Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
CIW Security Professional Curriculum CBT Training CDs |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: CIW Security Professional Curriculum CBT Training CDs Review: Course Overview
This curriculum teaches the concepts and principles of security, the elements of a secure system, how to apply encryption principles, the different types of common security attacks, and how to create an effective security infrastructure.
# This curriculum consists of five courses: Course 87011 CIW Security Professional Part 1: Network Security Introduction
# Course 87012 CIW Security Professional Part 2: Network Security and Firewalls
# Course 87013 CIW Security Professional Part 3: Operating System Security
# Course 87014 CIW Security Professional Part 4: Security Auditing and Attack Techniques
# Course 87015 CIW Security Professional Part 5: Intrusion Detection and Threat Analysis
Learn To
See individual course descriptions for specific course objectives and scope.
Audience
The target audiences for this curriculum are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Learners must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. This curriculum is an approved study guide that will help Certified Internet Webmaster (CIW) candidates prepare for exam 1D0-470. In addition, this curriculum can be taken by individuals who wish to enhance their job skills.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits Per Course
CEU credits: 4.00 CEUs
Language Options
US English
Total Learning Time
30 to 40 hours
CIW Security Professional Part 1: Network Securuity Introduction Training CD
Course Overview
This is the first course in a five part series on security. This course teaches the concepts of security, the elements of a secure system, how to apply encryption principles, the different types of common security attacks, and how to create an effective security infrastructure.
Learn To
# Identify the situations in which security attacks are likely to occur, potential threats, and various security standards.
# Identify the elements involved in ensuring a high level of security.
# Identify the applicability of various encryption methods.
# Identify the steps involved in the encryption process.
# Identify how to install and use PGP on Windows NT.
# Identify the process of web server encryption.
# Identify the applicability of tunneling protocols in different situations and how to enable IPSec.
# Identify the various security attacks.
# Identify the security principles that need to be followed to create effective security solutions.
Audience
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Students must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. This course is an approved study guide that will help Certified Internet Webmaster (CIW) candidates prepare for exam 1D0-470. In addition, this course can be taken by individuals who wish to enhance their job skills.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.80 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Security Overview 2 hours
# Identify a situation in which a security attack is likely to occur.
# Identify the most effective implementation of security system attributes in a specified situation.
# Match the resources in an organization with the security threats that are faced by them in a specified situation.
# Match the situations representing hacker attacks with the measures that should be taken to prevent them.
# Match encryption services with the situations in which they are implemented.
# Identify the most effective security policy that should be implemented in a specified scenario.
# Match authentication methods with the situations in which they are implemented.
# Identify the rationale for implementing an access control method in a specified situation.
# Identify the methods for implementing security elements in a specified scenario.
Unit 2: Encryption 2 hours
# Match the encryption methods with the situations in which they should be applied.
# Sequence the steps involved in an encryption process.
# Identify the decisions to be made for applying encryption to e-mail messages and text files in a specified situation.
# Install PGP in Windows NT by using the PGP files.
# Generate a key pair by using PGP for Windows NT.
# Export the public keys by using PGP for Windows NT.
# Import the public keys by using PGP for Windows NT.
# Encrypt an e-mail message by using PGP for Windows NT.
# Encrypt a text file by using PGP for Windows NT.
Unit 3: Internet Security 1 - 2 hours
# Sequence the steps involved in the SHTTP process.
# Match the type of certificates with the situations in which they are used.
# Match the tunneling protocols with the situations in which they are applicable.
# Identify the correct combination of decisions to be taken while configuring IPSec for the specified requirements.
# Enable IPSec by using PGP.
Unit 4: Security Issues 1 - 2 hours
# Identify the incidents that represent basic security attacks.
# Identify the incidents that represent advanced security attacks.
# Identify the situations in which physical level security principles are being followed.
# Identify the situations in which strategic level security principles are being followed.
CIW Security Professional part 2: Network Security and Firewalls Training CD
Course Overview
This is the second course in a five part series that teaches protocol layers and security, the resources needed to secure servers, using firewalls, the levels of firewall protection, how to detect and distract hackers, and how to respond to hacker activity.
Learn To
# Identify the components of a TCP/IP packet and security risks related to TCP/IP at various layers of the OSI model.
# Identify the implementation of TCP/IP security on a Windows NT system.
# Identify securing the Web server, FTP server, and SMTP server and testing the network security for a specific network.
# Identify firewalls and proxy servers.
# Identify setting up RAS for VPN and establishing a VPN session.
# Identify firewall design.
# Identify how to configure WinRoute.
# Identify proactive detection, the prevention of breach of network security, and the creation of response plans to handle breach of network security.
Audience
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Students must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. In addition, students should have taken part one of this series (87011). This course is an approved study guide that will help Certified Internet Webmaster (CIW) candidates prepare for exam 1D0-470.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: TCP/IP and Security 2 hours
# Match the methods to breach security in the lower-level OSI layers with the specific situations.
# Match the methods to breach network security in the application layer of the OSI model with the corresponding situations.
# Configure Windows NT Server to lock a specific port by using the TCP/IP Security dialog box.
# Conduct a traceback to a Windows NT server from a Linux computer by using plisten.
# Identify the correct set of commands to establish a connection to a port of a Windows NT server from another computer by using Netcat.
Unit 2: Securing Network Resources 1 - 2 hours
# Identify the strategies that comply with the guidelines of a security implementation model in a specific situation.
# Identify the guidelines that should be followed to secure services in a specific situation.
# Identify the guidelines followed to secure a Web server in a specific situation.
# Identify the strategies used to prevent security holes in CGI scripts in a specific situation.
# Secure a Web server by using MMC.
# Identify the situation that conforms to the guidelines for securing an FTP server.
# Secure an FTP server by using MMC.
# Identify a scenario where the guidelines for securing an SMTP server are followed.
# Match the security options that you configure to secure an SMTP server with their functions.
# Identify the strategies that conform to the guidelines for ensuring network security in a specific situation.
# Identify the uses of a specific tool that is used to test network security.
Unit 3: Firewalls 1 - 2 hours
# Identify the role of a firewall in a specific situation on a network.
# Match the types of firewalls with the situations in which they are implemented.
# Identify the packet-filtering rule used to implement a security policy.
# Match the types of proxy servers with the scenarios in which they are used.
# Install Proxy Server on a network by using Microsoft Proxy Server 2.0 CD.
# Enable access control for Web proxy service on a proxy server by using MMC.
# Set up RAS to use a VPN connection on a Windows NT server.
# Establish a VPN session by using RAS.
Unit 4: Firewalls: Designing and Configuring 1 hour
# Identify the guidelines for designing a firewall for a specific network.
# Identify the appropriate firewall design based on the security requirements of a specific network.
# Configure WinRoute to segregate internal and external networks.
# Create packet filters to prevent the transfer of packets of specific types from one network to another.
Unit 5: Detecting and Distracting Hackers 1 hour
# Match the proactive detection techniques with the corresponding situations to ensure security on a network.
# Create a dummy account to distract a hacker by using User Manager for Domains.
# Identify the correct block of commands to install the Tripwire program.
# Identify the appropriate strategy to respond to a hacker attack in a specific situation.
# Identify the response plan to be executed on the basis of the scope of security breach in the event of a hacker attack.
CIW Security Professional Part 3: Operating System Security Training CD
Course Overview
This is the third course in a five part series which covers the content in the CIW Security Professional Series. This course teaches security principles for Unix and Windows NT systems, implementing account security, implementing file system security, assessing security risks, and reducing risks.
Learn To
# Identify security services and evaluation criteria.
# Identify security concepts and security architecture.
# Identify the steps to implement account security and file system security in Windows NT and UNIX.
# Identify the methods to identify security risks in Windows NT and UNIX.
# Identify the steps to remove and disable unnecessary services from Windows NT and UNIX.
# Identify the various ways to implement security in Windows NT and UNIX.
Audience
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Students must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. Students should have taken the first two parts of this series (87011 and 87012). This course prepares students for exam number 1D0-470.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.80 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Security Principles 2 hours
# Identify the security services that should be used in a specified situation.
# Match EALs of CC with the scenarios in which they are applicable.
# Identify the resource that requires a particular level of security in a specified situation.
# Identify the security mechanism that should be implemented to meet the requirements in the specified scenario.
# Identify the security components that are used in the specified scenario.
# Complete the diagram to depict the user authentication process that involves Windows NT security subsystem components.
Unit 2: Account and File System Security 2 hours
# Identify the passwords that should be used in a specified scenario.
# Identify the command to implement password aging in a specific situation.
# Identify the command to monitor logon attempts in a specified scenario.
# Apply a strong password by modifying the registry.
# Identify the commands to verify account details.
# Rename a specified account by using the User Manager for Domains utility.
# Apply an account policy by using the User Manager for Domains utility.
# Assign share permissions in a specified situation.
# Assign NTFS permissions on files and folders by using the Security tab.
# Match the ls commands with the situations in which they are used.
# Identify the umask command to be used in the specified situation.
# Identify the chmod command to be used in the specified situation.
Unit 3: Assessing Security Risks 1 - 2 hours
# Match the types of security attacks with the situations in which they have occurred.
# Install a KeyLogger program by using the iksnt10d.exe file.
# Disable Windows NT default shares by using the Regedit command.
# Scan a Windows NT system by using the WS_Ping ProPack program.
# Identify the situations in which NFS should be used.
# Match NIS security problems with the appropriate solutions.
# Identify the command to log on to a remote computer.
Unit 4: Reducing Security Risks 1 - 2 hours
# Remove a subsystem from a Windows NT system by using the C2 Configuration command.
# Identify the steps to control SMB connectivity on a Windows NT server.
# Disable the Server service by using the Services icon.
# Identify the option that disables the Telnet service.
# Apply system patches by installing Service Pack 6a.
# Identify registry access permissions to be set in a specified situation.
# Secure the Windows NT registry by using the C2 Configuration command.
# Implement an audit policy by using the User Manager for Domains command.
# Identify the tasks to enable the TCPWrapper suite on a UNIX platform.
# Identify the md5sum command that will be used in a specified situation.
CIW Security Professional Part 4: Security Auditing and Attack Techniques Training CD
Course Overview
This is the fourth course in a five part series that teaches students about the role of the security auditor, discovery methods that can be used to find weaknesses, auditing server penetration and attack techniques, and the steps of the control phase.
Learn To
# Identify auditing the security of a network.
# Identify the risk assessment process.
# Identify basic security-scanning techniques and enterprise-grade auditing applications.
# Identify the categories of security information that help a security auditor determine the security requirements of a network.
# Identify the network targets and related threats.
# Identify server penetration.
# Identify the control phase of auditing.
# Identify various hacking tools.
Audience
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Students must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. In addition, students should have taken the first three parts in this series (87011-87013). This course is an approved study guide that will help Certified Internet Webmaster (CIW) candidates prepare for exam 1D0-470.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.80 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Security Auditing 1 - 2 hours
# Identify the benefits obtained by auditing security in a specific situation.
# Identify the actions that conform to the role that a security auditor performs in a given situation.
# Identify the situation that depicts the complete risk assessment process.
# Identify the risk assessment activities performed by a security auditor in a specific situation.
Unit 2: Network Vulnerability: Discovery 1 - 2 hours
# Identify the network discovery tool that provides network information in a specific situation.
# Identify the network discovery service that provides network information in a specific situation.
# Scan network elements by using WS_Ping ProPack.
# Configure NetXRay to capture packets by using the Filter Settings dialog box.
# Capture unique protocol packets by using NetXRay.
# Match enterprise-grade applications with the situations in which they are used.
# Identify the feature of Axent NetRecon that is used to achieve a specified result.
# Scan a host by using Axent NetRecon.
# Identify the part of an Axent NetRecon report that provides the specified information.
# Scan a host by using ISS Internet Scanner.
# Match the type of ISS Internet Scanner report with the situation in which it is used.
# Match the scenarios that provide network security information with the decisions that a security auditor can make.
# Match the scenarios that provide host security information with the decisions that a security auditor can make.
Unit 3: Network: Penetration 2 hours
# Match the common penetration attacks with actions to prevent these attacks.
# Identify the hacker attacks that can result from loopholes in specific network components.
# Match the types of penetration audits with the situations in which they are used.
# Identify the penetration strategy being used in a specific situation.
# Identify the penetration attack that is involved in a specific situation.
Unit 4: Network: Control 2 hours
# Match a situation with the threat of hacking involved in that situation.
# Discover the passwords stored on a Windows NT computer by using L0pht.
# Discover the passwords stored on a Linux computer by using John the Ripper.
# Identify the activities that follow the guidelines to prevent a hacker from controlling a network.
# Identify characteristics that depict a NetBus attack in a specific situation.
# Identify characteristics that depict a BackOrifice attack in a specific situation.
CIW Security Professional Part 5: Intrusion Detection and Threat Analysis Training CD
Course Overview
This is the final course in a five part series that teaches students how to automate intrusion detection, how to conduct a log analysis, and how to analyze the results of a security audit and implement solutions to problems identified by the audit.
Learn To
# Identify the advantages of an IDS and types of IDS architecture.
# Identify how to install and use network-based and host-based IDS.
# Identify interpreting Debug Logs and operating system logs and filtering Windows NT and LINUX logs.
# Identify auditing recommendations and audit report formats.
# Identify installing Con Seal personal firewall, and SSH for enhancing the security of a network.
Audience
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Students must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. In addition, students should have taken the first four parts in this series (87011-87014). This course is an approved study guide that will help Certified Internet Webmaster (CIW) candidates prepare for exam 1D0-470.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.80 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Intrusion Detection 3 hours
# Identify the advantage of using an IDS in a specified scenario.
# Identify the appropriate IDS architecture for a network in the specified situation.
# Conduct a security scan by using eTrust Intrusion Detection.
# Conduct a network activity trace by using the eTrust Intrusion Detection window.
# Create an intrusion detection rule by using the Intrusion Attempt Detection Rules dialog box.
# Install ITA on a Windows NT system by using the Intruder Alert wizard.
# Connect to an ITA manager by using ITA Admin.
# Activate the required policies for a domain by using the shortcut menu in the Intruder Alert 3.0 window.
# Scan specific activities by using ITA View.
# Register an agent with additional managers by using ITA Setup.
Unit 2: Log Analysis 2 - 3 hours
# Display Debug Log on a firewall by using WinRoute.
# Identify the information that a specific entry in the Debug Log represents.
# Match the specified situations with the Windows NT logs that can provide information about the situations.
# Enable directory auditing in Windows NT.
# Filter logs in Windows NT to display specific events.
# Identify the correct Linux command to filter a Linux log.
Unit 3: Auditing and Security 1 - 2 hours
# Match auditing categories with the recommendations that can be made in each category for enhancing security.
# Identify the most appropriate audit report format.
# Identify a host auditing solution for a specified problem.
# Identify a method for securing a router from forwarding a DOS attack in a specified situation.
# Detect whether or not the NIC of a computer is in promiscuous mode by using AntiSniff.
# Install the ConSeal PC FIREWALL service by using the Network dialog box.
# Sequence the steps to install SSH on a Linux computer.
# Identify the correct set of steps for establishing a user-to-user trust relationship in Linux.
<< 1 >>
|
|
|
|