Never stop talking " STOP the Gaza Genocide "
  • Lesson.No : 36
  • 00:25:14
  • 13- Implementing Secure Mobile Solutions

  • Play
Loading...

Course Lessons

  1. 1- 00- Security+ (SY0-601) Course Introduction - عربي
  2. 2- 01- Comparing Security Roles and Security Controls
  3. 3- 02- Explaining Threat Actors and Threat Intelligence
  4. 4- 03.1- Performing Security Assessments - Part 1
  5. 5- 03.2- Performing Security Assessments - Part 2 (Exploring the Lab Environment Lab)
  6. 6- 03.3- Performing Security Assessments - Part 3 (Scanning and Identifying Network Nodes Lab)
  7. 7- 03.4- Performing Security Assessments - Part 4
  8. 8- 03.5- Performing Security Assessments - Part 5 (Intercepting and Interpreting Network Traffic Lab)
  9. 9- 03.6- Performing Security Assessments - Part 6
  10. 10- 03.7- Performing Security Assessments - Part 7 ( Credentialed Vulnerability Scan Lab)
  11. 11- 04.1- Identifying Social Engineering and Malware - Part 1
  12. 12- 04.2- Identifying Social Engineering and Malware - Part 2
  13. 13- 04.3- Identifying Social Engineering and Malware - Part 3 (Malware-based Backdoor Lab)
  14. 14- 05- Summarizing Basic Cryptographic Concepts
  15. 15- 06.1- Implementing Public Key Infrastructure - Part 1
  16. 16- 06.2- Implementing Public Key Infrastructure - Part 2 (Managing the Lifecycle of a Certificate Lab)
  17. 17- 07.1- Implementing Authentication Controls - Part 1
  18. 18- 07.2- Implementing Authentication Controls - Part 2 (Password Cracking Lab)
  19. 19- 07.3- Implementing Authentication Controls - Part 3 (Managing Centralized Authentication Lab)
  20. 20- 08.1- Implementing Identity and Account Management Controls - Part 1
  21. 21- 08.2- Implementing Identity and Account Management Controls - Part 2 (Access Controls Lab)
  22. 22- 08.3- Implementing Identity and Account Management Controls - Part 3 (Auditing Policies Lab)
  23. 23- 08.4- Implementing Identity and Account Management Controls - Part 4 (Access Controls in Linux Lab)
  24. 24- 09.1- Implementing Secure Network Designs - Part 1
  25. 25- 09.2- Implementing Secure Network Designs - Part 2
  26. 26- 09.3- Implementing Secure Network Designs - Part 3 (Implementing a Secure Network Design Lab)
  27. 27- 10.1- Implementing Network Security Appliances - Part 1
  28. 28- 10.2- Implementing Network Security Appliances - Part 2 (Configuring a Firewall Lab)
  29. 29- 10.3- Implementing Network Security Appliances - Part 3 (Intrusion Detection System Lab)
  30. 30- 11.1- Implementing Secure Network Protocols - Part 1
  31. 31- 11.2 - Implementing Secure Network Protocols - Part 2 (Secure Network Addressing Services Lab)
  32. 32- 11.3- Implementing Secure Network Protocols - Part 3 (Implementing a Virtual Private Network Lab)
  33. 33- 11.4- Implementing Secure Network Protocols - Part 4 (Implementing a Secure SSH Server Lab)
  34. 34- 12.1- Implementing Host Security Solutions - Part 1
  35. 35- 12.2- Implementing Host Security Solutions - Part 2 (Implementing Endpoint Protection Lab)
  36. 36- 13- Implementing Secure Mobile Solutions
  37. 37- 14.1- Summarizing Secure Application Concepts - Part 1
  38. 38- 14.2- Summarizing Secure Application Concepts - Part 2 (Application Attack Indicators Lab)
  39. 39- 14.3- Summarizing Secure Application Concepts - Part 3 (Identifying a Browser Attack Lab)
  40. 40- 14.4- Summarizing Secure Application Concepts - Part 4 (Implementing PowerShell Security Lab)
  41. 41- 14.5- Summarizing Secure Application Concepts - Part 5 (Identifying Malicious Code Lab)
  42. 42- 15- Implementing Secure Cloud Solutions
  43. 43- 16- Explaining Data Privacy and Protection Concepts
  44. 44- 17.1- Performing Incident Response - Part 1
  45. 45- 17.2- Performing Incident Response - Part 2 (Managing Data Sources for Incident Response Lab)
  46. 46- 17.3- Performing Incident Response - Part 3 (Configuring Mitigation Controls Lab)
  47. 47- 18.1- Explaining Digital Forensics - Part 1
  48. 48- 18.2- Explaining Digital Forensics - Part 2 (Acquiring Digital Forensics Evidence Lab)
  49. 49- 19- Summarizing Risk Management Concepts
  50. 50- 20.1- Implementing Cybersecurity Resilience - Part 1
  51. 51- 20.2- Implementing Cybersecurity Resilience - Part 2 (Backing Up Data in Windows and Linux Lab)
  52. 52- 21- Explaining Physical Security