Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
i-Net+ Part 4: Security and Business Concepts Training CD |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: i-Net+ Part 4: Security and Business Concepts Training CD Review: Course Overview
This is the final course in a four part series that presents students with an overview of Internet security and business concepts. this course covers possible areas of vulnerability and how to protect against viruses, restrict and control access, conduct auditing, and handle encryption. E-business and e-commerce concepts and models, managing transactions and instruction on language and marketing considerations and legal issues are also covered.
Learn To
Identify features of data security.
Match types of intrusion with their features.
Sequence the steps in a SYN flood operation.
Identify characteristics of e-business.
Identify advantages of selling on the Web.
Identify features of current e-business models.
Audience
The intended audience for this course includes people working in entry-level Internet and e-commerce careers, such as maintenance of Internet, intranet, and extranet infrastructure and services, or the development of Web related content and applications. The audience may also include people working in non-technical Internet areas, such as the marketing of Internet equipment or services, or using the Internet extensively in their day-to-day work. A+ and Network+ certification would be helpful, but not required prior to this curriculum. Learners are expected to be experienced end users, with only novice to moderate level of experience in the infrastructure and configuration of internetworks and Web. This course will help candidates prepare for CompTIA exam IK0-002. In addition, students should have taken the first three parts of this series 14186 through 14188.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Internet Security 3 - 4 hours
Identify features of data security.
Match types of intrusion with their features.
Sequence the steps in a SYN flood operation.
Match types of viruses with their effects on a system.
Identify considerations for using anti-virus software.
Identify how firewalls are used to protect private networks.
Identify guidelines for using demilitarized zone (DMZ) configurations.
Create a user account in Windows 2000.
Apply permissions to a user-based network share.
Identify features of client-security add-ons.
Identify access control features for an Internet servers.
Identify methods that can be used to authenticate a user.
Sequence the steps in acquiring a digital certificate.
Identify certificate elements defined in the X.509 standard.
Identify features of encryption.
Match encryption standards with their characteristics.
Identify factors that determine the strength of encryption.
Sequence the steps in the Secure Sockets Layer (SSL) handshake.
Identify characteristics of a public key infrastructure (PKI).
Identify guidelines for auditing your system.
Identify functions of intrusion detection systems (IDSs).
Identify considerations for implementing the auditing of activity on servers and firewalls.
Unit 2: Business Concepts 3 - 4 hours
Identify characteristics of e-business.
Identify advantages of selling on the Web.
Identify features of current e-business models.
Identify features of the business-to-consumer (B2C) e-business model.
Identify features of the business-to-business (B2B) e-business model.
Identify features of a portal.
Identify features of Electronic Funds Transfer (EFT).
Identify features of Electronic Data Interchange (EDI).
Identify features of Open Trading Protocol (OTP).
Identify features of Open Buying on the Internet (OBI).
Sequence the steps in a transaction by using the Secure Electronic Transaction (SET) protocol.
Identify the most appropriate network type for your business.
Identify geographic considerations for conducting business on the Web.
Identify language considerations for conducting business on the Web.
Identify guidelines for dealing with business challenges.
Identify ways to protect intellectual property.
Identify characteristics of a trademark.
Identify characteristics of a copyright.
Identify characteristics of a patent.
Identify issues relating to privacy and confidentiality on the Internet.
Identify issues relating to jurisdiction on the Internet.
<< 1 >>
|
|
|
|