وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Technologies and Tools for CompTIA Security+

سرفصل های دوره

IT Security is one of the fastest-growing and most in-demand skillsets in IT. This course focuses on the tools and technologies required to deploy and troubleshoot a company's security infrastructure.

  • 01 - Module Intro
  • 02 - TCP_IP and OSI Models
  • 03 - Firewalls
  • 04 - Application Firewall
  • 05 - VPN
  • 06 - Transport Encryption
  • 07 - Intrusion Detection and Prevention
  • 08 - IDS Component Workflow
  • 09 - Four Approaches to IDS
  • 10 - Network Based IDS
  • 11 - Reacting to Alerts_issues
  • 12 - Routers
  • 13 - Switches
  • 14 - Layer 2 vs. Layer 3
  • 15 - Load Balancers
  • 16 - Load Balancer Terms
  • 17 - Web Security Gateways
  • 18 - Port Security
  • 19 - Loop Protection and Flood Controls
  • 20 - Data Loss Prevention (DLP)
  • 21 - Spanning Tree Protocol (STP)
  • 22 - Access Points_WiFi Security
  • 23 - Security Information and Event Management (SIEM)
  • 24 - Network Access Control (NAC)
  • 25 - Hardware Based Encryption
  • 26 - Mail Gateway
  • 27 - Additional Things to Consider
  • 28 - Module Overview and Interpreting the Results
  • 29 - Protocol Analyzers
  • 30 - Network Scanners
  • 31 - Rogue Machine Detection
  • 32 - Port Scanner
  • 33 - Wireless Scanners
  • 34 - Vulnerability Scanner
  • 35 - Exploitation Frameworks
  • 36 - Data Sanitization Tools
  • 37 - Steganography
  • 38 - Honeypots
  • 39 - Backup Utilities
  • 40 - Banner Grabbing
  • 41 - Passive vs. Active Tools
  • 42 - Command Line Tools
  • 43 - Module Intro_why Should You Care
  • 44 - Unencrypted Credentials
  • 45 - Log and Event Anomalies
  • 46 - Access Violations
  • 47 - Certificate Issues_certificate Hierarchy
  • 48 - Mis-configured Devices
  • 49 - Weak Security Configurations
  • 50 - Personnel Issues
  • 51 - Unauthorized Software
  • 52 - Baseline Deviation
  • 53 - Asset Management
  • 54 - Authentication Issues
  • 55 - Module Intro
  • 56 - HIDS_HIPS
  • 57 - Anti-virus
  • 58 - File Integrity Checks
  • 59 - Host-based Firewalls
  • 60 - Removable Media Controls
  • 61 - Advanced Malware and Patch Management Tools
  • 62 - Unified Threat Management (UTM)
  • 63 - Data Loss Prevention (DLP)
  • 64 - Data Execution Prevention (DEP)
  • 65 - Module Intro and Cellular Risks
  • 66 - Securing WiFi
  • 67 - Near Field Communication (NFC)
  • 68 - Additional Areas of Concern (SATCOM, Bluetooth, Infrared)
  • 69 - Device Security
  • 70 - Application Security and Key_credential Management
  • 71 - Authentication
  • 72 - Geo-tagging
  • 73 - Context-aware Authentication
  • 74 - Enforcement and Monitoring
  • 75 - BYOD Concerns and Deployment Models
  • 76 - Additional BYOD Concerns
  • 77 - Module Review
  • 78 - Module Intro_why Should You Care
  • 79 - Secure Protocols and Networking Protocols
  • 80 - DNSSEC
  • 81 - SSH
  • 82 - S_MIME
  • 83 - SRTP
  • 84 - LDAPS
  • 85 - FTPS and SFTP
  • 86 - SNMPv3
  • 87 - SSL_TLS
  • 88 - HTTPS
  • 89 - Secure POP_IMAP
  • 90 - Use Cases and Module Review
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 7138
    حجم: 3109 مگابایت
    مدت زمان: 212 دقیقه
    تاریخ انتشار: ۹ اسفند ۱۴۰۱
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید