Testout Security Pro là khóa học gồm bài học + video + lab thực hành online đầy đủ nhất về An Toàn Thông Tin cấp độ đầu vào. Nội dung phong phú, đầy đủ và môi trường thực hành rất mượt trên nền tảng Labsim. trở ngại duy nhất là mức giá 399 $ cho một eCourseware Testout Security Pro , nhưng nay các bạn có thể đăng kí trong Chương Trình Khuyến Học tháng 10 với mức giá ưu đãi lên đến 75% chi phí, chỉ còn 2490 K (VND). Thời hạn tài khoản học tập 3 Tháng.

- Lưu ý : Nội dung lab, bài học và video là tiếng Anh vì vậy các bạn cần có khả năng đọc hiểu ở mức căn bản.
Demo Testout Security Pro
Giới thiệu về TestOut Security Pro
TestOut Security Pro là một chương trình đào tạo toàn diện được thiết kế để chuẩn bị cho học viên về các kỹ năng an ninh mạng thiết yếu và các chứng chỉ quan trọng trong ngành.
Nội dung khóa học
Chương trình bao gồm các chủ đề chính sau:
- Mối đe dọa, Tấn công và Lỗ hổng
- Quản lý Danh tính, Truy cập và Tài khoản
- Ứng phó Sự cố, Điều tra Số và Khôi phục
- Mối đe dọa Vật lý và Không dây
- Ảo hóa, Đám mây và Thiết bị Di động
- Quản lý Rủi ro
- Thiết kế và Chẩn đoán Mạng và Máy chủ
- Bảo mật Dữ liệu và Ứng dụng
- Quản trị và Tuân thủ
- Thiết bị và Cơ sở hạ tầng
- Đánh giá Bảo mật
Những gì học viên sẽ học được
- Kiến thức nền tảng về an ninh mạng
- Kỹ năng thực hành với các công cụ bảo mật hiện đại
- Phương pháp phát hiện và ứng phó với các mối đe dọa
- Cách thiết kế và triển khai các chiến lược bảo mật
- Kỹ năng quản lý rủi ro và tuân thủ quy định
- Cách thức bảo vệ dữ liệu và ứng dụng
- Phương pháp đánh giá và cải thiện bảo mật hệ thống
Đối tượng nên học
- Người mới bắt đầu muốn xây dựng sự nghiệp trong lĩnh vực an ninh mạng
- Chuyên gia IT muốn mở rộng kiến thức về bảo mật
- Quản lý IT cần hiểu về các khía cạnh bảo mật của hệ thống
- Sinh viên công nghệ thông tin muốn tăng cường kỹ năng thực tế
- Chuyên gia bảo mật muốn cập nhật kiến thức và chuẩn bị cho các chứng chỉ
Lợi ích của khóa học
- Chuẩn bị cho các chứng chỉ quan trọng như CompTIA Security+
- Trải nghiệm học tập thực hành qua các bài lab và mô phỏng
- Nội dung cập nhật liên tục theo xu hướng mới nhất của ngành
- Phương pháp giảng dạy tương tác và hấp dẫn
- Cơ hội phát triển sự nghiệp trong lĩnh vực an ninh mạng đang phát triển nhanh chóng
Cánh cửa dẫn đến Sự nghiệp An ninh mạng đầy Thú vị
Security Pro là một chương trình giảng dạy dễ sử dụng giúp bạn cung cấp nội dung hấp dẫn và đào tạo thực hành, trải nghiệm cùng với việc chuẩn bị chứng chỉ về các công cụ và kỹ thuật bảo mật mới nhất. Với việc cải thiện kết quả học tập của sinh viên là ưu tiên hàng đầu, tài liệu khóa học này cho phép bạn tập trung vào giảng dạy đồng thời cung cấp các công cụ cần thiết để tổ chức lớp học hiệu quả và giảng dạy, giám sát cũng như đánh giá sinh viên của bạn.
Key Topics CoveredCourse Specifications
- Videos: 149 (14:28:15)
- Demonstrations: 107 (9:50:57)
- Labs: 78
- Fact Sheets: 130
- Exams: 103
Contents:
- 1.0 Security Concepts
- 1.1 Security Introduction
- 1.1.1 The Security Landscape (3:47)
- 1.1.2 Security Concepts (4:12)
- 1.1.3 Security Introduction Facts
- 1.1.4 Security Job Roles (5:00)
- 1.1.5 Practice Questions
- 1.2 Security Controls
- 1.2.1 Control Categories and Types (4:18)
- 1.2.2 Control Categories and Types Facts
- 1.2.3 Security Control and Framework Types
- 1.2.4 Practice Questions
- 1.3 Use the Simulator
- 1.3.1 Use the Simulator (12:08)
- 1.3.2 Labsim Features (10:14)
- 1.1 Security Introduction
- 2.0 Threats, Vulnerabilities, and Mitigations
- 2.1 Understanding Attacks
- 2.1.1 Threat Actor Types (6:58)
- 2.1.2 Threat Actor Types Facts (6:20)
- 2.1.3 General Attack Strategy (6:03)
- 2.1.4 General Defense Strategy (7:47)
- 2.1.5 Attack and Defense Strategy Overview
- 2.1.6 Attack Surfaces (8:18)
- 2.1.7 Attack Surfaces Facts
- 2.1.8 Practice Questions
- 2.2 Social Engineering
- 2.2.1 Social Engineering Overview (4:20)
- 2.2.2 Social Engineering Overview Facts
- 2.2.3 Social Engineering Techniques (5:43)
- 2.2.4 Social Engineering Techniques Facts
- 2.2.5 Use the Social Engineer Toolkit (4:21)
- 2.2.6 Investigating a Social Engineering Attack (6:26)
- 2.2.7 Identify Social Engineering
- 2.2.8 Social Engineering Techniques
- 2.2.9 Practice Questions
- 2.3 Malware
- 2.3.1 Malware (6:02)
- 2.3.2 Malware Facts
- 2.3.3 Malware Protection Facts
- 2.3.4 Implementing Malware Protections (6:27)
- 2.3.5 Use Windows Security (4:03)
- 2.3.6 Configure Microsoft Defender
- 2.3.7 Analyze Indicators of Malware-Based Attacks
- 2.3.8 Practice Questions
- 2.1 Understanding Attacks
- 3.0 Cryptographic Solutions
- 3.1 Cryptography
- 3.1.1 Cryptography Concepts (7:00)
- 3.1.2 Cryptography Facts
- 3.1.3 Symmetric vs Asymmetric Encryption (9:40)
- 3.1.4 Symmetric and Asymmetric Encryption Facts (5:53)
- 3.1.5 Cryptography Algorithm (9:18)
- 3.1.6 Cryptography Algorithms Facts
- 3.1.7 Identify Cryptographic Modes of Operation
- 3.1.8 Blockchain (3:32)
- 3.1.9 Blockchain Facts
- 3.1.10 Use Steganography to Hide a File (3:17)
- 3.1.11 Hide Files with OpenStego
- 3.1.12 Cryptographic Attacks (4:20)
- 3.1.13 Cryptographic Attack Facts
- 3.1.14 Practice Questions
- 3.2 Cryptography Implementations
- 3.2.1 Combining Cryptographic Methods (4:40)
- 3.2.2 Hardware-Based Encryption Devices (3:13)
- 3.2.3 Verify Device for TPM (2:56)
- 3.2.4 Cryptographic Implementation Facts
- 3.2.5 Practice Questions
- 3.3 Hashing
- 3.3.1 Hashing (5:31)
- 3.3.2 Hashing Algorithms (3:33)
- 3.3.3 Hashing Facts
- 3.3.4 Using Hashes (4:50)
- 3.3.5 Compare an MD5 Hash
- 3.3.6 Practice Questions
- 3.4 Encryption
- 3.4.1 Encrypting File System (3:48)
- 3.4.2 Encrypt Files (7:53)
- 3.4.3 Encrypt Files with EFS
- 3.4.4 PGP and GPG (2:27)
- 3.4.5 Encrypting Files with GPG (3:24)
- 3.4.6 BitLocker and Database Encryption (5:29)
- 3.4.7 Configuring BitLocker (4:53)
- 3.4.8 Configure BitLocker with a TPM
- 3.4.9 File Encryption Facts
- 3.4.10 Practice Questions
- 3.5 Public Key Infrastructure
- 3.5.1 Public Key Infrastructure (5:12)
- 3.5.2 Public Key Infrastructure Facts
- 3.5.3 Certificate Types (4:06)
- 3.5.4 Certificate Types Facts
- 3.5.5 Manage Certificates (11:23)
- 3.5.6 Manage Certificates
- 3.5.7 Certificate Concepts (7:36)
- 3.5.8 Certificate Concepts Facts
- 3.5.9 Certificates and Certificate Authorities
- 3.5.10 Practice Questions
- 3.1 Cryptography
- 4.0 Identity and Access Management
- 4.1 Access Control Models
- 4.1.1 Fundamental Security Concepts (4:40)
- 4.1.2 Access Control Facts
- 4.1.3 Access Control Best Practices (4:16)
- 4.1.4 Access Control Models (5:06)
- 4.1.5 Access Control Model Facts
- 4.1.6 Practice Questions
- 4.2 Authentication
- 4.2.1 Authentication (5:28)
- 4.2.2 Authentication Factors Facts
- 4.2.3 Authentication Methods (5:03)
- 4.2.4 Authentication Methods Facts (4:52)
- 4.2.5 Biometrics and Authentication Technologies (4:17)
- 4.2.6 Use a Biometric Scanner (2:09)
- 4.2.7 Use Single Sign-on (4:35)
- 4.2.8 Biometrics and Authentication Technologies Facts
- 4.2.9 Practice Questions
- 4.3 Authorization
- 4.3.1 Authorization (3:18)
- 4.3.2 Cumulative Access (2:59)
- 4.3.3 Authorization Facts
- 4.3.4 Examining the Access Token (7:47)
- 4.3.5 Implement an Access Control Model
- 4.3.6 Practice Questions
- 4.4 Active Directory Overview
- 4.4.1 Active Directory Introduction (8:17)
- 4.4.2 Joining a Domain (8:38)
- 4.4.3 Managing Active Directory Objects (9:18)
- 4.4.4 Active Directory Facts
- 4.4.5 Create OUs
- 4.4.6 Delete OUs
- 4.4.7 Group Policy (8:47)
- 4.4.8 Use Group Policy (6:04)
- 4.4.9 Group Policy Facts
- 4.4.10 Create and Link a GPO
- 4.4.11 Create User Accounts
- 4.4.12 Manage User Accounts
- 4.4.13 Create a Group
- 4.4.14 Create Global Groups
- 4.4.15 Practice Questions
- 4.5 Hardening Authentication
- 4.5.1 Hardening Authentication (7:55)
- 4.5.2 Configure User Account Restrictions (4:22)
- 4.5.3 Configure Account Policies and UAC Settings (6:58)
- 4.5.4 Use Password Managers (4:42)
- 4.5.5 Configure Account Password Policies
- 4.5.6 Hardening User Accounts (5:43)
- 4.5.7 Restrict Local Accounts
- 4.5.8 Secure Default Accounts
- 4.5.9 Enforce User Account Control
- 4.5.10 Hardening Authentication Facts
- 4.5.11 Configure Smart Card Authentication (5:38)
- 4.5.12 Configure Smart Card Authentication
- 4.5.13 Smart Card Authentication Facts
- 4.5.14 Practice Questions
- 4.6 Linux Users
- 4.6.1 Linux User and Group Overview (11:10)
- 4.6.2 Managing Linux Users (7:57)
- 4.6.3 Linux User Commands and Files
- 4.6.4 Create a User Account
- 4.6.5 Rename a User Account
- 4.6.6 Delete a User
- 4.6.7 Change Your Password
- 4.6.8 Change a User’s Password
- 4.6.9 Lock and Unlock User Accounts
- 4.6.10 Linux User Security and Restrictions (7:11)
- 4.6.11 Configuring Linux User Security and Restrictions (7:16)
- 4.6.12 Configure SELinux (4:55)
- 4.6.13 Linux User Security and Restriction Facts
- 4.6.14 Practice Questions
- 4.7 Linux Groups
- 4.7.1 Managing Linux Groups (6:11)
- 4.7.2 Linux Group Commands
- 4.7.3 Rename and Create Groups
- 4.7.4 Add Users to a Group
- 4.7.5 Remove a User from a Group
- 4.7.6 Practice Questions
- 4.8 Remote Access
- 4.8.1 Remote Access (3:16)
- 4.8.2 Remote Access Facts
- 4.8.3 Configuring a RADIUS Solution (3:04)
- 4.8.4 RADIUS and TACACS+ Facts
- 4.8.5 Practice Questions
- 4.9 Network Authentication
- 4.9.1 Network Authentication Protocols (7:49)
- 4.9.2 Network Authentication Facts
- 4.9.3 LDAP Authentication (2:55)
- 4.9.4 LDAP Authentication Facts
- 4.9.5 Practice Questions
- 4.1 Access Control Models
- 5.0 Network Architecture
- 5.1 Enterprise Network Architecture
- 5.1.1 Enterprise Network Architecture (6:15)
- 5.1.2 Enterprise Network Architecture Facts
- 5.1.3 Practice Questions
- 5.2 Security Appliances
- 5.2.1 Security Appliances (8:33)
- 5.2.2 Security Solutions (5:39)
- 5.2.3 Security Solution Facts (3:18)
- 5.2.4 Security Zones (4:48)
- 5.2.5 Security Zone Facts
- 5.2.6 Configure Network Security Appliance Access (7:45)
- 5.2.7 Configure a Security Appliance
- 5.2.8 Configure Network Security Appliance Access
- 5.2.9 Deceptive and Disruption Technology (8:28)
- 5.2.10 Deceptive and Disruption Technology Facts
- 5.2.11 Detect Malicious Network Traffic with a Honeypot (3:20)
- 5.2.12 Configure Load Balancer (5:33)
- 5.2.13 Practice Questions
- 5.3 Screened Subnets
- 5.3.1 Screened Subnets (6:17)
- 5.3.2 Configuring a Screened Subnet (3:17)
- 5.3.3 Configure a Screened Subnet
- 5.3.4 Screened Subnet Facts
- 5.3.5 Practice Questions
- 5.4 Firewalls
- 5.4.1 Firewalls (7:29)
- 5.4.2 Firewall Facts
- 5.4.3 Configuring Firewall Rules (6:34)
- 5.4.4 Configure Firewall Schedules (6:05)
- 5.4.5 Configure a Perimeter Firewall
- 5.4.6 Practice Questions
- 5.5 Virtual Private Networks
- 5.5.1 Virtual Private Networks (7:00)
- 5.5.2 Configuring a VPN (9:07)
- 5.5.3 Configuring a VPN Client (2:35)
- 5.5.4 Configure a Remote Access VPN
- 5.5.5 Configure a VPN Connection iPad
- 5.5.6 Configure Remote Access, non VPN (3:34)
- 5.5.7 Virtual Private Network Facts
- 5.5.8 VPN Protocol Facts
- 5.5.9 Implement Secure Remote Access Protocols
- 5.5.10 Practice Questions
- 5.6 Network Access Control
- 5.6.1 Network Access Control (6:29)
- 5.6.2 Network Access Control Facts
- 5.6.3 Practice Questions
- 5.7 Network Device Vulnerabilities
- 5.7.1 Device Vulnerabilities (6:52)
- 5.7.2 Device Vulnerability Facts
- 5.7.3 Searching for Default Passwords (2:53)
- 5.7.4 Unauthorized SSH Connection (4:17)
- 5.7.5 Securing a Switch (2:55)
- 5.7.6 Secure a Switch
- 5.7.7 Practice Questions
- 5.8 Network Applications
- 5.8.1 Network Application Security (3:42)
- 5.8.2 Configure Application Control Software (7:43)
- 5.8.3 Network Application Facts
- 5.8.4 Practice Questions
- 5.9 Switch Security and Attacks
- 5.9.1 Switch Features (9:28)
- 5.9.2 Securing Network Switches (7:34)
- 5.9.3 Switch Security Facts
- 5.9.4 Switch Attacks (11:09)
- 5.9.5 Switch Attack Facts
- 5.9.6 Hardening a Switch (10:35)
- 5.9.7 Harden a Switch
- 5.9.8 Secure Access to a Switch
- 5.9.9 Secure Access to a Switch 2
- 5.9.10 Practice Questions
- 5.10 Router Security
- 5.10.1 Router Security (7:00)
- 5.10.2 Router ACLs (2:45)
- 5.10.3 Router Security Facts (3:31)
- 5.10.4 Configuring ACLs (7:09)
- 5.10.5 Restrict Telnet and SSH Access
- 5.10.6 Permit Traffic
- 5.10.7 Block Source Hosts
- 5.10.8 Practice Questions
- 5.1 Enterprise Network Architecture
- 6.0 Resiliency and Site Security
- 6.1 Physical Threats
- 6.1.1 Physical Security (5:03)
- 6.1.2 Physical Security Facts
- 6.1.3 Implement Physical Security
- 6.1.4 Practice Questions
- 6.2 Monitoring and Reconnaissance
- 6.2.1 Network Monitoring (5:52)
- 6.2.2 Network Monitoring Facts
- 6.2.3 Performing Port and Ping Scans (4:42)
- 6.2.4 Reconnaissance (6:27)
- 6.2.5 Perform Reconnaissance with Nmap (4:10)
- 6.2.6 Reconnaissance Facts
- 6.2.7 Practice Questions
- 6.3 Intrusion Detection
- 6.3.1 Intrusion Detection (4:53)
- 6.3.2 IDS Facts
- 6.3.3 Implement Intrusion Detection and Prevention (6:13)
- 6.3.4 Implement Intrusion Prevention
- 6.3.5 Practice Questions
- 6.4 Protocol Analyzers
- 6.4.1 Protocol Analyzers (3:39)
- 6.4.2 Protocol Analyzer Facts (5:41)
- 6.4.3 Analyzing Network Traffic (6:46)
- 6.4.4 Practice Questions
- 6.5 Analyzing Network Attacks
- 6.5.1 Analyzing Network Attacks (6:01)
- 6.5.2 Analyzing Network Attacks Facts
- 6.5.3 Analyzing ARP Poisoning (5:05)
- 6.5.4 Poison ARP and Analyze with Wireshark
- 6.5.5 Analyzing DNS Poisoning (6:14)
- 6.5.6 Poison DNS
- 6.5.7 Analyzing a SYN Flood (6:14)
- 6.5.8 Analyze a SYN Flood Attack
- 6.5.9 Examining DNS Attacks (11:55)
- 6.5.10 Malicious Code (7:02)
- 6.5.11 Malicious Code Facts
- 6.5.12 Practice Questions
- 6.6 Analyzing Password Attacks
- 6.6.1 Password Attacks (7:23)
- 6.6.2 Password Attack Facts (8:07)
- 6.6.3 Using Rainbow Tables (3:28)
- 6.6.4 Crack Password with Rainbow Tables
- 6.6.5 Crack Passwords (7:59)
- 6.6.6 Crack Password Protected Files (3:18)
- 6.6.7 Crack a Password with John the Ripper
- 6.6.8 Practice Questions
- 6.1 Physical Threats
- 7.0 Vulnerability Management
- 7.1 Vulnerability Management
- 7.1.1 Vulnerability Management (5:53)
- 7.1.2 Vulnerability Type Facts
- 7.1.3 Vulnerability Identification Methods Facts (5:55)
- 7.1.4 Vulnerability Analysis and Remediation (4:50)
- 7.1.5 Vulnerability Analysis and Remediation Facts
- 7.1.6 Explore End of Life Software / Hardware (2:59)
- 7.1.7 Identify Types of Vulnerabilities
- 7.1.8 Practice Questions
- 7.2 Vulnerability Scanning
- 7.2.1 Vulnerability Scanning (4:20)
- 7.2.2 Conduct Vulnerability Scans (3:58)
- 7.2.3 Scanning a Network with Nessus (3:14)
- 7.2.4 Scanning a Network with OpenVAS (4:28)
- 7.2.5 Vulnerability Scanning Facts
- 7.2.6 Scan for Cleartext Vulnerabilities
- 7.2.7 Scan for FTP Vulnerabilities
- 7.2.8 Scan for TLS Vulnerabilities
- 7.2.9 Scan for Windows Vulnerabilities
- 7.2.10 Scan for Linux Vulnerabilities
- 7.2.11 Scan for Domain Controller Vulnerabilities
- 7.2.12 Practice Questions
- 7.3 Alerting and Monitoring
- 7.3.1 Alerting and Monitoring (4:23)
- 7.3.2 Alerting and Monitoring Facts (5:59)
- 7.3.3 SIEM and SOAR (4:30)
- 7.3.4 SIEM and SOAR Facts
- 7.3.5 Analyze Network Traffic with Netflow (3:19)
- 7.3.6 Data Loss Prevention (6:48)
- 7.3.7 DLP Facts
- 7.3.8 Practice Questions
- 7.4 Penetration Testing
- 7.4.1 Penetration Testing (4:11)
- 7.4.2 Penetration Testing Facts
- 7.4.3 Penetration Testing Methods
- 7.4.4 Exploring Penetration Testing Tools (11:29)
- 7.4.5 Practice Questions
- 7.1 Vulnerability Management
- 8.0 Network and Endpoint Security
- 8.1 Operating System Hardening
- 8.1.1 Operating System Hardening (7:54)
- 8.1.2 Hardening Facts
- 8.1.3 Hardening an Operating System (6:45)
- 8.1.4 Managing Automatic Updates (4:39)
- 8.1.5 Configure Automatic Updates
- 8.1.6 Configure Microsoft Defender Firewall (4:40)
- 8.1.7 Configure Microsoft Defender Firewall
- 8.1.8 Practice Questions
- 8.2 File Server Security
- 8.2.1 File Server Security (6:35)
- 8.2.2 File System Security Facts
- 8.2.3 File Permission Facts
- 8.2.4 Configuring NTFS Permissions (11:11)
- 8.2.5 Configure NTFS Permissions
- 8.2.6 Disable Inheritance
- 8.2.7 Practice Questions
- 8.3 Linux Host Security
- 8.3.1 Linux Host Security (14:08)
- 8.3.2 Removing Unnecessary Services (3:59)
- 8.3.3 Linux Host Security Facts
- 8.3.4 Configure iptables (3:59)
- 8.3.5 Configure iptables Facts
- 8.3.6 Practice Questions
- 8.4 Wireless Overview
- 8.4.1 Wireless Networking Overview (5:56)
- 8.4.2 Wireless Installation (3:22)
- 8.4.3 Wireless Networking Facts
- 8.4.4 Configuring a Wireless Connection (5:24)
- 8.4.5 Configure a Wireless Network
- 8.4.6 Practice Questions
- 8.5 Wireless Attacks
- 8.5.1 Wireless Attacks (7:35)
- 8.5.2 Wireless Attack Facts
- 8.5.3 Detecting Rogue Hosts (3:42)
- 8.5.4 Configure Rogue Host Protection
- 8.5.5 Practice Questions
- 8.6 Wireless Defenses
- 8.6.1 Wireless Security (6:19)
- 8.6.2 Wireless Security Facts
- 8.6.3 Wireless Authentication and Access Methods (7:32)
- 8.6.4 Wireless Authentication and Access Methods Facts
- 8.6.5 Hardening a Wireless Access Point (7:46)
- 8.6.6 Harden a Wireless Network
- 8.6.7 Configure WIPS
- 8.6.8 Implement Secure Wireless Infrastructure
- 8.6.9 Practice Questions
- 8.7 Data Transmission Security
- 8.7.1 Secure Protocols (7:42)
- 8.7.2 Secure Protocol Facts
- 8.7.3 Add TLS to a Website (7:22)
- 8.7.4 Allow SSL Connections
- 8.7.5 IPsec (6:04)
- 8.7.6 IPsec Facts
- 8.7.7 Requiring IPsec for Communications (10:55)
- 8.7.8 Modify Enterprise Capabilities to Enhance Security
- 8.7.9 Practice Questions
- 8.8 Web Application Security
- 8.8.1 Web Application Attacks (3:50)
- 8.8.2 XSS and CSRF Attacks (9:37)
- 8.8.3 Injection Attacks (3:57)
- 8.8.4 Zero Day Application Attacks (3:15)
- 8.8.5 Web Browser Security Facts
- 8.8.6 Clear the Browser Cache
- 8.8.7 Preventing Cross-Site Scripting (2:41)
- 8.8.8 SQL Injections (5:49)
- 8.8.9 Exploit SQL on a Web Page (3:54)
- 8.8.10 Web Application Attack Facts
- 8.8.11 Perform an SQL Injection Attack
- 8.8.12 Practice Questions
- 8.9 Application Development and Security
- 8.9.1 Development Life Cycle (6:30)
- 8.9.2 Automation and Scripting (4:58)
- 8.9.3 SDLC and Development Facts
- 8.9.4 Version Control Management (3:03)
- 8.9.5 Application Development Security Facts
- 8.9.6 Hardening Applications on Linux (4:28)
- 8.9.7 Implementing Application Whitelisting with AppLocker (8:10)
- 8.9.8 Implement Application Whitelisting with AppLocker
- 8.9.9 Implementing Data Execution Preventions (2:35)
- 8.9.10 Implement Data Execution Preventions
- 8.9.11 Hardening Applications Facts
- 8.9.12 Practice Questions
- 8.1 Operating System Hardening
- 9.0 Incident Response
- 9.1 Incident Response and Mitigation
- 9.1.1 Incident Response Process (3:39)
- 9.1.2 Incident Response Process Facts
- 9.1.3 Isolate and Contain (2:58)
- 9.1.4 Isolate and Contain Facts
- 9.1.5 Summarize Incident Response Procedures
- 9.1.6 Practice Questions
- 9.2 Log Management
- 9.2.1 Security Information and Event Management (3:31)
- 9.2.2 Log Management (6:46)
- 9.2.3 SIEM and Log Management Facts
- 9.2.4 Monitoring Data and Metadata (6:05)
- 9.2.5 Saving Captured Files with Wireshark (3:49)
- 9.2.6 Use Elasticsearch Logstash Kibana (4:40)
- 9.2.7 Use NetworkMiner (3:35)
- 9.2.8 Configuring Remote Logging on Linux (6:27)
- 9.2.9 Logging Events on pfSense (5:57)
- 9.2.10 Monitoring Data and Metadata Facts
- 9.2.11 Practice Questions
- 9.3 Digital Forensics
- 9.3.1 Forensic Documentation and Evidence (3:27)
- 9.3.2 Forensic Acquisition of Data (5:39)
- 9.3.3 Forensic Tools (2:22)
- 9.3.4 Create a Forensic Drive Image with FTK (7:23)
- 9.3.5 Create a Forensic Drive Image with Guymager (5:24)
- 9.3.6 Create a Forensic Drive Image with DC3DD (6:00)
- 9.3.7 Examine a Forensic Drive Image with Autopsy (6:10)
- 9.3.8 Forensic Data Integrity and Preservation (4:17)
- 9.3.9 Forensic Investigation Facts (5:36)
- 9.3.10 Practice Questions
- 9.4 Redundancy
- 9.4.1 Redundancy (5:37)
- 9.4.2 Redundancy Facts
- 9.4.3 Hardware Clustering (7:48)
- 9.4.4 Clustering Facts
- 9.4.5 Incorporate Redundancy Strategies
- 9.4.6 Practice Questions
- 9.5 Backup and Restore
- 9.5.1 Backup Types (10:12)
- 9.5.2 Backup Storage Options (4:58)
- 9.5.3 Backup Types and Storage Facts
- 9.5.4 Configure Network Attached Storage (5:11)
- 9.5.5 Implementing File Backups (2:44)
- 9.5.6 Back Up Files with File History
- 9.5.7 Recover a File from File History
- 9.5.8 Backup a Domain Controller (2:39)
- 9.5.9 Restoring Server Data from Backup (2:43)
- 9.5.10 Backup a Domain Controller
- 9.5.11 Practice Questions
- 9.1 Incident Response and Mitigation
- 10.0 Protocol, App, and Cloud Security
- 10.1 Host Virtualization
- 10.1.1 Host Virtualization Overview (10:07)
- 10.1.2 Load Balancing with Virtualization (6:08)
- 10.1.3 Virtualization Facts
- 10.1.4 Use VMWare Player (4:38)
- 10.1.5 Use Hyper-V (5:37)
- 10.1.6 Create Virtual Machines
- 10.1.7 Use Windows Sandbox (3:32)
- 10.1.8 Create Containers (3:01)
- 10.1.9 Secure Containers (5:09)
- 10.1.10 Practice Questions
- 10.2 Virtual Networking
- 10.2.1 Virtual Networking Overview (6:23)
- 10.2.2 Virtual Network Devices (4:12)
- 10.2.3 Configuring Virtual Network Devices (3:34)
- 10.2.4 Virtualization Implementation Facts
- 10.2.5 Virtual Networking Facts
- 10.2.6 Create Virtual Switches
- 10.2.7 Practice Questions
- 10.3 Software-Defined Networking
- 10.3.1 Software-Defined Networking Basics (3:30)
- 10.3.2 SDN Infrastructure and Architecture (2:34)
- 10.3.3 SDN Facts
- 10.3.4 Practice Questions
- 10.4 Cloud Services
- 10.4.1 Cloud Services Introduction (9:31)
- 10.4.2 Enhancing Cloud Performance (10:26)
- 10.4.3 Cloud Computing Security Issues (5:40)
- 10.4.4 Cloud Computing Facts
- 10.4.5 Cloud Storage Security Facts
- 10.4.6 Analyze Infrastructure Types and Functions
- 10.4.7 Practice Questions
- 10.5 Mobile Devices
- 10.5.1 Mobile Device Connection Methods (4:51)
- 10.5.2 Mobile Device Connection Facts
- 10.5.3 Enforcing Mobile Device Security (6:53)
- 10.5.4 Enforcing Mobile Device Security Facts
- 10.5.5 Enforcing Security Policies on Mobile Devices (2:57)
- 10.5.6 Sideload an App (6:41)
- 10.5.7 Implement Mobile Device Management
- 10.5.8 Practice Questions
- 10.6 Mobile Device Management
- 10.6.1 Mobile Device Management (4:42)
- 10.6.2 Mobile Device Management Facts
- 10.6.3 Enroll Devices and Perform a Remote Wipe (3:22)
- 10.6.4 Mobile Application Management (3:59)
- 10.6.5 Mobile Application Management Facts
- 10.6.6 Practice Questions
- 10.7 BYOD Security
- 10.7.1 BYOD Security Issues (10:17)
- 10.7.2 BYOD Security Facts
- 10.7.3 Securing Mobile Devices (5:40)
- 10.7.4 Secure an iPad
- 10.7.5 Creating a Guest Network for BYOD (7:25)
- 10.7.6 Create a Guest Network for BYOD
- 10.7.7 Practice Questions
- 10.8 Embedded and Specialized Systems
- 10.8.1 Embedded and Specialized Systems (8:16)
- 10.8.2 Smart Home (7:01)
- 10.8.3 Constraints and Security of Embedded Devices (4:45)
- 10.8.4 Communication of Embedded Systems (6:30)
- 10.8.5 Embedded and Specialized Systems Facts
- 10.8.6 Practice Questions
- 10.9 Email
- 10.9.1 Email Security (6:27)
- 10.9.2 Email Security Facts
- 10.9.3 Protecting a Client from Spam (3:56)
- 10.9.4 Securing an Email Server (2:54)
- 10.9.5 Configure Email Filters
- 10.9.6 Securing Accounts on an iPad (4:56)
- 10.9.7 Secure Email on iPad
- 10.9.8 Practice Questions
- 10.1 Host Virtualization
- 11.0 Security Governance Concepts
- 11.1 Policies, Standards, and Procedures
- 11.1.1 Program Management and Oversight Overview (3:40)
- 11.1.2 Program Management and Oversight Facts (5:55)
- 11.1.3 Policies, Standards, and Procedures
- 11.1.4 Apply Appropriate Polices and Regulations
- 11.1.5 Practice Questions
- 11.2 Change Management
- 11.2.1 Change Management (4:15)
- 11.2.2 Change Management Facts (6:40)
- 11.2.3 Practice Questions
- 11.3 Automation and Orchestration
- 11.3.1 Automation and Scripting (5:25)
- 11.3.2 Automation and Scripting Facts (6:09)
- 11.3.3 Practice Questions
- 11.1 Policies, Standards, and Procedures
- 12.0 Risk Management Processes
- 12.1 Risk Management Processes and Concepts
- 12.1.1 Risk Types and Tolerance (4:47)
- 12.1.2 Risk Types and Tolerance Facts
- 12.1.3 Analyzing Risks (2:57)
- 12.1.4 Analyzing Risks Facts
- 12.1.5 Business Continuity Planning (5:02)
- 12.1.6 Business Continuity Planning Facts
- 12.1.7 Practice Questions
- 12.2 Vendor Management
- 12.2.1 Managing Third Parties (5:23)
- 12.2.2 Managing Third Parties Facts
- 12.2.3 Practice Questions
- 12.3 Audits and Assessments
- 12.3.1 Audits (5:12)
- 12.3.2 Audit Facts
- 12.3.3 Auditing the Windows Security Log (5:23)
- 12.3.4 Configure Advanced Audit Policy
- 12.3.5 Auditing Device Logs on a Switch (3:54)
- 12.3.6 Enable Device Logs
- 12.3.7 Practice Questions
- 12.1 Risk Management Processes and Concepts
- 13.0 Data Protection and Compliance
- 13.1 Data Classification and Compliance
- 13.1.1 Consequences of Breaches (4:35)
- 13.1.2 Consequences of Breaches Facts
- 13.1.3 Information Classification (4:21)
- 13.1.4 Information Classification Facts
- 13.1.5 Privacy and Responsibility of Data (8:11)
- 13.1.6 Privacy and Responsibility of Data
- 13.1.7 Data Destruction (8:43)
- 13.1.8 Data Destruction Facts
- 13.1.9 Privacy and Data Sensitivity Concepts
- 13.1.10 Practice Questions
- 13.2 Personnel Policies
- 13.2.1 Personnel Policies (6:34)
- 13.2.2 Personnel Policy Facts
- 13.2.3 Data Protection and Policies (3:35)
- 13.2.4 Data Protection and Policies Facts
- 13.2.5 Practice Questions
- 13.1 Data Classification and Compliance
- A.0 CompTIA Security+ SY0-701 – Practice Exams
- A.1 Prepare for CompTIA Security+ SY0-701 Certification
- A.1.1 Security+ SY0-701 Exam Objectives
- A.1.2 Security+ SY0-701 Exam Objectives by Course Section
- A.1.3 How to take the Security+ SY0-701 Exam
- A.1.4 Security+ SY0-701 FAQs
- A.1.5 Hints and Tips for taking the Security+ SY0-701 Exam
- A.2 CompTIA Security+ Domain Review (20 Questions)
- A.2.1 Security+ SY0-701 Domain 1: General Security Concepts
- A.2.2 Security+ SY0-701 Domain 2: Threats, Vulnerabilities, and Mitigations
- A.2.3 Security+ SY0-701 Domain 3: Security Architecture
- A.2.4 Security+ SY0-701 Domain 4: Security Operations
- A.2.5 Security+ SY0-701 Domain 5: Security Program Management and Oversight
- A.3 CompTIA Security+ Domain Review (All Questions)
- A.3.1 Security+ SY0-701 Domain 1: General Security Concepts
- A.3.2 Security+ SY0-701 Domain 2: Threats, Vulnerabilities, and Mitigations
- A.3.3 Security+ SY0-701 Domain 3: Security Architecture
- A.3.4 Security+ SY0-701 Domain 4: Security Operations
- A.3.5 Security+ SY0-701 Domain 5: Security Program Management and Oversight
- A.4 CompTIA Security+ SY0-701 Certification Practice Exam
- A.1 Prepare for CompTIA Security+ SY0-701 Certification
- B.0 TestOut Security Pro – Practice Exams
- B.1 Prepare for TestOut Security Pro Certification
- B.1.1 Pro Exam Objectives
- B.1.2 Pro Exam Objectives by Course Section
- B.1.3 How to take the Pro Exam
- B.1.4 Pro Exam FAQs
- B.2 TestOut Security Pro Domain Review
- B.2.1 Pro Domain 1: Identity Management and Authentication
- B.2.2 Pro Domain 2: Physical and Network Security
- B.2.3 Pro Domain 3: Host and Application Defense
- B.2.4 Pro Domain 4: Data Security
- B.2.5 Pro Domain 5: Audit and Security Assessment
- B.3 TestOut Security Pro Certification Practice Exam
- B.1 Prepare for TestOut Security Pro Certification
Hướng dẫn đăng kí : Hãy thanh toán bằng cách quét QR Code sau đây và liên hệ Zalo 0947432780 hay messenger Thao Trường Mạng để nhận tài khoản trong vòng 24 giờ. Hiệu lực tài khoản 3 tháng.

Hoặc liên hệ messenger Thao Trường Mạng để tiến hành đăng kí qua paypal hay credit card !




Bình luận về bài viết này