- 1 Section
- 33 Lessons
- 40 Hours
عرض كل الأقسامCollapse all sections
- part133
- 1.1استبيان المرحلة الأولى
- 1.2course content
- 1.3L1 Security Concepts
- 1.4Lab1.1 Windows Server installation
- 1.5Lab1:Setting up the Lab Environment
- 1.6L2 Identify Threat Actors
- 1.7Lab2: Using SET to Perform Social Engineering
- 1.8L3.1 Cryptography
- 1.9L3.2 Cryptography
- 1.10Lab3: Using Storage Encryption and Hashing
- 1.11L4.1 IAM Part1
- 1.12Lab4: Managing Permissions
- 1.13L4.2 IAM Part2
- 1.14L5 Network Archetechture
- 1.15Setting up Remote Access
- 1.16Lab5: Port Scanning
- 1.17L6: Cloud Archetecture
- 1.18L8: Vulnerability Management
- 1.19L7: Asset Management
- 1.20Lab8: Exploiting and Detecting SQLi
- 1.21L9: Network Security
- 1.22Lab9: Configuring Firewall Rules
- 1.23L10: Endpoint Security and Mobile
- 1.24L11: Secure Protocols
- 1.25L12.A: Alerting And Monitoring Tools
- 1.26L12.B: Digital Forensics
- 1.27L13: Indicators Of compromise ( IoC )
- 1.28Lab13: Remote Code Execution
- 1.29Lab13: Password Attacks
- 1.30L14: Security Governance Concepts
- 1.31L15: Risk Management Proccess
- 1.32L16: Data Protection and Compliance
- 1.33استبيان المرحلة النهائية
L16: Data Protection and Compliance
Prev