وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Technologies and Tools for CompTIA Security+

سرفصل های دوره

IT Security is one of the fastest-growing and most in-demand skillsets in IT. This course focuses on the tools and technologies required to deploy and troubleshoot a company's security infrastructure.

  • 01 - Module Intro
  • 02 - TCP_IP and OSI Models
  • 03 - Firewalls
  • 04 - Application Firewall
  • 05 - VPN
  • 06 - Transport Encryption
  • 07 - Intrusion Detection and Prevention
  • 08 - IDS Component Workflow
  • 09 - Four Approaches to IDS
  • 10 - Network Based IDS
  • 11 - Reacting to Alerts_issues
  • 12 - Routers
  • 13 - Switches
  • 14 - Layer 2 vs. Layer 3
  • 15 - Load Balancers
  • 16 - Load Balancer Terms
  • 17 - Web Security Gateways
  • 18 - Port Security
  • 19 - Loop Protection and Flood Controls
  • 20 - Data Loss Prevention (DLP)
  • 21 - Spanning Tree Protocol (STP)
  • 22 - Access Points_WiFi Security
  • 23 - Security Information and Event Management (SIEM)
  • 24 - Network Access Control (NAC)
  • 25 - Hardware Based Encryption
  • 26 - Mail Gateway
  • 27 - Additional Things to Consider
  • 28 - Module Overview and Interpreting the Results
  • 29 - Protocol Analyzers
  • 30 - Network Scanners
  • 31 - Rogue Machine Detection
  • 32 - Port Scanner
  • 33 - Wireless Scanners
  • 34 - Vulnerability Scanner
  • 35 - Exploitation Frameworks
  • 36 - Data Sanitization Tools
  • 37 - Steganography
  • 38 - Honeypots
  • 39 - Backup Utilities
  • 40 - Banner Grabbing
  • 41 - Passive vs. Active Tools
  • 42 - Command Line Tools
  • 43 - Module Intro_why Should You Care
  • 44 - Unencrypted Credentials
  • 45 - Log and Event Anomalies
  • 46 - Access Violations
  • 47 - Certificate Issues_certificate Hierarchy
  • 48 - Mis-configured Devices
  • 49 - Weak Security Configurations
  • 50 - Personnel Issues
  • 51 - Unauthorized Software
  • 52 - Baseline Deviation
  • 53 - Asset Management
  • 54 - Authentication Issues
  • 55 - Module Intro
  • 56 - HIDS_HIPS
  • 57 - Anti-virus
  • 58 - File Integrity Checks
  • 59 - Host-based Firewalls
  • 60 - Removable Media Controls
  • 61 - Advanced Malware and Patch Management Tools
  • 62 - Unified Threat Management (UTM)
  • 63 - Data Loss Prevention (DLP)
  • 64 - Data Execution Prevention (DEP)
  • 65 - Module Intro and Cellular Risks
  • 66 - Securing WiFi
  • 67 - Near Field Communication (NFC)
  • 68 - Additional Areas of Concern (SATCOM, Bluetooth, Infrared)
  • 69 - Device Security
  • 70 - Application Security and Key_credential Management
  • 71 - Authentication
  • 72 - Geo-tagging
  • 73 - Context-aware Authentication
  • 74 - Enforcement and Monitoring
  • 75 - BYOD Concerns and Deployment Models
  • 76 - Additional BYOD Concerns
  • 77 - Module Review
  • 78 - Module Intro_why Should You Care
  • 79 - Secure Protocols and Networking Protocols
  • 80 - DNSSEC
  • 81 - SSH
  • 82 - S_MIME
  • 83 - SRTP
  • 84 - LDAPS
  • 85 - FTPS and SFTP
  • 86 - SNMPv3
  • 87 - SSL_TLS
  • 88 - HTTPS
  • 89 - Secure POP_IMAP
  • 90 - Use Cases and Module Review
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 7138
    حجم: 3109 مگابایت
    مدت زمان: 212 دقیقه
    تاریخ انتشار: 9 اسفند 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید