Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
e-Business Part 4: Securing Your Infrastructure |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: e-Business Part 4: Securing Your Infrastructure Review: Course Overview
The fourth course in the e-Business curriculum examines the security risks and requirements of an e-Business environment e.g. viruses and hoaxes etc. It covers the inherent lack of Internet security and goes on to cover creating security strategies and policies. It also covers security schemas and tools. It also explains the role of cryptology and cryptographic tools. It introduces client and server side security.
Learn To
Identify the requirements for information security.
Identify the main Internet challenges to e-Business.
Identify human factors that affect e-Business security.
Identify the features of authorization in e-Business.
Identify e-Business authentication methods.
Identify password policies.
Identify the functions of data encryption in e-Business.
Identify basic encryption techniques.
Identify modern encryption techniques.
Audience
The target audience is those individuals tasked with planning/implementing e-Business strategies within an organization (primarily technical and business managers, as opposed to programmers, network engineers, etc.). Course Prerequisites: Understanding of business principles and knowledge of how to use a browser.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Internet Security 2 - 3 hours
Identify the requirements for information security.
Identify the main Internet challenges to e-Business.
Identify human factors that affect e-Business security.
Identify features of an e-Business information and security policy.
Identify the approaches to e-Business security risk assessment.
Identify e-Business security solutions.
Identify the main types of virus.
Identify types of virus hoaxes and chain letters.
Identify issues to consider when using anti-virus software.
Identify the dangers posed by hackers and crackers.
Identify the weapons used in information warfare.
Identify the threats posed by cyberterrorism to e-Business.
Match e-Business security technologies with their descriptions.
Unit 2: Validating the User 2 - 3 hours
Identify the features of authorization in e-Business.
Identify e-Business authentication methods.
Identify password policies.
Identify authentication token types.
Identify the characteristics of single sign-on (SSO) techniques.
Match biometrics devices with their characteristics.
Identify the functions of digital certificates in e-Business.
Sequence the steps in obtaining a personal certificate.
Identify the characteristics of smart cards.
Identify server protection issues.
Identify e-Business internal attack issues.
Sequence the steps involved in obtaining a server certificate.
Identify the types of security tools.
Identify the features of a typical trusted operating system (TOS).
Identify the features of an e-Business firewall.
Identify the levels of firewall implementation.
Identify the features and functions of packet-filter firewalls.
Identify the features of proxy firewalls.
Identify the role of personal firewalls in e-Commerce.
Identify the features of dynamic firewalls.
Unit 3: Information Encryption 2 hours
Identify the functions of data encryption in e-Business.
Identify basic encryption techniques.
Identify modern encryption techniques.
Identify the characteristics of public and secret key encryption.
Identify the ways in which global legislation affects encryption techniques.
Identify the features of Data Encryption Standard (DES).
Identify how the Pretty Good Privacy (PGP) encryption method works.
Identify the features of the RSA encryption method.
Identify the public key cryptography standards (PKCS).
Identify applications that use encryption.
Identify the features of the Kerberos security model.
Identify the components of Public Key Infrastructure (PKI).
Identify the features of the Secure Sockets Layer (SSL) protocol.
Identify the features of the Internet Protocol Security (IPSec) protocol.
Identify the technologies that enable secure electronic mail (e-mail).
Identify the role of a Virtual Private Network (VPN) in e-Commerce.
<< 1 >>
|
|
|
|