وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

(SSCP) Systems Security Certified Practitioner, 2nd Edition

سرفصل های دوره

001. Introduction
  • 001. Systems Security Certified Practitioner (SSCP) Introduction

  • 002. Module 1 Security Operations and Administration
  • 001. Module introduction

  • 003. Lesson 1 Fundamental Security Concepts
  • 001. Learning Object
  • 002. 1.1 (ISC) Code of Ethics
  • 003. 1.2 Understand Security Concepts
  • 004. 1.3 Identify and Implement Security Controls
  • 005. 1.4 Document and Maintain Functional Security Controls

  • 004. Lesson 2 Security Management Lifecycles
  • 001. Learning objectives
  • 002. 2.2 Implementation and Operation Phases
  • 003. 2.3 Archiving and Disposal Phases
  • 004. 2.4 Change and Configuration Management

  • 005. Lesson 3 Security Awareness and Training
  • 001. Learning objectives
  • 002. 3.1 Security Training During Onboarding
  • 003. 3.2 Continual Security Awareness
  • 004. 3.3 Security Education for the Enterprise

  • 006. Lesson 4 Collaborate with Physical Security Operations
  • 001. Learning objectives
  • 002. 4.1 Defense-in-Depth
  • 003. 4.2 Campus Physical Security
  • 004. 4.3 Facility Physical Security
  • 005. 4.4 Operational Physical Security

  • 007. Module 2 Practical Cryptography
  • 001. Module introduction

  • 008. Lesson 5 Cryptography Use Cases
  • 001. Learning objectives
  • 002. 5.1 The CIAN Model
  • 003. 5.2 Data Sensitivity Cases
  • 004. 5.3 Regulatory Use Cases

  • 009. Lesson 6 Applied Cryptographic Concepts
  • 001. Learning objectives
  • 002. 6.1 Cryptographic Hashing and HMACs
  • 003. 6.2 Salt and Pepper
  • 004. 6.3 Symmetric vs. Asymmetric Cryptosystems
  • 005. 6.4 Digital Signatures
  • 006. 6.5 Strength of Encryption Algorithms and Keys
  • 007. 6.6 Cryptographic Attacks and Cryptanalysis

  • 010. Lesson 7 Public Key Infrastructure
  • 001. Learning objectives
  • 002. 7.1 Web of Trust
  • 003. 7.2 Digital Certificates
  • 004. 7.3 Internet PKI
  • 005. 7.4 Fundamental Key Management Concepts

  • 011. Lesson 8 Understand Secure Protocols
  • 001. Learning objectives
  • 002. 8.1 Services and Protocols
  • 003. 8.2 Common Use Cases
  • 004. 8.3 Limitations and Vulnerabilities

  • 012. Module 3 Access Controls
  • 001. Module introduction

  • 013. Lesson 9 Implement and Maintain Authentication Methods
  • 001. Learning objectives
  • 002. 9.1 SingleMulti-factor Authentication (MFA)
  • 003. 9.2 Single Sign-on (SSO) and Federated Access
  • 004. 9.3 Device Authentication

  • 014. Lesson 10 Support Internetwork Trust Architectures
  • 001. Learning objectives
  • 002. 10.1 Trust Relationships
  • 003. 10.2 Internet, Intranet, and Extranet
  • 004. 10.3 Third-party Connections

  • 015. Lesson 11 The Identity Management Lifecycle
  • 001. Learning objectives
  • 002. 11.1 Authorization and Proofing
  • 003. 11.2 Provisioning and De-Provisioning
  • 004. 11.3 Maintenance and Entitlement
  • 005. 11.4 Identity and Access Management (IAM) Systems

  • 016. Lesson 12 Understand and Apply Access Controls
  • 001. Learning objectives
  • 002. 12.1 Mandatory Access Controls (MAC)
  • 003. 12.2 Discretionary Access Controls
  • 004. 12.3 Role-Based Access Controls (RBAC)
  • 005. 12.4 Rule-Based Access Controls (ACLs)

  • 017. Module 4 Risk Identification, Monitoring and Analysis
  • 001. Module introduction

  • 018. Lesson 13 The Risk Management Process
  • 001. Learning objectives
  • 002. 13.1 Risk Management Concepts and Terminology
  • 003. 13.2 Risk Treatment and Tolerance
  • 004. 13.3 Qualitative vs. Quantitative Risk Analysis
  • 005. 13.4 Risk Management Frameworks
  • 006. 13.5 Regulatory and Legal Concerns

  • 019. Lesson 14 Vulnerability Assessment and Management
  • 001. Learning objectives
  • 002. 14.1 Vulnerability Management Lifecycle
  • 003. 14.2 Vulnerability Assessment Tools and Methods
  • 004. 14.3 Security Testing and Risk Review

  • 020. Lesson 15 Security Testing and Risk Review
  • 001. Learning objectives
  • 002. 15.1 Source Systems
  • 003. 15.2 Events of Interest
  • 004. 15.3 Log Management
  • 005. 15.4 Event Aggregation and Correlation

  • 021. Lesson 16 Risk Identification, Monitoring, and Analysis
  • 001. Learning objectives
  • 002. 16.1 Security Baselines and Anomalies
  • 003. 16.2 Visualizations, Metrics, and Trends
  • 004. 16.3 Document and Communicate Findings

  • 022. Module 5 Network and Communications Security
  • 001. Module introduction

  • 023. Lesson 17 Fundamental Networking Concepts
  • 001. Learning objectives
  • 002. 17.1 OSI and TCPIP Reference Models
  • 003. 17.2 Network Topologies and Relationships
  • 004. 17.3 Commonly Used Ports and Protocols
  • 005. 17.4 Transmission Media Types
  • 006. 17.5 Software-Defined Networking (SDN)

  • 024. Lesson 18 Network Attacks
  • 001. Learning objectives
  • 002. 18.1 Spoofing and Flooding
  • 003. 18.2 Denial of Service and Botnets
  • 004. 18.3 MitM and Poisoning
  • 005. 18.4 Wireless Attacks

  • 025. Lesson 19 Network Access Controls
  • 001. Learning objectives
  • 002. 19.1 RADIUS and TACACS+
  • 003. 19.2 IEEE 802.1x PNAC
  • 004. 19.3 Remote Access Security
  • 005. 19.4 IPsec v4 and v6

  • 026. Lesson 20 Manage Network Security
  • 001. Learning objectives
  • 002. 20.1 Security Device Placement
  • 003. 20.2 Zoning and Segmentation
  • 004. 20.3 Secure Routers
  • 005. 20.4 Secure Switches

  • 027. Lesson 21 Network Security Device Operation
  • 001. Learning objectives
  • 002. 21.1 Firewalls and Proxies
  • 003. 21.2 IDS and IPS
  • 004. 21.3 Traffic Shaping

  • 028. Lesson 22 Secure Wireless Communication
  • 001. Learning objectives
  • 002. 22.1 Survey of Wireless Technologies
  • 003. 22.2 Authentication and Encryption Protocols
  • 004. 22.3 Internet of Things (IoT)

  • 029. Module 6 Systems and Application Security
  • 001. Module introduction

  • 030. Lesson 23 Identify Malicious Code and Actions
  • 001. Learning objectives
  • 002. 23.1 Survey of Malware
  • 003. 23.2 Malware Countermeasures
  • 004. 23.3 Survey of Malicious Exploits and Activity
  • 005. 23.4 Malware Activity Countermeasures
  • 006. 23.5 Social Engineering and Countermeasures

  • 031. Lesson 24 Implement Endpoint Security
  • 001. Learning objectives
  • 002. 24.1 HIPS and Host-based Firewalls
  • 003. 24.2 Endpoint Encryption and TPM
  • 004. 24.3 Secure Browsers
  • 005. 24.4 Endpoint Detection and Response (EDR)

  • 032. Lesson 25 Enterprise Mobility Management (EMM)
  • 001. Learning objectives
  • 002. 25.1 MDM vs. MAM
  • 003. 25.2 Provisioning Techniques
  • 004. 25.3 Containerization and Encryption
  • 005. 25.4 Mobile Application Management (MAM)

  • 033. Lesson 26 Cloud Security
  • 001. Learning objectives
  • 002. 26.1 Service and Deployment Models
  • 003. 26.2 Legal and Regulatory Concerns
  • 004. 26.3 Data Storage, Processing, and Transmission
  • 005. 26.4 Third-party and Outsourcing Requirements

  • 034. Lesson 27 Operate Secure Virtual Environments
  • 001. Learning objectives
  • 002. 27.1 Types of Hypervisors
  • 003. 27.2 Containers
  • 004. 27.3 Virtual Appliance Continuity and Resilience
  • 005. 27.4 Attacks and Countermeasures

  • 035. Module 7 Incident Response and Recovery
  • 001. Module introduction

  • 036. Lesson 28 Incident Response Lifecycle
  • 001. Learning objectives
  • 002. 28.1 Preparation
  • 003. 28.2 Detection, Analysis, and Escalation
  • 004. 28.3 Containment and Eradication
  • 005. 28.4 Recovery and Lessons Learned

  • 037. Lesson 29 Forensic Investigations
  • 001. Learning objectives
  • 002. 29.1 Legal and Ethical Principles
  • 003. 29.2 Evidence Handling
  • 004. 29.3 Reporting of Analysis

  • 038. Lesson 30 Business Continuity Planning
  • 001. Learning objectives
  • 002. 30.1 Business Impact Analysis (BIA)
  • 003. 30.2 Backup, Redundancy, and Restoration
  • 004. 30.3 Disaster Recovery Planning (DRP)
  • 005. 30.4 Testing and Drills

  • 039. Summary
  • 001. Systems Security Certified Practitioner (SSCP) Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 8629
    حجم: 2951 مگابایت
    مدت زمان: 795 دقیقه
    تاریخ انتشار: 13 فروردین 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید