
دورات شبكات وامن معلومات

CCNA EI
Topics:
1-introduction of networks
2-type of network connection
3-IP classes
4-ISO
5-VLSM
5.5-protocol
6-important baisc & advanced config
7-rooting protocol
A-static
B-default
C-rip v2
D-ospf
E-eigrp
8-access-list
A-standard
B-extended
9-nat pat
A-static NAT
B-Dynamic NAT
C-NAT PAT
10-spt
11-vlan
12-VTP
13-wireless & ipv6
14-what is sdwsn
15-whatis SDA
16-python in Netwirk
17-final scenario
18-preparing exam

Cybersecurity OPS
Topics:
SECFND (210-250)
1- TCP/IP and Cryptology Concepts
1.1 Understanding the TCP-IP Protocol Suite
1.2 Understanding the Network Infrastructure
1.3 Understanding the Common TCP-IP Attacks
1.4 Understanding Basic Cryptography Concepts
2- Network Applications and Endpoint Security
2.1 Describing Information Security Concepts
2.2 Understanding Network Applications
2.3 Understanding Windows Operating System Basics
2.4 Understanding Linux Operating System Basics
2.5 Understanding Network Security Technologies
3- Security Monitoring and Analysis
3.1 Describing Security Data Collection
SECOPS (210-255)
4- SOC Overview
1.1 Defining the Security Operations Center
4.2 Understanding NSM Tools and Data
4.3 Understanding Incident Analysis in a Threat-Centric SOC
5- Security Incident Investigations
5.1 Understanding Event Correlation and Normalization
5.2 Identifying Common Attacks Vectors
5.3 Identifying Malicious Activity
5.4 Identifying Patterns of Suspicious Behavior
6- SOC Operations
6.1 Describing the SOC Playbook
6.2 Understanding the SOC Metrics
6.3 Describing the Incident Response Plan

Security+
Topics:
1-Comparing Security Roles and Security Controls
2-Explaining Threat Actors and Threat Intelligence.
3-Performing Security Assessments
4-Identifying Social Engineering and Malware
5-Summarizing Basic Cryptographic Concepts
6-Implementing Public Key Infrastructure
7-Implementing Authentication Controls
8-Implementing Identity and Account Management Controls
9-Implementing Secure Network Designs
10-Implementing Network Security Appliances
11-Implementing Secure Network Protocols
12-Implementing Host Security Solutions
8-Implementing Secure Mobile Solutions
13-Summarizing Secure Application Concepts
14-Implementing Secure Cloud Solutions
15-Explaining Data Privacy and Protection Concepts
16-Performing Incident Response
17-Explaining Digital Forensics
18-Summarizing Risk Management Concepts
19-Implementing Cybersecurity Resilience
20-Explaining Physical Security