الدرس 27 | CompTIA Security+

قائمة الدروس

  1. 00- Security+ (SY0-601) Course Introduction - عربي
  2. 01- Comparing Security Roles and Security Controls
  3. 02- Explaining Threat Actors and Threat Intelligence
  4. 03.1- Performing Security Assessments - Part 1
  5. 03.2- Performing Security Assessments - Part 2 (Exploring the Lab Environment Lab)
  6. 03.3- Performing Security Assessments - Part 3 (Scanning and Identifying Network Nodes Lab)
  7. 03.4- Performing Security Assessments - Part 4
  8. 03.5- Performing Security Assessments - Part 5 (Intercepting and Interpreting Network Traffic Lab)
  9. 03.6- Performing Security Assessments - Part 6
  10. 03.7- Performing Security Assessments - Part 7 ( Credentialed Vulnerability Scan Lab)
  11. 04.1- Identifying Social Engineering and Malware - Part 1
  12. 04.2- Identifying Social Engineering and Malware - Part 2
  13. 04.3- Identifying Social Engineering and Malware - Part 3 (Malware-based Backdoor Lab)
  14. 05- Summarizing Basic Cryptographic Concepts
  15. 06.1- Implementing Public Key Infrastructure - Part 1
  16. 06.2- Implementing Public Key Infrastructure - Part 2 (Managing the Lifecycle of a Certificate Lab)
  17. 07.1- Implementing Authentication Controls - Part 1
  18. 07.2- Implementing Authentication Controls - Part 2 (Password Cracking Lab)
  19. 07.3- Implementing Authentication Controls - Part 3 (Managing Centralized Authentication Lab)
  20. 08.1- Implementing Identity and Account Management Controls - Part 1
  21. 08.2- Implementing Identity and Account Management Controls - Part 2 (Access Controls Lab)
  22. 08.3- Implementing Identity and Account Management Controls - Part 3 (Auditing Policies Lab)
  23. 08.4- Implementing Identity and Account Management Controls - Part 4 (Access Controls in Linux Lab)
  24. 09.1- Implementing Secure Network Designs - Part 1
  25. 09.2- Implementing Secure Network Designs - Part 2
  26. 09.3- Implementing Secure Network Designs - Part 3 (Implementing a Secure Network Design Lab)
  27. 10.1- Implementing Network Security Appliances - Part 1
  28. 10.2- Implementing Network Security Appliances - Part 2 (Configuring a Firewall Lab)
  29. 10.3- Implementing Network Security Appliances - Part 3 (Intrusion Detection System Lab)
  30. 11.1- Implementing Secure Network Protocols - Part 1
  31. 11.2 - Implementing Secure Network Protocols - Part 2 (Secure Network Addressing Services Lab)
  32. 11.3- Implementing Secure Network Protocols - Part 3 (Implementing a Virtual Private Network Lab)
  33. 11.4- Implementing Secure Network Protocols - Part 4 (Implementing a Secure SSH Server Lab)
  34. 12.1- Implementing Host Security Solutions - Part 1
  35. 12.2- Implementing Host Security Solutions - Part 2 (Implementing Endpoint Protection Lab)
  36. 13- Implementing Secure Mobile Solutions
  37. 14.1- Summarizing Secure Application Concepts - Part 1
  38. 14.2- Summarizing Secure Application Concepts - Part 2 (Application Attack Indicators Lab)
  39. 14.3- Summarizing Secure Application Concepts - Part 3 (Identifying a Browser Attack Lab)
  40. 14.4- Summarizing Secure Application Concepts - Part 4 (Implementing PowerShell Security Lab)
  41. 14.5- Summarizing Secure Application Concepts - Part 5 (Identifying Malicious Code Lab)
  42. 15- Implementing Secure Cloud Solutions
  43. 16- Explaining Data Privacy and Protection Concepts
  44. 17.1- Performing Incident Response - Part 1
  45. 17.2- Performing Incident Response - Part 2 (Managing Data Sources for Incident Response Lab)
  46. 17.3- Performing Incident Response - Part 3 (Configuring Mitigation Controls Lab)
  47. 18.1- Explaining Digital Forensics - Part 1
  48. 18.2- Explaining Digital Forensics - Part 2 (Acquiring Digital Forensics Evidence Lab)
  49. 19- Summarizing Risk Management Concepts
  50. 20.1- Implementing Cybersecurity Resilience - Part 1
  51. 20.2- Implementing Cybersecurity Resilience - Part 2 (Backing Up Data in Windows and Linux Lab)
  52. 21- Explaining Physical Security
Loading...
10.1- Implementing Network Security Appliances - Part 1

ترتيب الدرس : 27

01:06:16

10.1- Implementing Network Security Appliances - Part 1

© حقوق النشر محفوظة لمالكى القنوات | القوانين والخصوصية

اضف التطبيق الى شاشتك الرئيسية