برای تعیین اینکه آیا دوره SANS SEC301 برای شما مناسب است، پنج سوال ساده از خود بپرسید:
- آیا در زمینه امنیت سایبری تازه کار هستید و نیاز به مقدمه ای با اصول اولیه دارید؟
- آیا با اصطلاحات پیچیده امنیتی فنی بمباران شده اید که نمی دانید؟
- آیا لازم است که در مفاهیم، اصول و اصطلاحات اساسی امنیتی مسلط باشید، اما به جزئیات “عمق علف های هرز” نیاز ندارید؟
- آیا تصمیم گرفته اید برای استفاده از فرصت های شغلی در امنیت سایبری تغییر شغلی ایجاد کنید و نیاز به آموزش/گواهینامه رسمی دارید؟
- آیا شما مدیری هستید که شبها بیدار میمانید و نگران این هستید که شرکت شما ممکن است سرفصل اخبار بزرگ بعدی در اخبار ساعت 6 باشد؟
اگر پاسخ شما به هر یک از این سوالات مثبت است، دوره آموزشی SEC301: Introduction to Cyber Security برای شما مناسب است. دانش امنیت سایبری خود را با دریافت بینش و دستورالعمل از کارشناسان امنیت دنیای واقعی در مورد موضوعات مهمی که برای امنیت سایبری اساسی هستند، شروع کنید. برخی از مواردی که این دوره جامع پنج روزه پوشش میدهد شامل اصطلاحات اصلی، نحوه عملکرد رایانهها و شبکهها، امنیت دستگاه تلفن همراه، اینترنت اشیاء (IoT)، هوش مصنوعی (AI)، احراز هویت از جمله روشی جدید برای نگاه کردن به عبارتهای عبور است. مجوز از جمله مجوزها، دانش بدون ثبت نام، فرآیندهای رمزنگاری، مهندسی اجتماعی، حملات شبکه و بدافزار، امنیت بیسیم، فایروالها و بسیاری دیگر از فناوریهای دفاعی امنیت سایبری، امنیت وب و مرورگر، پشتیبانگیری، ماشینهای مجازی و رایانش ابری . همه موضوعات در سطح مقدماتی قابل درک پوشش داده شده است. این دوره برای کسانی است که دانش بسیار کمی از کامپیوتر و فناوری دارند و هیچ دانش قبلی در مورد امنیت سایبری ندارند. روش آموزش عملی و گام به گام شما را قادر می سازد تا تمام اطلاعات ارائه شده را درک کنید، حتی اگر برخی از موضوعات برای شما جدید باشد. شما اصول امنیت سایبری دنیای واقعی را خواهید آموخت تا به عنوان پایه و اساس مهارت ها و دانش شغلی خود برای سال های آینده خدمت کنید.
Date: 2022
Price: $7,430 USD
Publisher: SANS
By: Keith Palmgren
Format: eBook PDF
Website: Link
What You Will Learn
To determine if the SANS SEC301 course is right for you, ask yourself five simple questions:
- Are you new to cyber security and in need of an introduction to the fundamentals?
- Are you bombarded with complex technical security terms that you don’t understand?
- Do you need to be conversant in basic security concepts, principles, and terms, but do not need “deep in the weeds” detail?
- Have you decided to make a career change to take advantage of the job opportunities in cyber security and need formal training/certification?
- Are you a manager who lays awake at night worrying that your company may be the next mega-breach headline story on the 6 o’clock news?
If you answer yes to any of these questions, the SEC301: Introduction to Cyber Security training course is for you. Jump-start your cyber security knowledge by receiving insight and instruction from real-world security experts on critical topics that are fundamental to cyber security.
Some of the things this five-day comprehensive course covers includes core terminology, how computers and networks function, mobile device security, the Internet-of-Things (IoT), Artificial Intelligence (AI), authentication including a new way of looking at passphrases, authorization including permissions, single-sign-on, & zero knowledge, cryptographic processes, social engineering, network attacks & malware, wireless security, firewalls and many other cyber security defense technologies, web & browser security, backups, virtual machines & cloud computing. All topics are covered at an easy-to-understand introductory level.
This course is for those who have very little knowledge of computers & technology with no prior knowledge of cyber security. The hands-on, step-by-step teaching approach enables you to grasp all the information presented, even if some of the topics are new to you. You will learn real-world cyber security fundamentals to serve as the foundation of your career skills and knowledge for years to come.
Written by a cyber security professional with four decades of industry experience in both the public and private sectors, SEC301 provides uncompromising real-world insight from start to finish. The course prepares you for the Global Information Security Fundamentals (GISF) certification test, as well as getting you ready for your next training course. It also delivers on the SANS promise: “You can use the knowledge and skills you learn in SEC301 as soon as you return to work.”
BUSINESS TAKEAWAYS
This course will help your organization:
- Secure your organization’s assets through the application of the Principle of Least Privilege
- Understand the fundamentals of authentication, authorization, cryptography, and defensive technologies such as firewalls
- Communicate a wide variety of attacks including social engineering, drive-by downloads, watering hole attacks, lateral movement, botnets, buffer overflows, and more
- Avoid being the next mega-breach headline story on the 6 o’clock news
You Will Be Able To
- Communicate with confidence regarding cyber security topics, terms, and concepts
- Have a fundamental grasp of any number of technical acronyms: TCP/IP, IP, TCP, UDP, DHCP, ARP, NAT, ICMP, and DNS, and the list goes on
- Understand and apply the Principle of Least Privilege
- Understand the application of Confidentiality, Integrity, and Availability (CIA) for prioritization of critical security resources
- Understand the relationship between the Graphical User Interface (GUI) and Command Line Interface (CLI) on both Windows and Linux
- Use the GUI and CLI to manipulate files and folders in both Windows and Linux
- Build better passphrases that are more secure while also being easier to remember and type — and be able to help co-workers, family, and friends do the same
- Deploy a secure password manager in your organization and at home
- Grasp basic cryptographic principles, processes, procedures, and applications
- Implement cryptography tools
- Understand the cyber security impact of the Internet of Things (IoT)
- Discuss the cyber security impact of Artificial Intelligence (AI)
- Understand how a computer works including the role of the operating system, kernel, file systems, users, groups, hard-disk-drives, and Random Access Memory (RAM)
- Convert number systems utilized by computers including decimal, binary, and hexadecimal values
- Understand computer network basics including routing, default gateways, and common protocol packet headers
- Utilize built-in Windows tools to see your network settings
- Analyze network traffic using the popular Wireshark tool
- Understand how Windows and Linux implement file and directory permissions
- Set file permissions on a Linux system
- Understand wireless technologies including Wi-Fi, Bluetooth, and mobile phones
- Secure a wireless access point using industry best practice settings
- Understand different types of malware
- Explain a variety of frequent attacks such as social engineering, drive-by downloads, watering hole attacks, living-off-the-land, lateral movement, buffer overflow, botnets, and other common attacks
- Understand the application of defensive technologies such as anti-malware firewalls, sinkholes, content filters, vulnerability scanners, penetration testing, active defense, threat hunting, and allow-listing
- Implement a simple firewall configuration
- Differentiate between the surface web, the deep web, and the dark web.
- Understand browser security and the privacy issues associated with web browsing
- Explain system hardening
- Discuss system patching
- Understand virtual machines and cloud computing
- Understand backups and create a backup plan for your personal life that helps you guard against having to pay a ransom to access your data
In this course, you receive the following:
- Electronic Courseware for each day of training that includes the slides presented and notes to explain them plus an electronic lab workbook explaining the hands-on labs
- Access to the SEC301.com website containing 680+ quiz questions, videos of the author performing each lab, and additional helpful materials
- Five full days’ worth of high-quality instruction and explanation
- MP3 audio files of the complete course lecture
Syllabus
SEC301.1: Cyber Security Foundation
SEC301.2: Introduction to Cryptography
SEC301.3: Authentication, Authorization, & Networking
SEC301.4: Wireless Security, Network Attacks, & Malware
SEC301.5: Cyber Security Technologies & Web Security