- دانشجویان و فارغ التحصیلان رشته های کامپیوتر و فناوری اطلاعات
- کارشناسان شبکه و امنیت
- مدیران فناوری اطلاعات و مشاوران امنیت
- علاقه مندان به ورود به دنیای امنیت شبکه
Attacks, Threats and Vulnerabilities
Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.
SECURITY
Architecture and Design
Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.
HARDWARE & NETWORK TROUBLESHOOTING
Implementation
Expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.
OPERATING SYSTEMS
Operations and Incident Response
Covering organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.
SOFTWARE TROUBLESHOOTING
Governance, Risk and Compliance
Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.
[/deeper_text][deeper_text text_align=”align-right” text_color=”#000000″ text_font_size=”20px”]طول دوره:[/deeper_text][deeper_text text_align=”align-right” text_color=”#000000″ text_font_size=”15px”]30 ساعت به صورت مجازی[/deeper_text][deeper_button button_align=”align-center” button_text=”ثبت نام آنلاین” button_url=”url:https%3A%2F%2Finnovation.planovin.com%2F%23%2Fbook%3Fid%3D25909449%26servantId%3Dundefined|target:_blank” button_font_weight=””][/vc_column][/vc_row]