پیشنهاد فرادرس

آموزش گواهینامه CISSP - قسمت 3 - معماری و مهندسی امنیت

دسته بندی ها: آموزش سیسکو ، آموزش امنیت شبکه ، آموزش شبکه ، آموزش های لیندا (Lynda)

Certified Information Systems Security Professional به اختصار CISSP استاندارد اصلی گواهینامه امنیتی فناوری اطلاعات است. مهندسی امنیت، تضمین می کند که سیستم ها برای مقابله با انواع خطرات و اختلالات، از هکرها و از بین رفتن پایگاه داده ها گرفته تا قطعی برق طراحی شده اند.  این دوره، همه نکاتی را که شما نیاز دارید برای تعادل نیازهای تجاری با خطرات امنیتی و طراحی سیستم های امن تر بدانید پوشش می دهد.

سرفصل:

  • درک اصول و مدل های طراحی امنیتی
  • رایانش ابری و مصورسازی
  • امنیت سخت افزار
  • آسیب پذیری های کلاینت و سرور
  • آسیب پذیری های امنیتی وب
  • ایمن سازی دستگاه های تلفن همراه و دستگاه های هوشمند
  • درک رمزگذاری
  • رمزنگاری متقارن و نامتقارن
  • مدیریت کلیدی و زیرساخت کلیدی عمومی
  • و غیره
CISSP Cert Prep: 3 Security Architecture and Engineering Publisher:Lynda Author:Mike Chapple Duration:4h 21m Level:Advanced

Prepare for domain three-Security Architecture and Engineering-of the CISSP certification exam. Get study tips and practice questions for topics such as device security, cryptography, and key management.
Released: 3/8/2018
Certified Information Systems Security Professional (CISSP) is the gold standard in IT security certification. Prepare for domain three of the exam-Security Architecture and Engineering-in this installment of CISSP Cert Prep.
Security engineering ensures systems are designed to deal with all sorts of risks and disruptions, from hackers and database meltdowns to electrical outages. In this course, security expert Mike Chapple covers everything you need to know to balance business needs with security risks and design more secure systems. He covers cloud computing, as well as hardware, web, and mobile security; client and server vulnerabilities; smart device security; and physical security, such as site design and monitoring. Plus, get a deep dive into cryptography, one of the most powerful tools that IT pros can use to secure data and accounts.
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx. You can also join Mike's free study group at certmike.com.
Note: This course is part of a series releasing throughout 2018. A completed Learning Path of the series will be available once all the courses are released.
Topics include:
Understanding security design principles and models
Cloud computing and virtualization
Hardware security
Client and server vulnerabilities
Web security vulnerabilities
Securing mobile devices and smart devices
Understanding encryption
Symmetric and asymmetric cryptography
Key management and public key infrastructure
Physical security
Introduction
Welcome
2m 53s
What you need to know
46s
1. Security Engineering
Secure design principles
5m 18s
Security models
4m 14s
Security requirements
3m 25s
2. Cloud Computing and Virtualization
Virtualization
4m 20s
Cloud computing models
3m 44s
Public cloud tiers
5m 35s
3. Hardware Security
Memory protection
3m 20s
Interface protection
4m 10s
High availability and fault tolerance
4m 52s
4. Client and Server Vulnerabilities
Client security issues
6m 16s
Server security issues
4m 25s
NoSQL databases
6m 53s
Large-scale parallel and distributed systems
4m 30s
5. Web Security
OWASP top ten
4m 52s
SQL Injection prevention
5m 20s
Cross-site scripting prevention
4m 2s
Cross-site request forgery prevention
4m 24s
Fuzz testing
6m 44s
Session hijacking
3m 50s
6. Mobile Security
Mobile device security
2m 35s
Mobile device management
6m 14s
Mobile device tracking
3m 14s
Mobile application security
4m 23s
Bring your own device (BYOD)
4m 47s
7. Smart Device Security
Industrial control systems
4m 36s
Smart home technology
3m 6s
Securing the Internet of Things
2m 57s
Secure networking for the Internet of Things
2m 28s
8. Encryption
Understanding encryption
3m 24s
Symmetric and asymmetric cryptography
5m 17s
Goals of cryptography
2m 49s
Codes and ciphers
3m 20s
Choosing encryption algorithms
3m 1s
The perfect encryption algorithm
3m 54s
The cryptographic life cycle
2m 49s
Digital rights management
2m 17s
9. Symmetric Cryptography
Data Encryption Standard (DES)
3m 19s
3DES
3m 35s
AES, Blowfish, and Twofish
6m 40s
RC4
2m 23s
Steganography
4m 55s
10. Asymmetric Cryptography
Rivest-Shamir-Adleman (RSA)
3m 26s
PGP and GnuPG
11m 9s
Elliptic-curve and quantum cryptography
3m 19s
11. Key Management
Key exchange
3m 4s
Diffie-Hellman
5m 12s
Key escrow
3m 13s
Key stretching
1m 55s
12. Public Key Infrastructure
Trust models
3m 1s
PKI and digital certificates
4m 28s
Hash functions
9m 11s
Digital signatures
4m 4s
Create a digital certificate
4m 33s
Revoke a digital certificate
1m 48s
13. Cryptanalytic Attacks
Brute-force attacks
3m 12s
Knowledge-based attacks
2m 10s
14. Physical Security
Site and facility design
3m 7s
Data center environmental controls
4m 8s
Data center environmental protection
4m 58s
Physical security control types
3m 33s
Physical access control
4m 6s
Visitor management
1m 35s
Conclusion
Next steps
41s

پیشنهاد فرادرس

لینک های دانلود حجم فایل: 475.0MB همراه با زیرنویس انگلیسی Lynda CISSP Cert Prep 3 Security Architecture and Engineering_git.ir.rar
captcha