دورة شهادة Security+ (SY0-601)
في هذه الدورة يتم شرح مواضيع شهادة Security+ (SY0-601) من المنهج الرسمي المعتمد من CompTIA
0.0(0 تقييم)
64 طالب ملتحق
عن الدورة
في هذه الدورة يتم شرح مواضيع شهادة Security+ (SY0-601) من المنهج الرسمي المعتمد من CompTIA
محتوى الدورة
-
00- Introduction00:40:49
-
01- Comparing Security Roles and Security Controls00:37:49
-
02- Explaining Threat Actors and Threat Intelligence00:57:46
-
03.1- Performing Security Assessments - Part 100:55:32
-
03.2- Performing Security Assessments - Part 2 (Exploring the Lab Environment Lab)00:29:16
-
03.3- Performing Security Assessments - Part 3 (Scanning and Identifying Network Nodes Lab)00:32:16
-
03.4- Performing Security Assessments - Part 400:33:51
-
03.5- Performing Security Assessments - Part 5 (Intercepting and Interpreting Network Traffic Lab)00:30:55
-
03.6- Performing Security Assessments - Part 600:59:55
-
03.7- Performing Security Assessments - Part 7 ( Credentialed Vulnerability Scan Lab)00:25:51
-
04.1- Identifying Social Engineering and Malware - Part 100:46:39
-
04.2- Identifying Social Engineering and Malware - Part 200:55:02
-
04.3- Identifying Social Engineering and Malware - Part 3 (Malware-based Backdoor Lab)00:27:27
-
05- Summarizing Basic Cryptographic Concepts01:40:22
-
06.1- Implementing Public Key Infrastructure - Part 101:02:49
-
06.2- Implementing Public Key Infrastructure - Part 2 (Managing the Lifecycle of a Certificate Lab)00:32:51
-
07.1- Implementing Authentication Controls - Part 101:21:33
-
07.2- Implementing Authentication Controls - Part 2 (Password Cracking Lab)00:35:48
-
07.3- Implementing Authentication Controls - Part 3 (Managing Centralized Authentication Lab)00:30:12
-
08.1- Implementing Identity and Account Management Controls - Part 101:18:16
-
08.2- Implementing Identity and Account Management Controls - Part 2 (Access Controls Lab)00:33:58
-
08.3- Implementing Identity and Account Management Controls - Part 3 (Auditing Policies Lab)00:33:29
-
08.4- Implementing Identity and Account Management Controls - Part 4 (Access Controls in Linux Lab)00:35:40
-
09.1- Implementing Secure Network Designs - Part 100:57:41
-
09.2- Implementing Secure Network Designs - Part 201:20:12
-
09.3- Implementing Secure Network Designs - Part 3 (Implementing a Secure Network Design Lab)00:32:02
-
10.1- Implementing Network Security Appliances - Part 101:06:16
-
10.2- Implementing Network Security Appliances - Part 2 (Configuring a Firewall Lab)00:22:32
-
10.3- Implementing Network Security Appliances - Part 3 (Intrusion Detection System Lab)00:35:10
-
11.1- Implementing Secure Network Protocols - Part 101:04:30
-
11.2 - Implementing Secure Network Protocols - Part 2 (Secure Network Addressing Services Lab)00:25:47
-
11.3- Implementing Secure Network Protocols - Part 3 (Implementing a Virtual Private Network Lab)00:21:20
-
11.4- Implementing Secure Network Protocols - Part 4 (Implementing a Secure SSH Server Lab)00:41:09
-
12.1- Implementing Host Security Solutions - Part 100:17:25
-
12.2- Implementing Host Security Solutions - Part 2 (Implementing Endpoint Protection Lab)00:22:14
-
13- Implementing Secure Mobile Solutions00:25:14
-
14.1- Summarizing Secure Application Concepts - Part 100:55:10
-
14.2- Summarizing Secure Application Concepts - Part 2 (Application Attack Indicators Lab)00:29:30
-
14.3- Summarizing Secure Application Concepts - Part 3 (Identifying a Browser Attack Lab)00:34:53
-
14.4- Summarizing Secure Application Concepts - Part 4 (Implementing PowerShell Security Lab)00:34:00
-
14.5- Summarizing Secure Application Concepts - Part 5 (Identifying Malicious Code Lab)00:24:35
-
15- Implementing Secure Cloud Solutions00:49:27
-
16- Explaining Data Privacy and Protection Concepts00:24:15
-
17.1- Performing Incident Response - Part 101:00:00
-
17.2- Performing Incident Response - Part 2 (Managing Data Sources for Incident Response Lab)00:41:57
-
17.3- Performing Incident Response - Part 3 (Configuring Mitigation Controls Lab)00:18:34
-
18.1- Explaining Digital Forensics - Part 100:11:42
-
18.2- Explaining Digital Forensics - Part 2 (Acquiring Digital Forensics Evidence Lab)00:34:20
-
19- Summarizing Risk Management Concepts00:44:00
-
20.1- Implementing Cybersecurity Resilience - Part 100:11:07
-
20.2- Implementing Cybersecurity Resilience - Part 2 (Backing Up Data in Windows and Linux Lab)00:23:42
-
21- Explaining Physical Security00:16:36
المحاضرون
التقييمات
لا يوجد تقييمات