- 
                        
                            00- Introduction00:40:49
- 
                        
                            01- Comparing Security Roles and Security Controls00:37:49
- 
                        
                            02- Explaining Threat Actors and Threat Intelligence00:57:46
- 
                        
                            03.1- Performing Security Assessments - Part 100:55:32
- 
                        
                            03.2- Performing Security Assessments - Part 2 (Exploring the Lab Environment Lab)00:29:16
- 
                        
                            03.3- Performing Security Assessments - Part 3 (Scanning and Identifying Network Nodes Lab)00:32:16
- 
                        
                            03.4- Performing Security Assessments - Part 400:33:51
- 
                        
                            03.5- Performing Security Assessments - Part 5 (Intercepting and Interpreting Network Traffic Lab)00:30:55
- 
                        
                            03.6- Performing Security Assessments - Part 600:59:55
- 
                        
                            03.7- Performing Security Assessments - Part 7 ( Credentialed Vulnerability Scan Lab)00:25:51
- 
                        
                            04.1- Identifying Social Engineering and Malware - Part 100:46:39
- 
                        
                            04.2- Identifying Social Engineering and Malware - Part 200:55:02
- 
                        
                            04.3- Identifying Social Engineering and Malware - Part 3 (Malware-based Backdoor Lab)00:27:27
- 
                        
                            05- Summarizing Basic Cryptographic Concepts01:40:22
- 
                        
                            06.1- Implementing Public Key Infrastructure - Part 101:02:49
- 
                        
                            06.2- Implementing Public Key Infrastructure - Part 2 (Managing the Lifecycle of a Certificate Lab)00:32:51
- 
                        
                            07.1- Implementing Authentication Controls - Part 101:21:33
- 
                        
                            07.2- Implementing Authentication Controls - Part 2 (Password Cracking Lab)00:35:48
- 
                        
                            07.3- Implementing Authentication Controls - Part 3 (Managing Centralized Authentication Lab)00:30:12
- 
                        
                            08.1- Implementing Identity and Account Management Controls - Part 101:18:16
- 
                        
                            08.2- Implementing Identity and Account Management Controls - Part 2 (Access Controls Lab)00:33:58
- 
                        
                            08.3- Implementing Identity and Account Management Controls - Part 3 (Auditing Policies Lab)00:33:29
- 
                        
                            08.4- Implementing Identity and Account Management Controls - Part 4 (Access Controls in Linux Lab)00:35:40
- 
                        
                            09.1- Implementing Secure Network Designs - Part 100:57:41
- 
                        
                            09.2- Implementing Secure Network Designs - Part 201:20:12
- 
                        
                            09.3- Implementing Secure Network Designs - Part 3 (Implementing a Secure Network Design Lab)00:32:02
- 
                        
                            10.1- Implementing Network Security Appliances - Part 101:06:16
- 
                        
                            10.2- Implementing Network Security Appliances - Part 2 (Configuring a Firewall Lab)00:22:32
- 
                        
                            10.3- Implementing Network Security Appliances - Part 3 (Intrusion Detection System Lab)00:35:10
- 
                        
                            11.1- Implementing Secure Network Protocols - Part 101:04:30
- 
                        
                            11.2 - Implementing Secure Network Protocols - Part 2 (Secure Network Addressing Services Lab)00:25:47
- 
                        
                            11.3- Implementing Secure Network Protocols - Part 3 (Implementing a Virtual Private Network Lab)00:21:20
- 
                        
                            11.4- Implementing Secure Network Protocols - Part 4 (Implementing a Secure SSH Server Lab)00:41:09
- 
                        
                            12.1- Implementing Host Security Solutions - Part 100:17:25
- 
                        
                            12.2- Implementing Host Security Solutions - Part 2 (Implementing Endpoint Protection Lab)00:22:14
- 
                        
                            13- Implementing Secure Mobile Solutions00:25:14
- 
                        
                            14.1- Summarizing Secure Application Concepts - Part 100:55:10
- 
                        
                            14.2- Summarizing Secure Application Concepts - Part 2 (Application Attack Indicators Lab)00:29:30
- 
                        
                            14.3- Summarizing Secure Application Concepts - Part 3 (Identifying a Browser Attack Lab)00:34:53
- 
                        
                            14.4- Summarizing Secure Application Concepts - Part 4 (Implementing PowerShell Security Lab)00:34:00
- 
                        
                            14.5- Summarizing Secure Application Concepts - Part 5 (Identifying Malicious Code Lab)00:24:35
- 
                        
                            15- Implementing Secure Cloud Solutions00:49:27
- 
                        
                            16- Explaining Data Privacy and Protection Concepts00:24:15
- 
                        
                            17.1- Performing Incident Response - Part 101:00:00
- 
                        
                            17.2- Performing Incident Response - Part 2 (Managing Data Sources for Incident Response Lab)00:41:57
- 
                        
                            17.3- Performing Incident Response - Part 3 (Configuring Mitigation Controls Lab)00:18:34
- 
                        
                            18.1- Explaining Digital Forensics - Part 100:11:42
- 
                        
                            18.2- Explaining Digital Forensics - Part 2 (Acquiring Digital Forensics Evidence Lab)00:34:20
- 
                        
                            19- Summarizing Risk Management Concepts00:44:00
- 
                        
                            20.1- Implementing Cybersecurity Resilience - Part 100:11:07
- 
                        
                            20.2- Implementing Cybersecurity Resilience - Part 2 (Backing Up Data in Windows and Linux Lab)00:23:42
- 
                        
                            21- Explaining Physical Security00:16:36
معلومات الدورة
- المستوى: كل المستويات
- عدد المواد: 52
- اللغة: عربي
- عدد الطلاب: 75
- آخر تحديث: 29/06/2022
الشهادة
                                                        
                                                            قم بالتسجيل في الموقع والالتحاق بالدورة للحصول على شهادة إكمال الدورة
                                                             سجل الآن
                                                            
                                                    
                                                يجب الالتحاق بالدورة لتتمكن من
                                                التفاعل على مواد الدورة
                                            
                                            
                                     
                