در حالت کلی به مجموعه اقداماتی گفته می شود که به منظور جلوگیری از بروز مشکلات امنیتی در بستر شبکه صورت میگیرد. این مجموعه اقدامات می تواند بصورت راهکارهای متعددی در غالب سرویس های سخت افزاری و نرم افزاری پیاده سازی شوند. لازم به ذکر است که معمولا بسیاری از روشهای تامین امنیت توسط رول ها (Roles) صورت می گیرد.
شما با مفاهیم رشته امنیت شبکه و همین طور با انواع متد ها و حملات آشنا خواهید شد.
CCNA/MCSA
بر مبنای workbook های SANS
- The Technical Foundations of Hacking
- TCP/IP fundamental
- Threats, Attacks, and Vulnerabilities
- Critical Security Controls
- Security Posture Assessment Tools
- Identity and Access Management
- Cryptography
- Identity and Access Services
- Secure Network Design
- An Introduction to Ethical Hacking
- Secure Protocols and Services
- Secure Virtualization and Cloud Services
- Disaster Recovery and Resiliency
- Network Protocol Structures
- Advanced Application Traffic Capture
- Analysis from the Wire
- Application Reverse Engineering
- Network Protocol Security
- Implementing the Network Protocol
- Finding and Exploiting Security Vulnerabilities
- Network Protocol Analysis Toolkit
- Foot printing and Scanning
- Enumeration and System Hacking
- Sniffing with Wireshark
- Getting Started with Kali Linux
- Linux Fundamentals
- Configuring Kali Linux
- Securing and Monitoring Kali Linux
- Social Engineering
- Social Engineering with kali Linux metasploit
- Metasploit Basics
- Intelligence Gathering
- Meterpreter
- Avoiding Detection
- Exploitation Using Client-Side Attacks
- Metasploit Auxiliary Modules
- The Social-Engineer Toolkit
- Karmetasploit
- Porting Exploits to the Metasploit Framework
- Malware Threats, and Vulnerability Analysis
- Malware Threats, and Vulnerability Analysis using kali linux
- Sniffers, Session Hijacking, and Denial of Service
- Web Server Hacking, Web Applications, and Database Attacks
- Wireless Technologies, Mobile Security, and Attacks
- IDS, Firewalls, and Honeypots
- Cryptographic Attacks and Defenses
- Kali Linux in the Enterprise
- Introduction to Security Assessments
- Introduction to Security Assessments
- Gathering Intel and Planning Attack Strategies
- Web App Exploitation – Beyond OWASP Top 10
- Network Exploitation on Current Exploitation
- Wireless Attacks – Getting Past Aircrack-ng
- Password Attacks – The Fault in Their Stars
- Kali in Your Pocket – NetHunters and Raspberries
- Enumeration
- System Hacking
دسته بندی ها:
امنیت