Security+ SY0-601 Prep
محتوى الدورة
الدروس [مكتملة]
- 40:49
- 37:49
02- Explaining Threat Actors and Threat Intelligence
57:4503.1- Performing Security Assessments – Part 1
55:3103.2- Performing Security Assessments – Part 2 (Exploring the Lab Environment Lab)
29:1503.3- Performing Security Assessments – Part 3 (Scanning and Identifying Network Nodes Lab)
32:1503.4- Performing Security Assessments – Part 4
33:5103.5- Performing Security Assessments – Part 5 (Intercepting and Interpreting Network Traffic with Packet Sniffing Tools Lab)
30:5403.6- Performing Security Assessments – Part 6
59:5503.7- Performing Security Assessments – Part 7 (Analyzing the Results of a Credentialed Vulnerability Scan Lab)
25:5004.1- Identifying Social Engineering and Malware – Part 1
46:3904.2- Identifying Social Engineering and Malware – Part 2
55:0104.3- Identifying Social Engineering and Malware – Part 3 (Installing, Using, and Blocking a Malware-based Backdoor Lab)
27:2605- Summarizing Basic Cryptographic Concepts
01:40:2106.1- Implementing Public Key Infrastructure – Part 1
01:02:4806.2- Implementing Public Key Infrastructure – Part 2 (Managing the Lifecycle of a Certificate Lab)
32:5007.1- Implementing Authentication Controls – Part 1
01:21:3307.2- Implementing Authentication Controls – Part 2 (Auditing Passwords with a Password Cracking Utility Lab)
35:4707.3- Implementing Authentication Controls – Part 3 (Managing Centralized Authentication Lab)
30:1108.1- Implementing Identity and Account Management Controls – Part 1
01:18:1508.2- Implementing Identity and Account Management Controls – Part 2 (Managing Access Controls in Windows Server Lab)
33:5708.3- Implementing Identity and Account Management Controls – Part 3 (Configuring a System for Auditing Policies Lab)
33:2808.4- Implementing Identity and Account Management Controls – Part 4 (Managing Access Controls in Linux Lab)
35:3909.1- Implementing Secure Network Designs – Part 1
57:4009.2- Implementing Secure Network Designs – Part 2
01:20:1109.3- Implementing Secure Network Designs – Part 3 (Implementing a Secure Network Design Lab)
32:0210.1- Implementing Network Security Appliances – Part 1
01:06:1610.2- Implementing Network Security Appliances – Part 2 (Configuring a Firewall Lab)
22:3210.3- Implementing Network Security Appliances – Part 3 (Configuring an Intrusion Detection System Lab)
35:1011.1- Implementing Secure Network Protocols – Part 1
01:04:3011.2- Implementing Secure Network Protocols – Part 2 (Implementing Secure Network Addressing Services Lab)
25:4611.3- Implementing Secure Network Protocols – Part 3 (Implementing a Virtual Private Network Lab)
21:2011.4- Implementing Secure Network Protocols – Part 4 (Implementing a Secure SSH Server Lab)
41:0812.1- Implementing Host Security Solutions – Part 1
17:2412.2- Implementing Host Security Solutions – Part 2 (Implementing Endpoint Protection Lab)
22:1413- Implementing Secure Mobile Solutions
25:1414.1- Summarizing Secure Application Concepts – Part 1
55:1014.2- Summarizing Secure Application Concepts – Part 2 (Identifying Application Attack Indicators Lab)
29:2914.3- Summarizing Secure Application Concepts – Part 3 (Identifying a Browser Attack Lab)
34:5214.4- Summarizing Secure Application Concepts – Part 4 (Implementing PowerShell Security Lab)
33:5914.5- Summarizing Secure Application Concepts – Part 5 (Identifying Malicious Code Lab)
24:3515- Implementing Secure Cloud Solutions
49:2616- Explaining Data Privacy and Protection Concepts
24:1517.1- Performing Incident Response – Part 1
59:5917.2- Performing Incident Response – Part 2 (Managing Data Sources for Incident Response Lab)
41:5617.3- Performing Incident Response – Part 3 (Configuring Mitigation Controls Lab)
18:3318.1- Explaining Digital Forensics – Part 1
11:4218.2- Explaining Digital Forensics – Part 2 (Acquiring Digital Forensics Evidence Lab)
34:1919- Summarizing Risk Management Concepts
44:0020.1- Implementing Cybersecurity Resilience – Part 1
11:0720.2- Implementing Cybersecurity Resilience – Part 2
23:4221- Explaining Physical Security
16:36All Slides
00:00All Videos
00:00Full Course on Youtube
00:00
احصل على شهادة اتمام الدورة بعد الإنتهاء
أضف هذه الشهادة إلى سيرتك الذاتية لإثبات مهاراتك وزيادة فرصك في الحصول علي وظيفة.
تقييمات ومراجعات الطلاب
it was really a perfect certificate that teach me eveything i need about cybersecurity
نعم مناسبه
الدورة كانت ممتازة و نحتاج المزيد من دورات السايبر سكيورتي المجانية و لكن نتمنى ان تكون مدة الدورة اقصر
10/10
perfect
very benefit course
الدورة كويسة جدا
ممتازة
نعم كانت مناسبه جداا