网络安全 Security+(SY0-601)学习笔记

整理资料来源:

https://www.linkedin.com/learning/paths/become-a-comptia-security-plus-certified-security-professional-sy0-601

一、威胁,攻击和漏洞:

1.恶意软件:https://blog.csdn.net/tushanpeipei/article/details/120245151?spm=1001.2014.3001.5502
2.认识网络攻击:https://blog.csdn.net/tushanpeipei/article/details/120252183?spm=1001.2014.3001.5502
3.威胁情报:https://blog.csdn.net/tushanpeipei/article/details/120259530?spm=1001.2014.3001.5502
4.社会工程攻击:https://blog.csdn.net/tushanpeipei/article/details/120295919?spm=1001.2014.3001.5502
5.常见的网络攻击:https://blog.csdn.net/tushanpeipei/article/details/120300494?spm=1001.2014.3001.5502
6.了解漏洞的类型:https://blog.csdn.net/tushanpeipei/article/details/120332372?spm=1001.2014.3001.5502
7.漏洞扫描:https://blog.csdn.net/tushanpeipei/article/details/120335699?spm=1001.2014.3001.5502
8.渗透测试和安全练习:https://blog.csdn.net/tushanpeipei/article/details/120355122?spm=1001.2014.3001.5502

二、安全代码设计与实现:

1.软件开发周期:https://blog.csdn.net/tushanpeipei/article/details/120376214?spm=1001.2014.3001.5501
2.软件质量保证:https://blog.csdn.net/tushanpeipei/article/details/120376376?spm=1001.2014.3001.5501
3.应用程序攻击:https://blog.csdn.net/tushanpeipei/article/details/120382711?spm=1001.2014.3001.5501
4.安全编码实践:https://blog.csdn.net/tushanpeipei/article/details/120393719?spm=1001.2014.3001.5501

三、密码学设计与实现:

1.加密基础:https://blog.csdn.net/tushanpeipei/article/details/120398239?spm=1001.2014.3001.5501
2.对称密码学:https://blog.csdn.net/tushanpeipei/article/details/120405096?spm=1001.2014.3001.5501
3.非对称密码学:https://blog.csdn.net/tushanpeipei/article/details/120407412?spm=1001.2014.3001.5501
4.密钥管理:https://blog.csdn.net/tushanpeipei/article/details/120419680?spm=1001.2014.3001.5501
5.公钥基础设施:https://blog.csdn.net/tushanpeipei/article/details/120422914?spm=1001.2014.3001.5501
6.密码分析攻击:https://blog.csdn.net/tushanpeipei/article/details/120445165?spm=1001.2014.3001.5501
7.密码学应用:https://blog.csdn.net/tushanpeipei/article/details/120445768?spm=1001.2014.3001.5501

四、身份和访问管理的设计与实现:

1.身份证明:https://blog.csdn.net/tushanpeipei/article/details/120473042?spm=1001.2014.3001.5501
2.认证:https://blog.csdn.net/tushanpeipei/article/details/120474138?spm=1001.2014.3001.5501
3.授权:https://blog.csdn.net/tushanpeipei/article/details/120488276?spm=1001.2014.3001.5501
4.帐户管理:https://blog.csdn.net/tushanpeipei/article/details/120513376?spm=1001.2014.3001.5501

五、实体安全设计与实现:

1.数据中心防护:https://blog.csdn.net/tushanpeipei/article/details/120518159?spm=1001.2014.3001.5502
2.硬件与数据安全:https://blog.csdn.net/tushanpeipei/article/details/120521005?spm=1001.2014.3001.5502
3.业务连续性:https://blog.csdn.net/tushanpeipei/article/details/120521046?spm=1001.2014.3001.5502
4.灾后恢复:https://blog.csdn.net/tushanpeipei/article/details/120521065?spm=1001.2014.3001.5502

六、云安全设计与实现:

1.云计算:https://blog.csdn.net/tushanpeipei/article/details/120530948?spm=1001.2014.3001.5501
2.虚拟化:https://blog.csdn.net/tushanpeipei/article/details/120537362?spm=1001.2014.3001.5501
3.云计算构建模块:https://blog.csdn.net/tushanpeipei/article/details/120539140?spm=1001.2014.3001.5501
4.云计算参考架构:https://blog.csdn.net/tushanpeipei/article/details/120540906?spm=1001.2014.3001.5501
5.云安全控制:https://blog.csdn.net/tushanpeipei/article/details/120540939?spm=1001.2014.3001.5501

七、终端安全设计与实现:

1.主机安全:https://blog.csdn.net/tushanpeipei/article/details/120551144?spm=1001.2014.3001.5501
2.硬件安全:https://blog.csdn.net/tushanpeipei/article/details/120555391?spm=1001.2014.3001.5501
3.配置管理:https://blog.csdn.net/tushanpeipei/article/details/120559353?spm=1001.2014.3001.5501
4.嵌入式系统安全:https://blog.csdn.net/tushanpeipei/article/details/120559386?spm=1001.2014.3001.5501
5.脚本和命令行:https://blog.csdn.net/tushanpeipei/article/details/120559415?spm=1001.2014.3001.5501

八、网络安全设计与实现:

1.TCP/IP网络:https://blog.csdn.net/tushanpeipei/article/details/120569329?spm=1001.2014.3001.5501
2.安全网络设计:https://blog.csdn.net/tushanpeipei/article/details/120571766?spm=1001.2014.3001.5501
3.网络安全设备:https://blog.csdn.net/tushanpeipei/article/details/120572832?spm=1001.2014.3001.5501
4.安全网络技术:https://blog.csdn.net/tushanpeipei/article/details/120581131?spm=1001.2014.3001.5501
5.传输加密:https://blog.csdn.net/tushanpeipei/article/details/120582950?spm=1001.2014.3001.5501
6.无线网络:https://blog.csdn.net/tushanpeipei/article/details/120588348?spm=1001.2014.3001.5501
7.网络攻击:https://blog.csdn.net/tushanpeipei/article/details/120590554?spm=1001.2014.3001.5501
8.移动设备安全:https://blog.csdn.net/tushanpeipei/article/details/120591222?spm=1001.2014.3001.5501
9.网络工具:https://blog.csdn.net/tushanpeipei/article/details/120591354?spm=1001.2014.3001.5501

九、业务和事件响应:

1.事件响应方案:https://blog.csdn.net/tushanpeipei/article/details/120600551?spm=1001.2014.3001.5501
2.攻击框架:https://blog.csdn.net/tushanpeipei/article/details/120609104?spm=1001.2014.3001.5501
3.事件调查:https://blog.csdn.net/tushanpeipei/article/details/120610307?spm=1001.2014.3001.5501
4.取证技术:https://blog.csdn.net/tushanpeipei/article/details/120610391?spm=1001.2014.3001.5501

十、治理、风险和合规性:

#由于考试需要,涉及到几乎是欧美的政策。

1.风险分析:https://blog.csdn.net/tushanpeipei/article/details/120617399?spm=1001.2014.3001.5501
2.风险管理:https://blog.csdn.net/tushanpeipei/article/details/120620780?spm=1001.2014.3001.5501
3.供应链风险:https://blog.csdn.net/tushanpeipei/article/details/120625846?spm=1001.2014.3001.5501
4.安全政策:https://blog.csdn.net/tushanpeipei/article/details/120626731?spm=1001.2014.3001.5501
5.隐私和合规性:https://blog.csdn.net/tushanpeipei/article/details/120627398?spm=1001.2014.3001.5501
6.增强隐私保护的技术:https://blog.csdn.net/tushanpeipei/article/details/120627763?spm=1001.2014.3001.5501
7.安全意识和培训:https://blog.csdn.net/tushanpeipei/article/details/120628102?spm=1001.2014.3001.5501

评论 4
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

格洛米爱学习

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值