دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: سری: ناشر: سال نشر: تعداد صفحات: [133] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 11 Mb
در صورت تبدیل فایل کتاب Professor Messer's CompTIA Security+ SY0-601 Course Notes به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب یادداشت های دوره CompTIA Security+ SY0-601 پروفسور مسر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
1.0 - Attacks, Threats, and Vulnerabilities 1.1 - Phishing 1.1 - Impersonation 1.1 - Dumpster Diving 1.1 - Shoulder Surfing 1.1 - Hoaxes 1.1 - Watering Hole Attacks 1.1 - Spam 1.1 - Influence Campaigns 1.1 - Other Social Engineering Attacks 1.1 - Principles of Social Engineering 1.2 - An Overview of Malware 1.2 - Viruses and Worms 1.2 - Ransomware and Crypto-malware 1.2 - Trojans and RATs 1.2 - Rootkits 1.2 - Spyware 1.2 - Bots and Botnets 1.2 - Logic Bombs 1.2 - Password Attacks 1.2 - Physical Attacks 1.2 - Adversarial Artificial Intelligence 1.2 - Supply Chain Attacks 1.2 - Cloud-based vs. On-Premises Attacks 1.2 - Cryptographic Attacks 1.3 - Privilege escalation 1.3 - Cross-site Scripting 1.3 - Injection Attacks 1.3 - Buffer Overflows 1.3 - Replay Attacks 1.3 - Request Forgeries 1.3 - Driver Manipulation 1.3 - SSL Stripping 1.3 - Race Conditions 1.3 - Other Application Attacks 1.4 - Rogue Access Points and Evil Twins 1.4 - Bluejacking and Bluesnarfing 1.4 - Wireless Disassociation Attacks 1.4 - Wireless Jamming 1.4 - RFID and NFC Attacks 1.4 - Randomizing Cryptography 1.4 - On-Path Attacks 1.4 - MAC Flooding and Cloning 1.4 - DNS Attacks 1.4 - Denial of Service 1.4 - Malicious Scripts 1.5 - Threat Actors 1.5 - Attack Vectors 1.5 - Threat Intelligence 1.5 - Threat Research 1.6 - Vulnerability Types 1.6 - Third-party Risks 1.6 - Vulnerability Impacts 1.7 - Threat Hunting 1.7 - Vulnerability Scans 1.7 - Security Information and Event Management 1.8 - Penetration Testing 1.8 - Reconnaissance 1.8 - Security Teams 2.0 - Architecture and Design 2.1 - Configuration Management 2.1 - Protecting Data 2.1 - Data Loss Prevention 2.1 - Managing Security 2.1 - Site Resiliency 2.1 - Honeypots and Deception 2.2 - Cloud Models 2.2 - Edge and Fog Computing 2.2 - Designing the Cloud 2.2 - Infrastructure as Code 2.2 - Virtualization Security 2.3 - Secure Deployments 2.3 - Provisioning and Deprovisioning 2.3 - Secure Coding Techniques 2.3 - Software Diversity 2.3 - Automation and Scripting 2.4 - Authentication Methods 2.4 - Biometrics 2.4 - Multi-factor Authentication 2.5 - Disk Redundancy 2.5 - Network Redundancy 2.5 - Power Redundancy 2.5 - Replication 2.5 - Backup Types 2.5 - Resiliency 2.6 - Embedded Systems 2.6 - Embedded Systems Communication 2.6 - Embedded Systems Constraints 2.7 - Physical Security Controls 2.7 - Secure Areas 2.7 - Secure Data Destruction 2.8 - Cryptography Concepts 2.8 - Symmetric and Asymmetric Cryptography 2.8 - Hashing and Digital Signatures 2.8 - Cryptographic Keys 2.8 - Steganography 2.8 - Quantum Computing 2.8 - Stream and Block Ciphers 2.8 - Blockchain Technology 2.8 - Cryptography Use Cases 2.8 - Cryptography Limitations 3.0 - Implementation 3.1 - Secure Protocols 3.2 - Endpoint Protection 3.2 - Boot Integrity 3.2 - Database Security 3.2 - Application Security 3.2 - Application Hardening 3.3 - Load Balancing 3.3 - Network Segmentation 3.3 - Virtual Private Networks 3.3 - Port Security 3.3 - Secure Networking 3.3 - Firewalls 3.3 - Network Access Control 3.3 - Proxies 3.3 - Intrusion Prevention 3.3 - Other Network Appliances 3.4 - Wireless Cryptography 3.4 - Wireless Authentication Methods 3.4 - Wireless Authentication Protocols 3.4 - Installing Wireless Networks 3.5 - Mobile Networks 3.5 - Mobile Device Management 3.5 - Mobile Device Security 3.5 - Mobile Device Enforcement 3.5 - Mobile Deployment Models 3.6 - Cloud Security Controls 3.6 - Securing Cloud Storage 3.6 - Securing Cloud Networks 3.6 - Securing Compute Clouds 3.6 - Cloud Security Solutions 3.7 - Identity Controls 3.7 - Account Types 3.7 - Account Policies 3.8 - Authentication Management 3.8 - PAP and CHAP 3.8 - Identity and Access Services 3.8 - Federated Identities 3.8 - Access Control 3.9 - Public Key Infrastructure 3.9 - Certificates 3.9 - Certificate Formats 3.9 - Certificate Concepts 4.0 - Operations and Incident Response 4.1 - Reconnaissance Tools 4.1 - File Manipulation Tools 4.1 - Shell and Script Environments 4.1 - Packet Tools 4.1 - Forensic Tools 4.2 - Incident Response Process 4.2 - Incident Response Planning 4.2 - Attack Frameworks 4.3 - Vulnerability Scan Output 4.3 - SIEM Dashboards 4.3 - Log files 4.3 - Log Management 4.4 - Endpoint Security Configuration 4.4 - Security Configurations 4.5 - Digital Forensics 4.5 - Forensics Data Acquisition 4.5 - On-Premises vs. Cloud Forensics 4.5 - Managing Evidence 5.0 - Governance, Risk, and Compliance 5.1 - Security Controls 5.2 - Security Regulations and Standards 5.2 - Security Frameworks 5.2 - Secure Configurations 5.3 - Personnel Security 5.3 - Third-party Risk Management 5.3 - Managing Data 5.3 - Credential Policies 5.3 - Organizational Policies 5.4 - Risk Management Types 5.4 - Risk Analysis 5.4 - Business Impact Analysis 5.5 - Privacy and Data Breaches 5.5 - Data Classifications 5.5 - Enhancing privacy 5.5 - Data Roles and Responsibilities