وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

The Complete Certified in Cybersecurity (CC) course ISC2 ’23

سرفصل های دوره

Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 - 2023


1. Introduction
  • 1.1 CC Study Guide by TechSerks.pdf
  • 1. Introduction
  • 2. Important Links.html

  • 2. Domain 1 - Security Principles
  • 1. 1.1 - Security Concepts
  • 2. 1.1.2,.3.4.5 The CIA Triad
  • 3. 1.1.6,1.1.7 - Authentication, IAAA
  • 4. 1.1.8 Non-Repudiation
  • 5. 1.1.9 Privacy
  • 6. 1.2.1 Understanding Risk Management
  • 7. 1.2.2 Understanding Risk Identification
  • 8. 1.2.3 Understanding Risk Assessment
  • 9. 1.2.4 Understanding Risk Treatment
  • 10. 1.2.5 Configuration Management
  • 11. 1.3.1 Security Controls
  • 12. 1.3.2 Technical Controls
  • 13. 1.3.3 Administrative Controls
  • 14. 1.3.4 Physical Controls
  • 15. 1.4.1 ISC2 Code of Ethics
  • 16. 1.5.0 Governance Process
  • 17. 1.5.1 Policies
  • 18. 1.5.2 Procedures
  • 19. 1.5.3 Standards
  • 20. 1.5.4 Regulation and laws
  • 21. 1.5.5 Best practice security policies

  • 3. Domain 2 - BC And DR And Incident Response Concepts
  • 1. 2.1.1 Domain 2 objectives
  • 2. 2.1.2 What is Business Continuity
  • 3. 2.1.3 Business Continuity Planning
  • 4. 2.1.4 Business Continuity Controls
  • 5. 2.1.5 What is high availability
  • 6. 2.1.6 What is fault tolerance
  • 7. 2.2.1 What is disaster recovery
  • 8. 2.2.2 Disaster recovery planning
  • 9. 2.2.3 Data backup
  • 10. 2.2.4 Types of disaster recovery sites
  • 11. 2.3.1 What is incident response
  • 12. 2.3.2 Create a incident response program
  • 13. 2.3.3 Create an incident response team
  • 14. 2.3.4 Incident communication planning
  • 15. 2.3.5 Identify incidents

  • 4. Domain 3 - Access Control Concepts
  • 1. 3.1.1 Domain 3 objectives
  • 2. 3.1.2 Physical security controls types
  • 3. 3.1.3 Monitoring physical access
  • 4. 3.1.4 Visitors management
  • 5. 3.1.5 Differences between Authorised and Non-authorised personnel
  • 6. 3.2.1 What is logical access controls
  • 7. 3.2.2 What is principle of least privilge
  • 8. 3.2.3 What is segregation of duties
  • 9. 3.2.4 What is DAC
  • 10. 3.2.5 What is MAC
  • 11. 3.2.6 What is RBAC

  • 5. Domain 4 - Network Security
  • 1. 4.1.1 Domain Objectives
  • 2. 4.1.2 Network types
  • 3. 4.1.3 Introducing TCP IP
  • 4. 4.1.4 The OSI Model
  • 5. 4.1.5 IP Addresses and DHCP
  • 6. 4.1.6 Network Ports
  • 7. 4.1.7 Network Cables
  • 8. 4.1.8 WiFi
  • 9. 4.1.9 VLANs
  • 10. 4.1.10 VPNs
  • 11. 4.2.1 Types of threats
  • 12. 4.2.2 Intrusion Detection and Prevention Systems
  • 13. 4.2.3 Malware Preventions
  • 14. 4.2.4 Port Scanners
  • 15. 4.2.5 Vulnerability Scanners
  • 16. 4.2.6 Firewalls
  • 17. 4.2.7 Honeynets and Honeypots
  • 18. 4.2.8 SIEM and SOAR systems
  • 19. 4.3.1 Types of Infrastracture, On-Premise, Cloud and Hybrid
  • 20. 4.3.2 Data center protection
  • 21. 4.3.3 Security Zones
  • 22. 4.3.4 Routers and Switches
  • 23. 4.3.5 VLANs and Network segmentation
  • 24. 4.3.6 Firewalls
  • 25. 4.3.7 VPNs and VPN Concentrator
  • 26. 4.3.8 Internet of Things (IoT)
  • 27. 4.3.9 Security IoT devices
  • 28. 4.3.10 Network Security for Smart devices

  • 6. Domain 5 - Security Operations
  • 1. 5.1.1 Domain Objectives
  • 2. 5.1.2 What is Data and Data Security
  • 3. 5.1.3 Understanding Encryption
  • 4. 5.1.4 Differences between symmetric vs asymmetric cryptography
  • 5. 5.1.5 Hashing
  • 6. 5.1.6 Data Handling
  • 7. 5.1.7 Data Classification
  • 8. 5.1.8 Logging and Monitoring Security Events
  • 9. 5.2.1 What is Configuration Management
  • 10. 5.2.2 Patch Management
  • 11. 5.3.1 Data Handling Policiess
  • 12. 5.3.2 Password Policies
  • 13. 5.3.3 Acceptable Use Policy (AUP)
  • 14. 5.3.4 Bring Your Own Device (BYOD) Policy
  • 15. 5.3.5 Change management
  • 16. 5.3.6 Privacy Policy
  • 17. 5.4.1 Social Engineering
  • 18. 5.4.2 Security Awareness Training

  • 7. Practice Exam Questions
  • 1. Practice Exam 1.html
  • 2. Practice Exam 2.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 18470
    حجم: 2177 مگابایت
    مدت زمان: 346 دقیقه
    تاریخ انتشار: ۳ شهریور ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید