وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

The Complete Certified in Cybersecurity (CC) course ISC2 ’23

سرفصل های دوره

Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 - 2023


1. Introduction
  • 1.1 2022 ThorTeaches CC Study Guides Chapter 1 v1.2.pdf
  • 1.2 2022 ThorTeaches CC Study Guides Chapter 2 v1.1.pdf
  • 1.3 2022 ThorTeaches CC Study Guides Chapter 3 v1.1.pdf
  • 1.4 2022 ThorTeaches CC Study Guides Chapter 4 v1.1.pdf
  • 1.5 2022 ThorTeaches CC Study Guides Chapter 5 v1.pdf
  • 1.6 2023 CC Mnemonics by ThorTeaches.pdf
  • 1. Introduction and download your free study guides.
  • 2. Connect with me on Social media and the Udemy ratings system
  • 3. How to get the most out of my courses and the Udemy interface
  • 4. General Certified in Cybersecurity links.html

  • 2. CC Domain 1 Security Principles
  • 1. Domain 1 - What we will be covering.
  • 2. The differences between Information Security, IT Security, and Cybersecurity.
  • 3. The CIA Triad - Confidentiality, Integrity, and Availability - part 1
  • 4. The CIA Triad - Confidentiality, Integrity, and Availability - part 2
  • 5. The CIA Triad - Confidentiality, Integrity, and Availability - part 3
  • 6. The CIA Triad - Confidentiality, Integrity, and Availability - part 4
  • 7. The CIA Triad - Confidentiality, Integrity, and Availability - part 5
  • 8. The CIA Triad - Confidentiality, Integrity, and Availability - Quiz.html
  • 9. IAAA -Identification, Authentication, Authorization, and Accountability - part 1
  • 10. IAAA -Identification, Authentication, Authorization, and Accountability - part 2
  • 11. IAAA -Identification, Authentication, Authorization, and Accountability - part 3
  • 12. IAAA -Identification, Authentication, Authorization, and Accountability - part 4
  • 13. IAAA -Identification, Authentication, Authorization, and Accountability - part 5
  • 14. IAAA -Identification, Authentication, Authorization, and Accountability - Quiz.html
  • 15. Privacy
  • 16. Risk Management - part 1
  • 17. Risk Management - part 2
  • 18. Risk Management - part 3
  • 19. Risk Management - part 4
  • 20. Risk Management - part 5
  • 21. Risk Management - part 6
  • 22. Risk Management - Quiz.html
  • 23. Access Control Categories and Types - part 1
  • 24. Access Control Categories and Types - part 2
  • 25. Access Control Categories and Types Quiz.html
  • 26. The Ethics of your organizations and (ISC)2
  • 27. Governance vs. Management
  • 28. Laws and regulations - part 1
  • 29. Laws and regulations - part 2
  • 30. Security governance principles
  • 31. Policies, procedures, standards, laws, and regulations quiz.html
  • 32. What we covered in Domain 1
  • 33. Certified in Cybersecurity Domain 1 links.html

  • 3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response
  • 1. Domain 2 - What we will be covering.
  • 2. BCP - Business Continuity Planning - Part 1
  • 3. BCP - Business Continuity Planning - Part 2
  • 4. BCP - Business Continuity Planning - Part 3
  • 5. BCP - Business Continuity Planning - Quiz.html
  • 6. DRP - Disaster Recovery Planning - Part 1
  • 7. DRP - Disaster Recovery Planning - Part 2
  • 8. DRP - Disaster Recovery Planning - Part 3
  • 9. DRP - Disaster Recovery Planning - Part 4
  • 10. DRP - Disaster Recovery Planning - Quiz.html
  • 11. Incidents Response - Part 1
  • 12. Incidents Response - Part 2
  • 13. Incidents Response - Part 3
  • 14. Incidents Response - Part 4
  • 15. Incidents Response - Part 5
  • 16. Incidence response Quiz.html
  • 17. What we covered in Domain 2
  • 18. Certified in Cybersecurity Domain 2 links.html

  • 4. Domain 3 Access Controls Concepts
  • 1. Domain 3 - What we will be covering.
  • 2. Physical Security - part 1
  • 3. Physical Security - part 2
  • 4. Physical Security - part 3
  • 5. Physical Security - part 5
  • 6. Physical Security - part 4
  • 7. Physical Security Quiz.html
  • 8. Logical Access Control - Part 1
  • 9. Logical Access Control - Part 2
  • 10. Logical Access Control - Part 3
  • 11. Logical Access Control - Part 4
  • 12. Logical Access Control - Part 5
  • 13. Logical Access Control quiz.html
  • 14. What we covered in Domain 3
  • 15. Certified in Cybersecurity Domain 3 links.html

  • 5. Domain 4 Network Security
  • 1. Domain 4 - What we will be covering.
  • 2. Network Basics and Definitions - Part 1
  • 3. Network Basics and Definitions - Part 2
  • 4. Network Basics and Definitions - Quiz.html
  • 5. The OSI Model - Part 1
  • 6. The OSI Model - Part 2
  • 7. The OSI Model - Part 3
  • 8. The TCPIP model
  • 9. The OSI and TCPIP Model Quiz.html
  • 10. IP addresses, port numbers, and MAC addresses - Part 1
  • 11. IP addresses, port numbers, and MAC addresses - Part 2
  • 12. IP addresses, port numbers, and MAC addresses - Part 3
  • 13. IP addresses, port numbers, and MAC addresses - Quiz.html
  • 14. IP support protocols - Part 1
  • 15. IP support protocols - Part 2
  • 16. Cables - Part 1
  • 17. Cables - Part 2
  • 18. LAN topologies
  • 19. Wi-Fi
  • 20. Wireless networks - Part 1
  • 21. Wireless networks - Part 2
  • 22. VLANs and Routers - Part 1
  • 23. VLANs and Routers - Part 2
  • 24. VPNs, NAC, and third-party connectivity
  • 25. SDN, SD-WAN, and SDX
  • 26. DMZ, VLAN, VPN, Microsegmentation, Defense in depth, NAC IOT Quiz.html
  • 27. Attacks and attackers - Part 1
  • 28. Attacks and attackers - Part 2
  • 29. Attacks and attackers - Part 3
  • 30. Attacks and attackers Quiz.html
  • 31. Intrusion Detection and Prevention systems (IDS-IPS) - Part 1
  • 32. Intrusion Detection and Prevention systems (IDS-IPS) - Part 2
  • 33. Intrusion Detection and Prevention systems quiz.html
  • 34. SIEM and SOAR systems
  • 35. Honeynets and Honeypots
  • 36. Firewalls - Part 1
  • 37. Firewalls - Part 2
  • 38. 0-day attacks and exploits
  • 39. Vulnerability Scanning
  • 40. Virtualization, Cloud, and Distributed Computing - Part 1
  • 41. Virtualization, Cloud, and Distributed Computing - Part 2
  • 42. Virtualization, Cloud, and Distributed Computing - Part 3
  • 43. Virtualization, Cloud, and Distributed Computing - Part 4
  • 44. Virtualization, Cloud, and Distributed Computing - Part 5
  • 45. Virtualization, Cloud, and Distributed Computing - Quiz.html
  • 46. The Internet of Things (IoT)
  • 47. Asset tracking and hardware hardening
  • 48. Electricity
  • 49. Backups - Part 1
  • 50. Backups - Part 2
  • 51. Fault tolerance, redundancy, and resiliency - Part 1
  • 52. Fault tolerance, redundancy, and resiliency - Part 2
  • 53. Fault tolerance, redundancy, and resiliency - Part 3
  • 54. Fire suppression - Part 1
  • 55. Fire suppression - Part 2
  • 56. Data Centers Quiz.html
  • 57. Secure design principles - Part 1
  • 58. Secure design principles - Part 2
  • 59. What we covered in Domain 4
  • 60. Certified in Cybersecurity Domain 4 links.html

  • 6. Domain 5 Security Operations
  • 1. Domain 5 - What we will be covering.
  • 2. Configuration Management
  • 3. Patch Management.
  • 4. Change Management
  • 5. Change, patch, configuration management - Quiz.html
  • 6. Cryptography - Part 1
  • 7. Cryptography - Part 2
  • 8. Cryptography - Part 3
  • 9. Hashing
  • 10. Attacks on our cryptography
  • 11. Encryption Quiz.html
  • 12. Data handling, data storage and data retention - Part 1
  • 13. Data handling, data storage and data retention - Part 2
  • 14. Data handling, data storage and data retention - Part 3
  • 15. Retention, classification, labeling quiz.html
  • 16. Administrative (Directive) Controls
  • 17. Training and awareness
  • 18. Social Engineering attacks - Part 1
  • 19. Social Engineering attacks - Part 2
  • 20. Training. awareness and social engineering quiz.html
  • 21. What we covered in Domain 5
  • 22. Certified in Cybersecurity Domain 5 links.html

  • 7. The study process, material, tips, tricks and practice tests!
  • 1. How to approach practice questions
  • 2. CC Exam emulation - FULL practice test #1.html
  • 3. CC Exam emulation - FULL practice test #2.html
  • 4. How to design your career and certification path.
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 3239
    حجم: 6367 مگابایت
    مدت زمان: 874 دقیقه
    تاریخ انتشار: ۲۹ دی ۱۴۰۱
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید