Training - Home
Course List
Specials
Site Map
Free Training Tutorials
Computer Training Courses Catalog
(PDF Format)
|
Certified Internet Webmaster Security 1D0-470 Online Training
Estimated time to Complete: 39 hours
Subscription Length: 12
months
|
Only $59.95
|
You will receive Unlimited Access to all of the
CIW Security 1D0-470 tutorials listed below. Your online training courses will be available
from anywhere you have internet access.
Summary:
This series is designed to prepare the student to pass the Certified Internet Webmaster (CIW) Security 1D0-470 exam. It helps the student achieve proficiency in identifying security threats, developing countermeasures, and using firewall systems and attack recognition technologies. It covers the fundamental concepts and principles of network security, and it describes the most common types of attacks that can occur. It covers basic networking models, such as TCP/IP and the OSI reference model, and it explains the security vulnerabilities of protocols used at each layer in the model. It also covers the basic tools and procedures used to protect a network, including firewalls, encryption, auditing, and log analysis.
This e-learning computer training series includes all of the online training tutorials listed below and is provided in an interactive e-learning format. All courses allow for 1 year unlimited access (1 user), include a variety of features and qualify for Continuing Education Unit credit .
StaffKit is an e-learning leader in providing Access 2000 tutorials
and training. We have satisifed customers in over 30 countries.
Certification:
CIW - Certified Internet Webmaster Security 1D0-470
Includes:
CIW Security Fundamentals
- List the basic elements of a security matrix
- Explain the types of security threats that are now common
- Describe the most common elements of a security system, including encryption, authentication, access control lists, execution control lists, and auditing
Security Auditing and Log Analysis
- Audit network activity in Windows NT/2000 and Linux
- Use log analysis to identify suspicious network activity
- Create a security audit report
- Recommend steps for improving security compliance
- Enable proactive detection of security problems
- Configure a personal firewall
- Use SSH for data security and authentication
Security Attack Types and Encryption
- Explain the e-mail encryption process and its components
- Explain the differences between SSL and S-HTTP
- Use common applications to encrypt messages and files
- List and describe the categories of security attack: brute force/dictionary, buffer overflow, Trojan, DOS/DDOS, and man in the middle
- List methods of preventing each type of attack
Security Protocol Layers and Security
- Describe the TCP/IP protocol stack
- Diagram the OSI reference model and explain how it functions
- List protocols used at the Network, Transport, and Application layers of each model
- Identify the major security vulnerabilities of network protocols
- List basic steps you can take to protect network services
- Identify the security vulnerabilities of e-mail servers
- Explain the processes used for security testing
Security Firewalls
- Explain the role and purpose of a firewall
- Distinguish between packet-filters, application-layer proxies, and circuit-level proxies
- Describe the role and possible configurations of a bastion host
- Outline how PKI works
- Write rules for a basic packet filter
- Describe the four basic firewall designs and discuss their advantages and disadvantages
- Use WinRoute to configure NAT or a proxy on a Windows machine
- Use Ipchains and Iptables to configure packet-filtering on Linux
Security Operating System Security
- Describe the most widely-used industry security standards
- List the key vulnerabilities of Windows 2000 and Linux operating systems
- Describe the built-in security features of Windows 2000
- Use Pluggable Authentication Modules to improve authentication on Linux systems
- Configure password settings for improved security
- Set permissions on files, folders and shares
Security Assessing and Reducing Risk
- Identify general and specific operating system attacks
- Describe the function of a keylogger program
- Scan a system to view its services and assess security risks
- Explain Linux security concerns including rlogin, NIS, and NFS
- Explain the purpose and importance of system patches and fixes
- Modify the Windows 2000 Registry to increase security
- Lock down and remove services for effective security in Windows 2000 and Linux
Security Security Auditing
- Describe the activities of auditors in their various roles, including that of security manager, consultant, and insider
- List and describe the three basic stages of a security audit
- Identify and utilize auditing software, including DNS utilities, ping and port scanners, and enterprise-grade vulnerability scanners
- Classify information revealed during audits
Security Auditing and the Control Phase
- Identify common targets of attack
- Discuss penetration strategies and methods
- List potential physical, OS, and TCP/IP stack attacks
- Identify and analyze specific brute-force and DoS attacks
- Implement methods designed to thwart penetration
- Define control procedures
- Identify control methods
- List ways to document control procedures and methods
Security Attack Detection and Response
- Deter and distract hackers using proactive detection techniques
- Describe the different types of IDS architectures
- Audit and create rules using eTrust
- Audit your network using Snort
- Create and implement a response policy
All courses allow for 1 year unlimited access (1 user),
include a variety of features and qualify for CEU credit from Ohio
University.
Questions about CIW Security 1D0-470? We now offer 24x7 online support with access to real live experts!
Get answers from real experts within minutes via our online chat service.
For just $40.00 additional you add our Instant
Mentoring service and get your CIW Security 1D0-470 questions
quickly answered anytime from anywhere.
CIW Security 1D0-470...
... $59.95
CIW Security 1D0-470 + 1 Year Instant Mentoring...
... $99.95
You might also be interested in our Web Development Package which includes all of the CIW Security 1D0-470 training courses listed above plus over 749 hours of additional courses.
|
Reviews:
"this is a must have resource"
TheTechMag.com
"this is the Ultimate Career Development Package."
MidWest Technology Journal
Great Service and Excellent Training Product - Great People
Kenosha, WI
Excellent program, this is a real winner. Thanks. A+
Arlington, TX
Read more customer reviews
about our e-learning training tutorials.
|