Home :: Software :: Business & Office :: Training & Tutorials  

Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials

Word Processing
e-Business Part 4: Securing Your Infrastructure

e-Business Part 4: Securing Your Infrastructure

List Price:
Your Price:
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: e-Business Part 4: Securing Your Infrastructure
Review: Course Overview
The fourth course in the e-Business curriculum examines the security risks and requirements of an e-Business environment e.g. viruses and hoaxes etc. It covers the inherent lack of Internet security and goes on to cover creating security strategies and policies. It also covers security schemas and tools. It also explains the role of cryptology and cryptographic tools. It introduces client and server side security.

Learn To

Identify the requirements for information security.
Identify the main Internet challenges to e-Business.
Identify human factors that affect e-Business security.
Identify the features of authorization in e-Business.
Identify e-Business authentication methods.
Identify password policies.
Identify the functions of data encryption in e-Business.
Identify basic encryption techniques.
Identify modern encryption techniques.

Audience
The target audience is those individuals tasked with planning/implementing e-Business strategies within an organization (primarily technical and business managers, as opposed to programmers, network engineers, etc.). Course Prerequisites: Understanding of business principles and knowledge of how to use a browser.

Deployment Options
e-Learning

Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs

Language Options
US English

Total Learning Time
6 to 8 hours

Objectives
Unit 1: Internet Security 2 - 3 hours

Identify the requirements for information security.
Identify the main Internet challenges to e-Business.
Identify human factors that affect e-Business security.
Identify features of an e-Business information and security policy.
Identify the approaches to e-Business security risk assessment.
Identify e-Business security solutions.
Identify the main types of virus.
Identify types of virus hoaxes and chain letters.
Identify issues to consider when using anti-virus software.
Identify the dangers posed by hackers and crackers.
Identify the weapons used in information warfare.
Identify the threats posed by cyberterrorism to e-Business.
Match e-Business security technologies with their descriptions.

Unit 2: Validating the User 2 - 3 hours

Identify the features of authorization in e-Business.
Identify e-Business authentication methods.
Identify password policies.
Identify authentication token types.
Identify the characteristics of single sign-on (SSO) techniques.
Match biometrics devices with their characteristics.
Identify the functions of digital certificates in e-Business.
Sequence the steps in obtaining a personal certificate.
Identify the characteristics of smart cards.
Identify server protection issues.
Identify e-Business internal attack issues.
Sequence the steps involved in obtaining a server certificate.
Identify the types of security tools.
Identify the features of a typical trusted operating system (TOS).
Identify the features of an e-Business firewall.
Identify the levels of firewall implementation.
Identify the features and functions of packet-filter firewalls.
Identify the features of proxy firewalls.
Identify the role of personal firewalls in e-Commerce.
Identify the features of dynamic firewalls.

Unit 3: Information Encryption 2 hours

Identify the functions of data encryption in e-Business.
Identify basic encryption techniques.
Identify modern encryption techniques.
Identify the characteristics of public and secret key encryption.
Identify the ways in which global legislation affects encryption techniques.
Identify the features of Data Encryption Standard (DES).
Identify how the Pretty Good Privacy (PGP) encryption method works.
Identify the features of the RSA encryption method.
Identify the public key cryptography standards (PKCS).
Identify applications that use encryption.
Identify the features of the Kerberos security model.
Identify the components of Public Key Infrastructure (PKI).
Identify the features of the Secure Sockets Layer (SSL) protocol.
Identify the features of the Internet Protocol Security (IPSec) protocol.
Identify the technologies that enable secure electronic mail (e-mail).
Identify the role of a Virtual Private Network (VPN) in e-Commerce.



<< 1 >>

© 2004, ReviewFocus or its affiliates