Professor Messer's CompTIA Security+ SY0-601 Course Notes

دانلود کتاب Professor Messer's CompTIA Security+ SY0-601 Course Notes

31000 تومان موجود

کتاب یادداشت های دوره CompTIA Security SY0-601 پروفسور مسر نسخه زبان اصلی

دانلود کتاب یادداشت های دوره CompTIA Security SY0-601 پروفسور مسر بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 3


توضیحاتی در مورد کتاب Professor Messer's CompTIA Security+ SY0-601 Course Notes

نام کتاب : Professor Messer's CompTIA Security+ SY0-601 Course Notes
عنوان ترجمه شده به فارسی : یادداشت های دوره CompTIA Security SY0-601 پروفسور مسر
سری :
ناشر :
سال نشر :
تعداد صفحات : 133

زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 11 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


1.0 - Attacks, Threats, and Vulnerabilities
1.1 - Phishing
1.1 - Impersonation
1.1 - Dumpster Diving
1.1 - Shoulder Surfing
1.1 - Hoaxes
1.1 - Watering Hole Attacks
1.1 - Spam
1.1 - Influence Campaigns
1.1 - Other Social Engineering Attacks
1.1 - Principles of Social Engineering
1.2 - An Overview of Malware
1.2 - Viruses and Worms
1.2 - Ransomware and Crypto-malware
1.2 - Trojans and RATs
1.2 - Rootkits
1.2 - Spyware
1.2 - Bots and Botnets
1.2 - Logic Bombs
1.2 - Password Attacks
1.2 - Physical Attacks
1.2 - Adversarial Artificial Intelligence
1.2 - Supply Chain Attacks
1.2 - Cloud-based vs. On-Premises Attacks
1.2 - Cryptographic Attacks
1.3 - Privilege escalation
1.3 - Cross-site Scripting
1.3 - Injection Attacks
1.3 - Buffer Overflows
1.3 - Replay Attacks
1.3 - Request Forgeries
1.3 - Driver Manipulation
1.3 - SSL Stripping
1.3 - Race Conditions
1.3 - Other Application Attacks
1.4 - Rogue Access Points and Evil Twins
1.4 - Bluejacking and Bluesnarfing
1.4 - Wireless Disassociation Attacks
1.4 - Wireless Jamming
1.4 - RFID and NFC Attacks
1.4 - Randomizing Cryptography
1.4 - On-Path Attacks
1.4 - MAC Flooding and Cloning
1.4 - DNS Attacks
1.4 - Denial of Service
1.4 - Malicious Scripts
1.5 - Threat Actors
1.5 - Attack Vectors
1.5 - Threat Intelligence
1.5 - Threat Research
1.6 - Vulnerability Types
1.6 - Third-party Risks
1.6 - Vulnerability Impacts
1.7 - Threat Hunting
1.7 - Vulnerability Scans
1.7 - Security Information and Event Management
1.8 - Penetration Testing
1.8 - Reconnaissance
1.8 - Security Teams
2.0 - Architecture and Design
2.1 - Configuration Management
2.1 - Protecting Data
2.1 - Data Loss Prevention
2.1 - Managing Security
2.1 - Site Resiliency
2.1 - Honeypots and Deception
2.2 - Cloud Models
2.2 - Edge and Fog Computing
2.2 - Designing the Cloud
2.2 - Infrastructure as Code
2.2 - Virtualization Security
2.3 - Secure Deployments
2.3 - Provisioning and Deprovisioning
2.3 - Secure Coding Techniques
2.3 - Software Diversity
2.3 - Automation and Scripting
2.4 - Authentication Methods
2.4 - Biometrics
2.4 - Multi-factor Authentication
2.5 - Disk Redundancy
2.5 - Network Redundancy
2.5 - Power Redundancy
2.5 - Replication
2.5 - Backup Types
2.5 - Resiliency
2.6 - Embedded Systems
2.6 - Embedded Systems Communication
2.6 - Embedded Systems Constraints
2.7 - Physical Security Controls
2.7 - Secure Areas
2.7 - Secure Data Destruction
2.8 - Cryptography Concepts
2.8 - Symmetric and Asymmetric Cryptography
2.8 - Hashing and Digital Signatures
2.8 - Cryptographic Keys
2.8 - Steganography
2.8 - Quantum Computing
2.8 - Stream and Block Ciphers
2.8 - Blockchain Technology
2.8 - Cryptography Use Cases
2.8 - Cryptography Limitations
3.0 - Implementation
3.1 - Secure Protocols
3.2 - Endpoint Protection
3.2 - Boot Integrity
3.2 - Database Security
3.2 - Application Security
3.2 - Application Hardening
3.3 - Load Balancing
3.3 - Network Segmentation
3.3 - Virtual Private Networks
3.3 - Port Security
3.3 - Secure Networking
3.3 - Firewalls
3.3 - Network Access Control
3.3 - Proxies
3.3 - Intrusion Prevention
3.3 - Other Network Appliances
3.4 - Wireless Cryptography
3.4 - Wireless Authentication Methods
3.4 - Wireless Authentication Protocols
3.4 - Installing Wireless Networks
3.5 - Mobile Networks
3.5 - Mobile Device Management
3.5 - Mobile Device Security
3.5 - Mobile Device Enforcement
3.5 - Mobile Deployment Models
3.6 - Cloud Security Controls
3.6 - Securing Cloud Storage
3.6 - Securing Cloud Networks
3.6 - Securing Compute Clouds
3.6 - Cloud Security Solutions
3.7 - Identity Controls
3.7 - Account Types
3.7 - Account Policies
3.8 - Authentication Management
3.8 - PAP and CHAP
3.8 - Identity and Access Services
3.8 - Federated Identities
3.8 - Access Control
3.9 - Public Key Infrastructure
3.9 - Certificates
3.9 - Certificate Formats
3.9 - Certificate Concepts
4.0 - Operations and Incident Response
4.1 - Reconnaissance Tools
4.1 - File Manipulation Tools
4.1 - Shell and Script Environments
4.1 - Packet Tools
4.1 - Forensic Tools
4.2 - Incident Response Process
4.2 - Incident Response Planning
4.2 - Attack Frameworks
4.3 - Vulnerability Scan Output
4.3 - SIEM Dashboards
4.3 - Log files
4.3 - Log Management
4.4 - Endpoint Security Configuration
4.4 - Security Configurations
4.5 - Digital Forensics
4.5 - Forensics Data Acquisition
4.5 - On-Premises vs. Cloud Forensics
4.5 - Managing Evidence
5.0 - Governance, Risk, and Compliance
5.1 - Security Controls
5.2 - Security Regulations and Standards
5.2 - Security Frameworks
5.2 - Secure Configurations
5.3 - Personnel Security
5.3 - Third-party Risk Management
5.3 - Managing Data
5.3 - Credential Policies
5.3 - Organizational Policies
5.4 - Risk Management Types
5.4 - Risk Analysis
5.4 - Business Impact Analysis
5.5 - Privacy and Data Breaches
5.5 - Data Classifications
5.5 - Enhancing privacy
5.5 - Data Roles and Responsibilities




پست ها تصادفی