Loading...

نبذة عن CompTIA Security+

Security+ هى شهادة أولية في مجال أمن المعلومات (Cyber Security) تقدمها شركة CompTIA تستهدف تدريب الطلاب على المفاهيم والمهارات الأساسية لتأمين البيانات والاتصال بين الأجهزة سواء كانت شبكة محلية او على الانترنت.

تفاصيل الكورس

يمكنك مذاكرة الدروس بعد التسجيل فى الكورس

دروس كورس CompTIA Security+

  • 1 00- Security+ (SY0-601) Course Introduction - عربي 00:40:49
  • 2 01- Comparing Security Roles and Security Controls 00:37:49
  • 3 02- Explaining Threat Actors and Threat Intelligence 00:57:46
  • 4 03.1- Performing Security Assessments - Part 1 00:55:32
  • 5 03.2- Performing Security Assessments - Part 2 (Exploring the Lab Environment Lab) 00:29:16
  • 6 03.3- Performing Security Assessments - Part 3 (Scanning and Identifying Network Nodes Lab) 00:32:16
  • 7 03.4- Performing Security Assessments - Part 4 00:33:51
  • 8 03.5- Performing Security Assessments - Part 5 (Intercepting and Interpreting Network Traffic Lab) 00:30:55
  • 9 03.6- Performing Security Assessments - Part 6 00:59:55
  • 10 03.7- Performing Security Assessments - Part 7 ( Credentialed Vulnerability Scan Lab) 00:25:51
  • 11 04.1- Identifying Social Engineering and Malware - Part 1 00:46:39
  • 12 04.2- Identifying Social Engineering and Malware - Part 2 00:55:02
  • 13 04.3- Identifying Social Engineering and Malware - Part 3 (Malware-based Backdoor Lab) 00:27:27
  • 14 05- Summarizing Basic Cryptographic Concepts 01:40:22
  • 15 06.1- Implementing Public Key Infrastructure - Part 1 01:02:49
  • 16 06.2- Implementing Public Key Infrastructure - Part 2 (Managing the Lifecycle of a Certificate Lab) 00:32:51
  • 17 07.1- Implementing Authentication Controls - Part 1 01:21:33
  • 18 07.2- Implementing Authentication Controls - Part 2 (Password Cracking Lab) 00:35:48
  • 19 07.3- Implementing Authentication Controls - Part 3 (Managing Centralized Authentication Lab) 00:30:12
  • 20 08.1- Implementing Identity and Account Management Controls - Part 1 01:18:16
  • 21 08.2- Implementing Identity and Account Management Controls - Part 2 (Access Controls Lab) 00:33:58
  • 22 08.3- Implementing Identity and Account Management Controls - Part 3 (Auditing Policies Lab) 00:33:29
  • 23 08.4- Implementing Identity and Account Management Controls - Part 4 (Access Controls in Linux Lab) 00:35:40
  • 24 09.1- Implementing Secure Network Designs - Part 1 00:57:41
  • 25 09.2- Implementing Secure Network Designs - Part 2 01:20:12
  • 26 09.3- Implementing Secure Network Designs - Part 3 (Implementing a Secure Network Design Lab) 00:32:02
  • 27 10.1- Implementing Network Security Appliances - Part 1 01:06:16
  • 28 10.2- Implementing Network Security Appliances - Part 2 (Configuring a Firewall Lab) 00:22:32
  • 29 10.3- Implementing Network Security Appliances - Part 3 (Intrusion Detection System Lab) 00:35:10
  • 30 11.1- Implementing Secure Network Protocols - Part 1 01:04:30
  • 31 11.2 - Implementing Secure Network Protocols - Part 2 (Secure Network Addressing Services Lab) 00:25:47
  • 32 11.3- Implementing Secure Network Protocols - Part 3 (Implementing a Virtual Private Network Lab) 00:21:20
  • 33 11.4- Implementing Secure Network Protocols - Part 4 (Implementing a Secure SSH Server Lab) 00:41:09
  • 34 12.1- Implementing Host Security Solutions - Part 1 00:17:25
  • 35 12.2- Implementing Host Security Solutions - Part 2 (Implementing Endpoint Protection Lab) 00:22:14
  • 36 13- Implementing Secure Mobile Solutions 00:25:14
  • 37 14.1- Summarizing Secure Application Concepts - Part 1 00:55:10
  • 38 14.2- Summarizing Secure Application Concepts - Part 2 (Application Attack Indicators Lab) 00:29:30
  • 39 14.3- Summarizing Secure Application Concepts - Part 3 (Identifying a Browser Attack Lab) 00:34:53
  • 40 14.4- Summarizing Secure Application Concepts - Part 4 (Implementing PowerShell Security Lab) 00:34:00
  • 41 14.5- Summarizing Secure Application Concepts - Part 5 (Identifying Malicious Code Lab) 00:24:35
  • 42 15- Implementing Secure Cloud Solutions 00:49:27
  • 43 16- Explaining Data Privacy and Protection Concepts 00:24:15
  • 44 17.1- Performing Incident Response - Part 1 01:00:00
  • 45 17.2- Performing Incident Response - Part 2 (Managing Data Sources for Incident Response Lab) 00:41:57
  • 46 17.3- Performing Incident Response - Part 3 (Configuring Mitigation Controls Lab) 00:18:34
  • 47 18.1- Explaining Digital Forensics - Part 1 00:11:42
  • 48 18.2- Explaining Digital Forensics - Part 2 (Acquiring Digital Forensics Evidence Lab) 00:34:20
  • 49 19- Summarizing Risk Management Concepts 00:44:00
  • 50 20.1- Implementing Cybersecurity Resilience - Part 1 00:11:07
  • 51 20.2- Implementing Cybersecurity Resilience - Part 2 (Backing Up Data in Windows and Linux Lab) 00:23:42
  • 52 21- Explaining Physical Security 00:16:36

محاضر كورس CompTIA Security+

Netriders Academy - أكاديمية نت رايدرز