Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 1: Cybersecurity-Dierentiate between vulnerabilities and exploits
Chapter 2: Cybersecurity-Describe the stages of the cyber attack lifecycle-Reconnaissance
Chapter 4: Cybersecurity-Describe the stages of the cyber attack lifecycle-Exploitation
Chapter 13: Cybersecurity-Describe common attack types- DDoS
Chapter 14: Cybersecurity-Describe common threat detection systems-Intrusion detection system (IDS)
Chapter 16: Cybersecurity-Describe common threat detection systems-Network-based intrusion detection system (NIDS)
Chapter 17: Cybersecurity-Describe threat prevention systems and practices- End user awareness
Chapter 18: Cybersecurity-Describe threat prevention systems and practices- Security updates
Chapter 19: Cybersecurity-Describe threat prevention systems and practices- Antivirus
Chapter 20: Cybersecurity-Describe threat prevention systems and practices- Intrusion prevention system (IPS)
Chapter 23: Cybersecurity-Identify the purpose of Zero Trust
Chapter 25: Network Fundamentals-Dierentiate between types of area networks- LAN
Chapter 26: Network Fundamentals-Dierentiate between types of area networks- SD-WAN
Chapter 27: Network Fundamentals-Describe external (north-south) and internal (east-west) trac ow patterns for environments
Chapter 28: Network Fundamentals-Explain the function of a default gateway
Chapter 30: Network Fundamentals-Explain the function of DNS
Chapter 31: Network Fundamentals-Explain the function of DHCP
Chapter 32: Network Fundamentals-Dierentiate between static routing protocols and dynamic routing protocols
Chapter 33: Network Fundamentals-Dierentiate between routed protocols and routing protocols
Chapter 34: Network Fundamentals-Dierentiate between TCP/IP models and OSI models
Chapter 35: Network Fundamentals-dentify devices that operate in Layer 1 through Layer 4 of the OSI model
Chapter 36: Network Security-Dierentiate between network segmentation methods-IP subnetting
Chapter 37: Network Security-Dierentiate between network segmentation methods-VLANs
Chapter 38: Network Security-Dierentiate between network segmentation methods-Zones
Chapter 39: Network Security-Dierentiate between stateful rewalls and next-generation rewalls (NGFWs)
Chapter 40: Network Security-Explain the function of URL ltering
Chapter 43: Network Security-Dierentiate between tunneling protocols-SSH
Chapter 44: Network Security-Dierentiate between tunneling protocols-TLS
Chapter 47: Endpoint Security-Dierentiate between internet of things (IoT) devices and endpoints
Chapter 50: Endpoint Security-Identify endpoint security components-Security updates
Chapter 51: Endpoint Security-Identify endpoint security components-Antivirus
Chapter 52: Endpoint Security-Identify endpoint security components-Host-based rewalls
Chapter 53: Endpoint Security-Dierentiate between single-factor authentication and multi-factor authentication
Chapter 55: Cloud Security-Identify the four cloud-computing deployment models
Chapter 56: Cloud Security-Describe common cloud service models-Software as a service (SaaS)
Chapter 57: Cloud Security-Describe common cloud service models-Platform as a service (PaaS)
Chapter 58: Cloud Security-Describe common cloud service models-Infrastructure as a service (IaaS)
Chapter 61: Cloud Security-Identify the four Cs of cloud native security-Cloud
Chapter 63: Cloud Security-Identify the four Cs of cloud native security-Containers
Chapter 64: Cloud Security-Identify the four Cs of cloud native security-Code
Chapter 66: Cloud Security-Dene common cloud terms-Virtualization
Chapter 68: Cloud Security-Dene common cloud terms-Container
Chapter 69: Cloud Security-Dene common cloud terms-Orchestration
Chapter 70: Cloud Security-Dene common cloud terms-API
Chapter 72: Cloud Security-Explain the function of continuous integration and continuous delivery / deployment (CI/CD)
Chapter 73: Security Operations-Explain security operations functions-Identify / Detect
Chapter 75: Security Operations-Explain security operations functions-Mitigate
Chapter 77: Security Operations-Describe the pillars of eective security operations-Business
Chapter 78: Security Operations-Describe the pillars of eective security operations-People
Chapter 79: Security Operations-Describe the pillars of eective security operations-Interfaces
Chapter 80: Security Operations-Describe the pillars of eective security operations-Visibility
Chapter 81: Security Operations-Describe the pillars of eective security operations-Technology
Chapter 82: Security Operations-Describe the pillars of eective security operations-Processes
Chapter 83: Security Operations-Dene common security operations terms-Event
Chapter 85: Security Operations-Dene common security operations terms-Security operations center (SOC)
Chapter 86: Security Operations-Dene common security operations terms-DevSecOps
Chapter 87: Security Operations-Dene common security operations terms-Incident response (IR) plan
Chapter 88: Security Operations-Dene common security operations terms-Disaster recovery plan
Chapter 89: Security Operations-Explain the concepts of false positive alerts and false negative alerts
Chapter 91: Security Operations-Explain the following security operations technologies-Security orchestration, automation, and response (SOAR)
Chapter 92: Security Operations-Explain the following security operations technologies-Security information and event management (SIEM)
Chapter 93: Security Operations-Describe AI as it relates to alert analysis

Combo Packages at a Discount: Get one that best fits your learning needs.