Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
CIW Security Professional Part 3: Operating System Security CBT Training CD |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: CIW Security Professional Part 3: Operating System Security Review: *Course Overview
This is the third course in a five part series which covers the content in the CIW Security Professional Series. This course teaches security principles for Unix and Windows NT systems, implementing account security, implementing file system security, assessing security risks, and reducing risks.
Learn To
Identify security services and evaluation criteria.
Identify security concepts and security architecture.
Identify the steps to implement account security and file system security in Windows NT and UNIX.
Identify the methods to identify security risks in Windows NT and UNIX.
Identify the steps to remove and disable unnecessary services from Windows NT and UNIX.
Identify the various ways to implement security in Windows NT and UNIX.
Audience
The target audiences for this course are, System Administrators, Application Developers, Firewall Administrators, and IT Security Officers. Students must have CIW Foundations certification or equivalent experience, as well pass the CIW Server Administrator and CIW Internetworking Professional exams or have equivalent skills. Students should have taken the first two parts of this series (87011 and 87012). This course prepares students for exam number 1D0-470.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.80 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Security Principles 2 hours
Identify the security services that should be used in a specified situation.
Match EALs of CC with the scenarios in which they are applicable.
Identify the resource that requires a particular level of security in a specified situation.
Identify the security mechanism that should be implemented to meet the requirements in the specified scenario.
Identify the security components that are used in the specified scenario.
Complete the diagram to depict the user authentication process that involves Windows NT security subsystem components.
Unit 2: Account and File System Security 2 hours
Identify the passwords that should be used in a specified scenario.
Identify the command to implement password aging in a specific situation.
Identify the command to monitor logon attempts in a specified scenario.
Apply a strong password by modifying the registry.
Identify the commands to verify account details.
Rename a specified account by using the User Manager for Domains utility.
Apply an account policy by using the User Manager for Domains utility.
Assign share permissions in a specified situation.
Assign NTFS permissions on files and folders by using the Security tab.
Match the ls commands with the situations in which they are used.
Identify the umask command to be used in the specified situation.
Identify the chmod command to be used in the specified situation.
Unit 3: Assessing Security Risks 1 - 2 hours
Match the types of security attacks with the situations in which they have occurred.
Install a KeyLogger program by using the iksnt10d.exe file.
Disable Windows NT default shares by using the Regedit command.
Scan a Windows NT system by using the WS_Ping ProPack program.
Identify the situations in which NFS should be used.
Match NIS security problems with the appropriate solutions.
Identify the command to log on to a remote computer.
Unit 4: Reducing Security Risks 1 - 2 hours
Remove a subsystem from a Windows NT system by using the C2 Configuration command.
Identify the steps to control SMB connectivity on a Windows NT server.
Disable the Server service by using the Services icon.
Identify the option that disables the Telnet service.
Apply system patches by installing Service Pack 6a.
Identify registry access permissions to be set in a specified situation.
Secure the Windows NT registry by using the C2 Configuration command.
Implement an audit policy by using the User Manager for Domains command.
Identify the tasks to enable the TCPWrapper suite on a UNIX platform.
Identify the md5sum command that will be used in a specified situation.
<< 1 >>
|
|
|
|