top of page
زر قناتنا في التليجرام
او قم  بتواصل معنا بالواتس اب

دورات شبكات وامن معلومات

newccna.png

CCNA EI

Topics:
1-introduction of networks
2-type of network connection
3-IP classes
4-ISO
5-VLSM
5.5-protocol
6-important baisc & advanced config
7-rooting protocol
A-static
B-default
C-rip v2
D-ospf
E-eigrp
8-access-list
A-standard
B-extended 
9-nat pat
A-static NAT
B-Dynamic NAT
C-NAT PAT 
10-spt
11-vlan
12-VTP
13-wireless & ipv6
14-what is sdwsn
15-whatis SDA
16-python in Netwirk
17-final scenario
18-preparing exam

CyberSecurity ops.jpg

Cybersecurity OPS

Topics:

SECFND (210-250)

1- TCP/IP and Cryptology Concepts

1.1 Understanding the TCP-IP Protocol Suite

1.2 Understanding the Network Infrastructure

1.3 Understanding the Common TCP-IP Attacks

1.4 Understanding Basic Cryptography Concepts

2- Network Applications and Endpoint Security

2.1 Describing Information Security Concepts

2.2 Understanding Network Applications

2.3 Understanding Windows Operating System Basics

2.4 Understanding Linux Operating System Basics

2.5 Understanding Network Security Technologies

3- Security Monitoring and Analysis

3.1 Describing Security Data Collection

 

SECOPS (210-255)

4- SOC Overview

1.1 Defining the Security Operations Center

4.2 Understanding NSM Tools and Data

4.3 Understanding Incident Analysis in a Threat-Centric SOC

 

5- Security Incident Investigations

5.1 Understanding Event Correlation and Normalization

5.2 Identifying Common Attacks Vectors

5.3 Identifying Malicious Activity

5.4 Identifying Patterns of Suspicious Behavior

6- SOC Operations

6.1 Describing the SOC Playbook

6.2 Understanding the SOC Metrics

6.3 Describing the Incident Response Plan

download.jfif

Security+

Topics:

1-Comparing Security Roles and Security Controls

2-Explaining Threat Actors and Threat Intelligence.

3-Performing Security Assessments

4-Identifying Social Engineering and Malware

5-Summarizing Basic Cryptographic Concepts

6-Implementing Public Key Infrastructure

7-Implementing Authentication Controls

8-Implementing Identity and Account Management Controls

9-Implementing Secure Network Designs

10-Implementing Network Security Appliances

11-Implementing Secure Network Protocols

12-Implementing Host Security Solutions

8-Implementing Secure Mobile Solutions

13-Summarizing Secure Application Concepts

14-Implementing Secure Cloud Solutions

15-Explaining Data Privacy and Protection Concepts

16-Performing Incident Response

17-Explaining Digital Forensics

18-Summarizing Risk Management Concepts

19-Implementing Cybersecurity Resilience

20-Explaining Physical Security

bottom of page