وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Total Comptia Cysaplus Cybersecurity Analyst Cs0-002

سرفصل های دوره
  • 00001 Welcome to the Course
  • 00002 All About the Exam
  • 00003 What s New in the CompTIA CySA+ Exam
  • 00004 Meet the Instructors
  • 00005 Thinking Like the Enemy
  • 00006 Tools of the Trade
  • 00007 Intelligence Sources and Confidence Levels
  • 00008 Threat Indicators and Actors
  • 00009 Threat Trends
  • 00010 Intelligence Cycle and ISACs
  • 00011 Attack Frameworks
  • 00012 Threat Research
  • 00013 Threat Modelling and Intelligence Sharing
  • 00014 Vulnerability Identification
  • 00015 Scanning Parameters and Criteria
  • 00016 Scanning Special Considerations
  • 00017 Validation
  • 00018 Remediation and Mitigation
  • 00019 Inhibitors to Remediation
  • 00020 Web Applications Scanners Part 1
  • 00021 Web Applications Scanners Part 2
  • 00022 Scanning
  • 00023 Configuring and Executing Scans
  • 00024 Vulnerability Scanning
  • 00025 Reverse Engineering
  • 00026 Enumeration
  • 00027 Wireless Assessment Tools
  • 00028 Cloud Assessment Tools
  • 00029 Mobile and IoT
  • 00030 Embedded and Firmware Systems RTOS SoC and FPGA
  • 00031 Access and Vehicles Risk
  • 00032 Automation and Control Risk
  • 00033 Cloud Models
  • 00034 Remote Service Invocation FaaS IaC API
  • 00035 Cloud Vulnerabilities
  • 00036 Injection and Overflow Attacks
  • 00037 Authentication Attacks
  • 00038 Exploits
  • 00039 Application Vulnerabilities Part 1
  • 00040 Application Vulnerabilities Part 2
  • 00041 Network Architecture and Asset Management
  • 00042 Protecting Your Territory
  • 00043 Identity and Access Management
  • 00044 Encryption and Active Defense
  • 00045 Platforms
  • 00046 SOA and DevSecOps
  • 00047 Secure Software Development
  • 00048 Best Coding Practices
  • 00049 Trusted Hardware
  • 00050 Hardware Encryption
  • 00051 Hardware Security
  • 00052 Data Analytics
  • 00053 Endpoint Security
  • 00054 Recon Results Part 1
  • 00055 Recon Results Part 2
  • 00056 Impact Analysis
  • 00057 Collective Tools
  • 00058 Query Writing
  • 00059 Email Analysis Part 1
  • 00060 Email Analysis Part 2
  • 00061 Permissions
  • 00062 Firewalls
  • 00063 Intrusion Prevention Rules
  • 00064 DLP and Endpoint Detection
  • 00065 Threat Hunting and the Hypothesis
  • 00066 Threat Hunting Process
  • 00067 Results and Benefits
  • 00068 Workflow and Scripting
  • 00069 API and Malware Signature Creation
  • 00070 Threat Feeds and Machine Learning
  • 00071 Protocols Standards and Software Engineering
  • 00072 IR Roles and Responsibilities
  • 00073 IR Active Preparation
  • 00074 Incident Response Process
  • 00075 Network Symptoms
  • 00076 Host Symptoms
  • 00077 Application Symptoms
  • 00078 Digital Forensics
  • 00079 Seizure and Acquisitions
  • 00080 Forensics Acquisition Tools
  • 00081 Mobile Virtualization and Cloud
  • 00082 Forensics Analysis Part 1
  • 00083 Forensics Analysis Part 2
  • 00084 Packet Capture
  • 00085 Data Privacy and Security
  • 00086 Nontechnical Controls
  • 00087 Technical Controls
  • 00088 Business Impact Analysis
  • 00089 Risk Identification
  • 00090 Risk Calculation and Communication
  • 00091 Training
  • 00092 Supply Chain Assessment
  • 00093 Frameworks
  • 00094 Policies and Procedures
  • 00095 Controls and Procedures
  • 00096 Verification
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 7989
    حجم: 45630 مگابایت
    مدت زمان: 678 دقیقه
    تاریخ انتشار: 20 اسفند 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید