Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
CIW Security Professional Part 4: Security Auditing and Attack Techniques CBT Training CD |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: CIW Security Professional Part 4: Security Auditing and... Review: Course Overview
This is the fourth course in a five part series that teaches students about the role of the security auditor, discovery methods that can be used to find weaknesses, auditing server penetration and attack techniques, and the steps of the control phase.
Learn To
Identify auditing the security of a network.
Identify the risk assessment process.
Identify basic security-scanning techniques and enterprise-grade auditing applications.
Identify the categories of security information that help a security auditor determine the security requirements of a network.
Identify the network targets and related threats.
Identify server penetration.
Identify the control phase of auditing.
Identify various hacking tools.
Audience
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Students must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. In addition, students should have taken the first three parts in this series (87011-87013). This course is an approved study guide that will help Certified Internet Webmaster (CIW) candidates prepare for exam 1D0-470.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.80 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Security Auditing 1 - 2 hours
Identify the benefits obtained by auditing security in a specific situation.
Identify the actions that conform to the role that a security auditor performs in a given situation.
Identify the situation that depicts the complete risk assessment process.
Identify the risk assessment activities performed by a security auditor in a specific situation.
Unit 2: Network Vulnerability: Discovery 1 - 2 hours
Identify the network discovery tool that provides network information in a specific situation.
Identify the network discovery service that provides network information in a specific situation.
Scan network elements by using WS_Ping ProPack.
Configure NetXRay to capture packets by using the Filter Settings dialog box.
Capture unique protocol packets by using NetXRay.
Match enterprise-grade applications with the situations in which they are used.
Identify the feature of Axent NetRecon that is used to achieve a specified result.
Scan a host by using Axent NetRecon.
Identify the part of an Axent NetRecon report that provides the specified information.
Scan a host by using ISS Internet Scanner.
Match the type of ISS Internet Scanner report with the situation in which it is used.
Match the scenarios that provide network security information with the decisions that a security auditor can make.
Match the scenarios that provide host security information with the decisions that a security auditor can make.
Unit 3: Network: Penetration 2 hours
Match the common penetration attacks with actions to prevent these attacks.
Identify the hacker attacks that can result from loopholes in specific network components.
Match the types of penetration audits with the situations in which they are used.
Identify the penetration strategy being used in a specific situation.
Identify the penetration attack that is involved in a specific situation.
Unit 4: Network: Control 2 hours
Match a situation with the threat of hacking involved in that situation.
Discover the passwords stored on a Windows NT computer by using L0pht.
Discover the passwords stored on a Linux computer by using John the Ripper.
Identify the activities that follow the guidelines to prevent a hacker from controlling a network.
Identify characteristics that depict a NetBus attack in a specific situation.
Identify characteristics that depict a BackOrifice attack in a specific situation.
<< 1 >>
|
|
|
|