• Home
  • Courses
  • Certification
  • Blog
  • Youtube Channel
  • Contact

Have any question?

[email protected]
Login
Free4arab
  • Home
  • Courses
  • Certification
  • Blog
  • Youtube Channel
  • Contact

CompTIA

  • Home
  • All courses
  • CompTIA
  • CompTIA Security+ SY0-601
CoursesCompTIACompTIA Security+ SY0-601
  • CompTIA Security+ SY0-601 | Eng-Ahmed Sultan | Arabic
    52
    • Lecture1.1
      Security+ (SY0-601) Course Introduction 41 min
    • Lecture1.2
      Comparing Security Roles and Security Controls 38 min
    • Lecture1.3
      Explaining Threat Actors and Threat Intelligence 58 min
    • Lecture1.4
      Performing Security Assessments – Part 1 01 hour
    • Lecture1.5
      Performing Security Assessments – Part 2 (Exploring the Lab Environment Lab) 30 min
    • Lecture1.6
      Performing Security Assessments – Part 3 (Scanning and Identifying Network Nodes Lab) 33 min
    • Lecture1.7
      Performing Security Assessments – Part 4 34 min
    • Lecture1.8
      Performing Security Assessments – Part 5 (Intercepting and Interpreting Network Traffic Lab) 31 min
    • Lecture1.9
      Performing Security Assessments – Part 6 01 hour
    • Lecture1.10
      Performing Security Assessments – Part 7 ( Credentialed Vulnerability Scan Lab) 26 min
    • Lecture1.11
      Identifying Social Engineering and Malware – Part 1 47 min
    • Lecture1.12
      Identifying Social Engineering and Malware – Part 2 56 min
    • Lecture1.13
      Identifying Social Engineering and Malware – Part 3 (Malware-based Backdoor Lab) 28 min
    • Lecture1.14
      Summarizing Basic Cryptographic Concepts 01 hour 41 min
    • Lecture1.15
      Implementing Public Key Infrastructure – Part 1 01 hour 03 min
    • Lecture1.16
      Implementing Public Key Infrastructure – Part 2 (Managing the Lifecycle of a Certificate Lab) 33 min
    • Lecture1.17
      Implementing Authentication Controls – Part 1 01 hour 22 min
    • Lecture1.18
      Implementing Authentication Controls – Part 2 (Password Cracking Lab) 36 min
    • Lecture1.19
      Implementing Identity and Account Management Controls – Part 1 01 hour 19 min
    • Lecture1.20
      Implementing Authentication Controls – Part 3 (Managing Centralized Authentication Lab) 31 min
    • Lecture1.21
      Implementing Identity and Account Management Controls – Part 2 (Access Controls Lab) 34 min
    • Lecture1.22
      Implementing Identity and Account Management Controls – Part 3 (Auditing Policies Lab) 34 min
    • Lecture1.23
      Implementing Identity and Account Management Controls – Part 4 (Access Controls in Linux Lab) 36 min
    • Lecture1.24
      Implementing Secure Network Designs – Part 1 58 min
    • Lecture1.25
      Implementing Secure Network Designs – Part 2 01 hour 21 min
    • Lecture1.26
      Implementing Secure Network Designs – Part 3 (Implementing a Secure Network Design Lab) 32 min
    • Lecture1.27
      Implementing Network Security Appliances – Part 1 01 hour 07 min
    • Lecture1.28
      Implementing Network Security Appliances – Part 2 (Configuring a Firewall Lab) 23 min
    • Lecture1.29
      Implementing Network Security Appliances – Part 3 (Intrusion Detection System Lab) 36 min
    • Lecture1.30
      Implementing Secure Network Protocols – Part 1 01 hour 05 min
    • Lecture1.31
      Implementing Secure Network Protocols – Part 2 (Secure Network Addressing Services Lab) 26 min
    • Lecture1.32
      Implementing Secure Network Protocols – Part 3 (Implementing a Virtual Private Network Lab) 22 min
    • Lecture1.33
      Implementing Secure Network Protocols – Part 4 (Implementing a Secure SSH Server Lab) 42 min
    • Lecture1.34
      Implementing Host Security Solutions – Part 1 18 min
    • Lecture1.35
      Implementing Host Security Solutions – Part 2 (Implementing Endpoint Protection Lab) 23 min
    • Lecture1.36
      Implementing Secure Mobile Solutions 26 min
    • Lecture1.37
      Summarizing Secure Application Concepts – Part 1 56 min
    • Lecture1.38
      Summarizing Secure Application Concepts – Part 2 (Application Attack Indicators Lab) 30 min
    • Lecture1.39
      Summarizing Secure Application Concepts – Part 3 (Identifying a Browser Attack Lab) 35 min
    • Lecture1.40
      Summarizing Secure Application Concepts – Part 4 (Implementing PowerShell Security Lab) 34 min
    • Lecture1.41
      Summarizing Secure Application Concepts – Part 5 (Identifying Malicious Code Lab) 25 min
    • Lecture1.42
      Implementing Secure Cloud Solutions 50 min
    • Lecture1.43
      Explaining Data Privacy and Protection Concepts 25 min
    • Lecture1.44
      Performing Incident Response – Part 1 01 hour
    • Lecture1.45
      Performing Incident Response – Part 2 (Managing Data Sources for Incident Response Lab) 42 min
    • Lecture1.46
      Performing Incident Response – Part 3 (Configuring Mitigation Controls Lab) 19 min
    • Lecture1.47
      Explaining Digital Forensics – Part 1 12 min
    • Lecture1.48
      Explaining Digital Forensics – Part 2 (Acquiring Digital Forensics Evidence Lab) 35 min
    • Lecture1.49
      Summarizing Risk Management Concepts 44 min
    • Lecture1.50
      Implementing Cybersecurity Resilience – Part 1 12 min
    • Lecture1.51
      Implementing Cybersecurity Resilience – Part 2 (Backing Up Data in Windows and Linux Lab) 24 min
    • Lecture1.52
      Explaining Physical Security 17 min
    This content is protected, please login and enroll course to view this content!
    Prev Implementing Secure Network Designs – Part 2
    Next Implementing Network Security Appliances – Part 1

    Leave A Reply Cancel reply

    You must be logged in to post a comment.

    All Courses

    • (ISC)²
    • Adobe
    • Amazon
    • Artificial intelligence
    • Cisco
    • CompTIA
    • Digital Marketing
    • EC-Council
    • Entrepreneurship
    • Fortinet
    • Graphic
    • ISACA
    • IT Management and governance
    • Java
    • Language
    • Linux
    • Microsoft
    • MikroTik
    • Oracle
    • Other
    • Programming
    • Security
    • Virtualization
    • VMware
    • Web Design and Development

    Latest Courses

    Certified Ethical Hacker (CEH) v10

    Certified Ethical Hacker (CEH) v10

    Free
    Certified Information Systems Security Professional (CISSP)

    Certified Information Systems Security Professional (CISSP)

    Free
    Python for Beginners

    Python for Beginners

    Free




    Copyright © 2020 Free4arab. All rights reserved.

    Login with your site account

    Lost your password?

    Modal title

    Message modal