Security 5 Certification
Code: |
EC-COUNCIL-SECURITY5 |
Type: |
IT InstructorLed Courses |
Category: |
EC-Council
|
|
Security’ is a buzz word that is catching up with diverse industry verticals relying on computing systems to keep the operations and business wheels moving. Today, average office goers sign an ‘Acceptable Use Policy’ that is part of ‘Corporate Security Policies’ and are responsible for any misuse and damage caused on computing resources.
Several companies offer in-house training to raise the security awareness of its employees, while others prefer knowledgeable workers who have acquired security related credentials. However, there is a discernable need for knowledge workers who know the basics of security. These employees bring greater value to the workplace in terms of better productivity and higher efficiency. There are lesser downtimes and security lapses by employees and hence greater cost savings and profits.
Do these employees need to know how to architect a security policy or understand complex firewall rules? No, they do not. What today’s knowledge workers need to bring in a better tomorrow is the ‘Alphabet Soup of Security’ – the basic core knowledge to distinguish between the legitimate and the malevolent. They need to be armed with knowledge that can complement the system administrator’s security safeguards and the chief security officer’s security architecture for the corporation. These knowledge workers are not confined to the corporate space alone. They are knowledgeable parents who can guide their children safely in cyberspace, the knowledgeable citizen who can safely use e-governance resources and the knowledgeable freshman who can help protect intellectual property on the net.
If you are someone who banks online, pays utility bills online, shops online, have children chatting online, downloads shareware and games, communicates over email, subscribes to a broadband connection or someome who uses a computer system at work /home, then you need to have Security 5 training to help you guard your information assets.
Identity theft, credit card fraud, online banking Phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information and hackers are some of the threats you will face on a daily basis. Are you prepared to face them and defend yourself? Secure yourself with Security 5 training. Take control and remain in control of your information resources.
|
|
|
Duration: |
14 |
Location: |
EDITC & MMC Conference Center, 16 Imvrou Street, 1055 Nicosia |
Language: |
English |
Attendance: |
4-16 |
|
|
|
|
|
|
|
Topics
1.Foundations of Security 2.Basic Security Procedures 3.Desktop Security 4.Administering Windows Security 5.Phishing and its countermeasures 6.Secure Internet Access 7. Working on the Internet 8.Knowing Online Payment Systems 9.Incident Response
Who Should Attend
1.Office knowledge workers 2.Home users 3.Any non-IT person using computers in their office
Purpose
If you are someone who banks online, pays utility bills online, shops online, have children chatting online, downloads shareware and games, communicates over email, subscribes to a broadband connection or someome who uses a computer system at work /home, then you need to have Security 5 training to help you guard your information assets.
Students will be prepared for EC-Council’s Security 5 exam 112-12.
Objectives
During this course you will learn to Identity theft, credit card fraud, online banking Phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information and hackers are some of the threats you will face on a daily basis. Are you prepared to face them and defend yourself?
Prerequisites
Basic computing skills like browsing the web and checking e-mails.
Methodology
1. Training 2.Discusions 3. Labs 4.Exercises
Equipment
1.EC-Council official Training material in English language 2. Personal Computers 3.Video Projector 4. Printer 4. Whiteboard and flip charts
TimeTable
Day 1
Foundations of Security Essential terminology Defining security Need for security Cyber crime Information Security statistics IS triangle Security myths How to harden security
Basic Security Procedures Why do I need to worry about my computer’s security? Introduction Hardening of Operating System Updating the system and configuring the updates Disable unnecessary services Strong password creation Deployment of antivirus and firewall Disable guest account access “Make Private” folders Security settings in MS Office applications
Desktop Security What is file sharing? Types of file sharing How to share folder? Configuring shared folder permissions Hiding files and folders File sharing tips File downloading tips How to backup data and restore? How to encrypt and decrypt files? How to kill suspect processes?
Administering Windows Securely How to use the event viewer? How to enable auditing in windows? How to read logs on your system? How to close ports? Overview of the windows registry How to restore the registry? How to close a port? Common internal commands How to find services and ports they listen on?
Recognizing Security Threats and attacks Phishing and its countermeasures Virus Trojan Horse Worms Spyware Adware Keylogger Social engineering Denial of Service Spamming Port Scanning Password cracking Basic security measures
Day 2
Secure Internet Access Basic browser security settings How to restrict site access Removing site from security zone Secure website detection Secure site and browser properties Tools: Internet Filtering Software Configuring Internet content access Activating Content Advisor How to deal with cookies Using P2P networks securely Choosing appropriate browser settings Wireless network security features
Working on the Internet Precepts of Security Knowing Encryption Digital Certificate Digital Signature Working with e-mail (web based) Working with e-mail (mail client) Working with File Transfer- FTP Working with File Transfer – Web Folders
Knowing Online Payment Systems Working with Credit Cards Working with Instant Messengers Working across File Sharing Networks Working on Dial-in Networks Working with Portable Devices Working with Wireless Devices Working with USB devices Working with Media Files Working with 3rd party software
Incident Response What is Incident Response? Incidents and responses: Trojan attack Boot sector virus attack Corrupted registry Automatic running of CD-ROM (autorun.inf)
|