity Plan1C30C
  • 6.Creating a Disaster Recovery Plan1C30C
  • 7.Resiliency and Redundancy1C30C
  • 8.Testing and Drills1C30C

  • 9.Understand and Support Forensic Investigations
  • 1.Introduction1C30C
  • 2.Legality and the Process1C30C
  • 3.Ethical Principles1C30C
  • 4.1C30C
  • 5.Identifying Forensic Evidence 1C30C
  • 6.Evidence Collection Part 11C30C
  • 7.Evidence Collection Part 21C30C
  • 8.Preserving Forensic Evidence1C30C

  • 10.Examining the Basics of Cryptography
  • 1.Introduction1C30C
  • 2.What Does Cryptography Provide 1C30C
  • 3.Data Sensitivity1C30C
  • 4.1C30C
  • 5.Regulatory and Industry Best Practice1C30C
  • 6.Basics of Encryption1C30C
  • 7.Encryption Cipher Types1C30C
  • 8.Strength of Encryption Algorithms and Keys1C30C

  • 11.Discussing Cryptography and Its Uses
  • 1.Introduction1C30C
  • 2.Symmetric and Asymmetric Encryption1C30C
  • 3.Elliptic Curve Cryptography1C30C
  • 4.Hashing and Salting1C30C
  • 5.Non-Repudiation1C30C
  • 6.Secure Protocols1C30C
  • 7.1C30C

  • 12.Understanding Networking Fundamentals
  • 1.Introduction1C30C
  • 2.The Open System Interconnection (OSI) Model1C30C
  • 3.The TCP IP Model1C30C
  • 4.Network Topologies and Relationships1C30C
  • 5.Transmission Media Types1C30C
  • 6.1C30C
  • 7.Software Defined Networking (SDN)1C30C
  • 8.1C30C

  • 13.Managing Network Security
  • 1.Introduction1C30C
  • 2.Types of Network Attacks1C30C
  • 3.Managing Network Access1C30C
  • 4.Virtual Private Networks (VPNs)1C30C
  • 5.Network Device Placement1C30C
  • 6.Network Segmentation1C30C
  • 7.Secure Device Management1C30C

  • 14.Securing Networks and Wireless Communications
  • 1.Introduction1C30C
  • 2.Firewalls1C30C
  • 3.Web Application Firewall (WAF)1C30C
  • 4.Intrusion Detection Prevention Systems 1C30C
  • 5.LANs Routers and Switches1C30C
  • 6.Traffic Shaping1C30C
  • 7.Wireless Technologies1C30C
  • 8.Internet of Things (IoT)1C30C

  • 15.Identify Malicious Code and Endpoint Security
  • 1.Introduction 1C30C
  • 2.Malware and Countermeasures Part 11C30C
  • 3.Malware and Countermeasures Part 21C30C
  • 4.Malicious activities and Countermeasures Part 11C30C
  • 5.Malicious activities and Countermeasures Part 21C30C
  • 6.Endpoint Device Security Part 11C30C
  • 7.Endpoint Device Security Part 21C30C
  • 8.Endpoint Device Security In Action1C30C

  • 16.Understanding Cloud Security
  • 1.Introduction1C30C
  • 2.Cloud Deployment Models1C30C
  • 3.Cloud Service Models1C30C
  • 4.Virtualization1C30C
  • 5.Containerization1C30C
  • 6.Legal and Regulatory Concerns1C30C
  • 7.Data Storage Processing and Transmission1C30C
  • 8.Third Party Outsourcing Requirements1C30C
  • 9.Shared Responsibility Model1C30C

  • 17.Managing Mobile Devices and Virtual Environments
  • 1.Introduction1C30C
  • 2.Mobile Device Management1C30C
  • 3.MDM Models1C30C
  • 4.MDM Containerization and MAM1C30C
  • 5.Securing Virtualized Systems1C30C
  • 6.Virtualization Components1C30C
  • 7.Virtualization Vulnerabilities1C30C
  • 8.Hypervisor Tour1C30C
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 38565
    حجم: 4044 مگابایت
    مدت زمان: 897 دقیقه
    تاریخ انتشار: ۹ مرداد ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید