وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

(SSCP) Systems Security Certified Practitioner, 2nd Edition

سرفصل های دوره

001. Introduction
  • 001. Systems Security Certified Practitioner (SSCP) Introduction

  • 002. Module 1 Security Operations and Administration
  • 001. Module introduction

  • 003. Lesson 1 Fundamental Security Concepts
  • 001. Learning Object
  • 002. 1.1 (ISC) Code of Ethics
  • 003. 1.2 Understand Security Concepts
  • 004. 1.3 Identify and Implement Security Controls
  • 005. 1.4 Document and Maintain Functional Security Controls

  • 004. Lesson 2 Security Management Lifecycles
  • 001. Learning objectives
  • 002. 2.2 Implementation and Operation Phases
  • 003. 2.3 Archiving and Disposal Phases
  • 004. 2.4 Change and Configuration Management

  • 005. Lesson 3 Security Awareness and Training
  • 001. Learning objectives
  • 002. 3.1 Security Training During Onboarding
  • 003. 3.2 Continual Security Awareness
  • 004. 3.3 Security Education for the Enterprise

  • 006. Lesson 4 Collaborate with Physical Security Operations
  • 001. Learning objectives
  • 002. 4.1 Defense-in-Depth
  • 003. 4.2 Campus Physical Security
  • 004. 4.3 Facility Physical Security
  • 005. 4.4 Operational Physical Security

  • 007. Module 2 Practical Cryptography
  • 001. Module introduction

  • 008. Lesson 5 Cryptography Use Cases
  • 001. Learning objectives
  • 002. 5.1 The CIAN Model
  • 003. 5.2 Data Sensitivity Cases
  • 004. 5.3 Regulatory Use Cases

  • 009. Lesson 6 Applied Cryptographic Concepts
  • 001. Learning objectives
  • 002. 6.1 Cryptographic Hashing and HMACs
  • 003. 6.2 Salt and Pepper
  • 004. 6.3 Symmetric vs. Asymmetric Cryptosystems
  • 005. 6.4 Digital Signatures
  • 006. 6.5 Strength of Encryption Algorithms and Keys
  • 007. 6.6 Cryptographic Attacks and Cryptanalysis

  • 010. Lesson 7 Public Key Infrastructure
  • 001. Learning objectives
  • 002. 7.1 Web of Trust
  • 003. 7.2 Digital Certificates
  • 004. 7.3 Internet PKI
  • 005. 7.4 Fundamental Key Management Concepts

  • 011. Lesson 8 Understand Secure Protocols
  • 001. Learning objectives
  • 002. 8.1 Services and Protocols
  • 003. 8.2 Common Use Cases
  • 004. 8.3 Limitations and Vulnerabilities

  • 012. Module 3 Access Controls
  • 001. Module introduction

  • 013. Lesson 9 Implement and Maintain Authentication Methods
  • 001. Learning objectives
  • 002. 9.1 SingleMulti-factor Authentication (MFA)
  • 003. 9.2 Single Sign-on (SSO) and Federated Access
  • 004. 9.3 Device Authentication

  • 014. Lesson 10 Support Internetwork Trust Architectures
  • 001. Learning objectives
  • 002. 10.1 Trust Relationships
  • 003. 10.2 Internet, Intranet, and Extranet
  • 004. 10.3 Third-party Connections

  • 015. Lesson 11 The Identity Management Lifecycle
  • 002. 11.1 Authorization and Proofing
  • 003. 11.2 Provisioning and De-Provisioning
  • 004. 11.3 Maintenance and Entitlement
  • 005. 11.4 Identity and Access Management (IAM) Systems

  • 016. Lesson 12 Understand and Apply Access Controls
  • 001. Learning objectives
  • 002. 12.1 Mandatory Access Controls (MAC)
  • 003. 12.2 Discretionary Access Controls
  • 004. 12.3 Role-Based Access Controls (RBAC)
  • 005. 12.4 Rule-Based Access Controls (ACLs)

  • 017. Module 4 Risk Identification, Monitoring and Analysis
  • 001. Module introduction

  • 018. Lesson 13 The Risk Management Process
  • 001. Learning objectives
  • 002. 13.1 Risk Management Concepts and Terminology
  • 003. 13.2 Risk Treatment and Tolerance
  • 004. 13.3 Qualitative vs. Quantitative Risk Analysis
  • 005. 13.4 Risk Management Frameworks
  • 006. 13.5 Regulatory and Legal Concerns

  • 019. Lesson 14 Vulnerability Assessment and Management
  • 001. Learning objectives
  • 002. 14.1 Vulnerability Management Lifecycle
  • 003. 14.2 Vulnerability Assessment Tools and Methods
  • 004. 14.3 Security Testing and Risk Review

  • 020. Lesson 15 Security Testing and Risk Review
  • 001. Learning objectives
  • 002. 15.1 Source Systems
  • 003. 15.2 Events of Interest
  • 004. 15.3 Log Management
  • 005. 15.4 Event Aggregation and Correlation

  • 021. Lesson 16 Risk Identification, Monitoring, and Analysis
  • 001. Learning objectives
  • 002. 16.1 Security Baselines and Anomalies
  • 004. 16.3 Document and Communicate Findings

  • 022. Module 5 Network and Communications Security
  • 001. Module introduction

  • 023. Lesson 17 Fundamental Networking Concepts
  • 001. Learning objectives
  • 002. 17.1 OSI and TCPIP Reference Models
  • 003. 17.2 Network Topologies and Relationships
  • 004. 17.3 Commonly Used Ports and Protocols
  • 005. 17.4 Transmission Media Types
  • 006. 17.5 Software-Defined Networking (SDN)

  • 024. Lesson 18 Network Attacks
  • 001. Learning objectives
  • 002. 18.1 Spoofing and Flooding
  • 003. 18.2 Denial of Service and Botnets
  • 004. 18.3 MitM and Poisoning
  • 005. 18.4 Wireless Attacks

  • 025. Lesson 19 Network Access Controls
  • 001. Learning objectives
  • 002. 19.1 RADIUS and TACACS+
  • 003. 19.2 IEEE 802.1x PNAC
  • 004. 19.3 Remote Access Security
  • 005. 19.4 IPsec v4 and v6

  • 026. Lesson 20 Manage Network Security
  • 001. Learning objectives
  • 002. 20.1 Security Device Placement
  • 003. 20.2 Zoning and Segmentation
  • 004. 20.3 Secure Routers
  • 005. 20.4 Secure Switches

  • 027. Lesson 21 Network Security Device Operation
  • 001. Learning objectives
  • 002. 21.1 Firewalls and Proxies
  • 003. 21.2 IDS and IPS
  • 004. 21.3 Traffic Shaping

  • 028. Lesson 22 Secure Wireless Communication
  • 001. Learning objectives
  • 002. 22.1 Survey of Wireless Technologies
  • 003. 22.2 Authentication and Encryption Protocols
  • 004. 22.3 Internet of Things (IoT)

  • 029. Module 6 Systems and Application Security
  • 001. Module introduction

  • 030. Lesson 23 Identify Malicious Code and Actions
  • 001. Learning objectives
  • 002. 23.1 Survey of Malware
  • 003. 23.2 Malware Countermeasures
  • 004. 23.3 Survey of Malicious Exploits and Activity
  • 005. 23.4 Malware Activity Countermeasures
  • 006. 23.5 Social Engineering and Countermeasures

  • 031. Lesson 24 Implement Endpoint Security
  • 001. Learning objectives
  • 002. 24.1 HIPS and Host-based Firewalls
  • 003. 24.2 Endpoint Encryption and TPM
  • 004. 24.3 Secure Browsers
  • 005. 24.4 Endpoint Detection and Response (EDR)

  • 032. Lesson 25 Enterprise Mobility Management (EMM)
  • 001. Learning objectives
  • 002. 25.1 MDM vs. MAM
  • 003. 25.2 Provisioning Techniques
  • 004. 25.3 Containerization and Encryption
  • 005. 25.4 Mobile Application Management (MAM)

  • 033. Lesson 26 Cloud Security
  • 001. Learning objectives
  • 002. 26.1 Service and Deployment Models
  • 003. 26.2 Legal and Regulatory Concerns
  • 004. 26.3 Data Storage, Processing, and Transmission
  • 005. 26.4 Third-party and Outsourcing Requirements

  • 034. Lesson 27 Operate Secure Virtual Environments
  • 001. Learning objectives
  • 002. 27.1 Types of Hypervisors
  • 003. 27.2 Containers
  • 004. 27.3 Virtual Appliance Continuity and Resilience
  • 005. 27.4 Attacks and Countermeasures

  • 035. Module 7 Incident Response and Recovery
  • 001. Module introduction

  • 036. Lesson 28 Incident Response Lifecycle
  • 001. Learning objectives
  • 002. 28.1 Preparation
  • 003. 28.2 Detection, Analysis, and Escalation
  • 004. 28.3 Containment and Eradication
  • 005. 28.4 Recovery and Lessons Learned

  • 037. Lesson 29 Forensic Investigations
  • 001. Learning objectives
  • 002. 29.1 Legal and Ethical Principles
  • 003. 29.2 Evidence Handling
  • 004. 29.3 Reporting of Analysis

  • 038. Lesson 30 Business Continuity Planning
  • 001. Learning objectives
  • 002. 30.1 Business Impact Analysis (BIA)
  • 003. 30.2 Backup, Redundancy, and Restoration
  • 004. 30.3 Disaster Recovery Planning (DRP)
  • 005. 30.4 Testing and Drills

  • 039. Summary
  • 001. Systems Security Certified Practitioner (SSCP) Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 8423
    حجم: 2921 مگابایت
    مدت زمان: 787 دقیقه
    تاریخ انتشار: ۱۲ فروردین ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید