
ما در دنیایی زندگی می کنیم که هر کلیک، زدن کلید و ورود به سیستم یک میدان جنگ بالقوه است. آیا آماده هستید که سکان هدایت را در دست بگیرید و از آنچه که دارای اهمیت است محافظت کنید؟ دوره INE – Defensive Security Concepts با بررسی موضوعات اساسی دفاعی امنیت سایبری، از جمله سه گانه CIA، استراتژی دفاعی عمیق، مدل های کنترل دسترسی، سیستم امتیازدهی CVSS، رویکرد 5 تایی و موارد دیگر، شما را به یک متخصصی امنیت دیجیتال تبدیل می کند.
لینک دانلود دوره آموزشی INE – Defensive Security Concepts
حجم: 2.8 گیگابایت
دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم
رمز فايل: technet24.ir
Comparing Detection Approaches Rule-based, Behavioral, and Statistical Methods
Date: 2023
Publisher: INE
By: Ian Trimble
Duration: 10h 13m
Difficulty Level: Novice
We live in a world where every click, keystroke, and log-on is a potential battleground. Are you ready to take the helm and protect what matters most? This course will transform you into a digital guardian by exploring foundational cyber security defensive topics, including the CIA triad, defense-in-depth strategy, access control models, the CVSS scoring system, the 5-tuple approach, and more.
Activities:1
Introduction: The Journey into Defensive Security Concepts
Introduction to Defensive Security Concepts
Activities:4
The Importance of Cyber Security in Today’s World
Test your knowledge: The Importance of Cyber Security in Today’s World
Introduction to Security Terms and Concepts
Test your knowledge: Introduction to Security Terms and Concepts
Understanding the CIA Triad
Activities:4
Defining Confidentiality, Integrity, and Availability in the CIA Triad
Test your knowledge: Defining Confidentiality, Integrity, and Availability in the CIA Triad
The Role and Importance of the CIA Triad
Test your knowledge: The Role and Importance of the CIA Triad
Defense-in-Depth Strategy
Activities:6
Introduction to Defense-in-Depth Strategy
Test your knowledge: Introduction to Defense-in-Depth Strategy
Understanding the Principles of Defense-in-Depth Strategy
Test your knowledge: Understanding the Principles of Defense-in-Depth Strategy
Applying Defense-in-Depth Strategy in Real-world Scenarios
Test your knowledge: Applying Defense-in-Depth Strategy in Real-world Scenarios
Introduction to Security Toolset Architecture
Activities:6
Understanding the Importance of Security Tools
Test your knowledge: Understanding the Importance of Security Tools
A Detailed Overview of the Security Toolset Architecture
Test your knowledge: A Detailed Overview of the Security Toolset Architecture
Integration and Coordination of Security Tools
Test your knowledge: Integration and Coordination of Security Tools
Access Control Models
Activities:6
The Importance of Access Control in Cybersecurity
Test your knowledge: The Importance of Access Control in Cybersecurity
Understanding DAC, MAC, and RBAC Models
Test your knowledge: Understanding DAC, MAC, and RBAC Models
Implementing and Managing Access Controls
Test your knowledge: Implementing and Managing Access Controls
Common Vulnerability Scoring System (CVSS)
Activities:6
Understanding the CVSS Framework
Test your knowledge: Understanding the CVSS Framework
Introduction to CVSS Terms and Scoring System
Test your knowledge: Introduction to CVSS Terms and Scoring System
Applying CVSS in Vulnerability Management
Test your knowledge: Applying CVSS in Vulnerability Management
Data Visibility for Detection
Activities:6
The Importance of Data Visibility in Cybersecurity
Test your knowledge: The Importance of Data Visibility in Cybersecurity
Strategies for Data Visibility
Test your knowledge: Strategies for Data Visibility
Case Studies of Data Visibility in Action
Test your knowledge: Case Studies of Data Visibility in Action
5-tuple Approach to Isolate a Compromised Host
Activities:4
Unpacking the 5-tuple Approach for Host Isolation
Test your knowledge: Unpacking the 5-tuple Approach for Host Isolation
Using the 5-tuple Approach
Test your knowledge: Using the 5-tuple Approach
Rule-based, Behavioral, and Statistical Detection
Activities:6
Overview of Rule-based, Behavioral, and Statistical Detection Methods
Test your knowledge: Overview of Rule-based, Behavioral, and Statistical Detection Methods
Implementing Different Detection Methods
Test your knowledge: Implementing Different Detection Methods
Comparing Detection Approaches: Rule-based, Behavioral, and Statistical Methods
Test your knowledge: Comparing Detection Approaches: Rule-based, Behavioral, and Statistical Methods
Goodbye
Activities:1
Conclusion