STUDY-IT-ONLINE
VIEWS
Security5 Certification Training Course: EC Council Security5
Recent Company News
- Study IT Online Shines in Online Computer Science
- The Benefits of IT Online Learning
- Become a Microsoft Office Specialist with Study IT Online
- Study IT in South Africa
- How To Get an IT Degree Online
- Becoming a Microsoft Word Specialist
- Study IT Online – The Ultimate Online MS Office Specialist Courses Around
- Choosing the Right Microsoft IT Academy
- Microsoft Training Best Obtained Online
- Study IT in South Africa
- Microsoft Office Specialist Excel 2010 Course
EC-Council's Security5 certification training course from StudyITonline is the entry-level certification for professionals interested in learning computer security basics and networking. Security5 stands for the five components of IT Security: Firewalls, Anti-Virus, IDS, Networking and Web Security. With this course, students will learn the basic networking and security skills and to begin high-end IT programs.
StudyITonline's Security5 training course teaches today's knowledge workers the ‘Alphabet Soup of Security’ so that students can distinguish between the legitimate and malevolent and guard their information assets. Identity theft, credit card fraud, online banking Phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information and hackers are some of the threats you will face on a daily basis. StudyITonline's Security5 training will prepare you to face them and defend yourself.
StudyITonline is an EC-Council Authorized Training Provider for online training, ensuring our course follows the approved curriculum and you receive the training and knowledge needed to succeed. StudyITonline is so certain this class meets and exceeds the exam objectives, we guarantee you will pass your exam!
EC-Council Security5
Module 01: Foundations of Security
Essential terminologyDefining security
Need for security
Cyber crime
Information Security statistics
IS triangle
Security myths
How to Harden Security
Module 02: Basic Security Procedures
Why do I need to worry about my computer’s security?Hardening of Operating System
Updating the system and configuring the updates
Disable unnecessary services
Strong password creation
Deployment of anti virus and firewall
Disable guest account access
“Make Private” folders
Security settings in MS Office applications
Desktop Security
Module 03: File Sharing
Types of file sharingHow to share folders
Configuring shared folder permissions
Hiding files and folders
File sharing tips
File downloading tips
How to backup data and restore
How to encrypt and decrypt files
How to kill suspect processes
Module 04: Administering Windows Securely
How to use the event viewerHow to enable auditing in windows
How to read logs on your system
How to close ports
How to restore the registry
How to close a port
Common internal commands
How to find services and ports they listen on
Module 05: Recognizing Security Threats and Attacks
Phishing and its countermeasuresVirus
Worms
Spyware
Adware
Keylogger
Social engineering
Denial of Service
Spamming
Port Scanning
Password cracking
Basic security measures
Module 06: Secure Internet Access
Basic browser security settingsHow to restrict site access
Removing site from security zone
Secure website detection
Secure site and browser properties
Tools: Internet Filtering Software
Configuring Internet content access
Activating Content Advisor
How to deal with cookies
Using P2P networks securely
Choosing appropriate browser settings
Wireless network security features
Module 07: Working on the Internet
Precepts of SecurityKnowing Encryption
Digital Certificate
Digital Signature
Working with e-mail (web based)
Working with e-mail (mail client)
Working with File Transfer- FTP
Working with File Transfer – Web Folders
Module 08: Online Payment Systems
Working with Credit CardsWorking with Instant Messengers
Working across File Sharing Networks
Working on Dial-in Networks
Working with Portable Devices
Working with Wireless Devices
Working with USB devices
Working with Media Files
Working with 3rd party software
Module 09: Incident Response
What is Incident Response?Incidents and responses:
Trojan attack
Boot sector virus attack
Corrupted registry
Automatic running of CD-ROM (autorun.inf)
Date Posted: 2009-05-12
Posted By: STUDY-IT-ONLINE
Listed under these Business Listing Categories: Training and Education, IT Services & Products,
More Company News
- Microsoft Office Specialist Excel 2010 Course
- CERTIFICATION: Marking the exemplary from the ordinary!
- Is Classroom Training More Credible Than Online Training?
- Study at Home - Attend Online Schools
- How to Study Online
- Distance Learning : Advantages and Limitations in Higher Education
- A new qualification needn't cost the Earth
- Developing Good Distance Learning Study Habits
- Is Classroom Study Better Than Online Study
- The Benefits of Studying Online
- StudyITonline - Our Instructors
- Associate, Undergraduate & Graduate level Online Accounting Study Programs
- Associate, Undergraduate & Graduate level Online Accounting Study Programs
- Online Study and Popular Online Courses
- Careers in IT
- Online Education Offers Your Career Choice
- IT Qualifications Cover Many Specialities
- Get a Qualification with Online Education
- Optimise Your Study Skills in 7 Steps
- Get an Online Education
- Online Education - Easy Accessibility to Quality Education
- 10 Reasons to Study IT Online
- IT Industry
- Jobs in IT
- Online Education at An Ever-Increasing Rate
- The Internet and Online Education
- Online Study and Popular Online Courses
- Online Business Schools Makes Study Convenient
- Find Online Schools-Study at Your Own Pace!
- 4 Online Study Tips For Online Students
- The Pros and Cons of Online College Programs
- Online Study Tips - Questions to Ask Before Signing Up
- Online Study Tips - 6 Helpful Tasks for the First Week
- Online Schools May Be Your Best Career Choice
- 4 Good Reasons to Study Online in Year 2009
- Online Study Courses Have Many Benefits
- Online study - A 24/7 convenience
- 5 Tips to success for online study
- Study Online
- Studying Online - More Convenient
- Learn Crystal Reports XI Software Online
- Information Technology Infrastructure Library (ITIL) Version 3
- Study online-Oracle Database 10g Administrator Certified Associate (OCA)
- ISACA Certified Information Systems Auditor (CISA)
- Certified Wireless Network Administrator (CWNA)
- Study Online - Advance Your Career Prospects
- CCNP - Cisco Certified Network Professional Training Course
- Department of Defense Certification Training Course Packages
- CISSP - Certified Information Systems Security Professional - (ISC)
- EC-Council Computer hacking forensics investigator
- EC-Council Certified Security Analyst/ Licensed Penetration Tester
- Security5 Certification Training Course: EC Council Security5
- MCSD Certification Training Course: Microsoft Certified Solution Developer
- MCPD Certification Training Course: Microsoft Certified Professional Developer
- Microsoft - Individual MCP Training Courses - Microsoft Certified Professional
- Microsoft Office Specialist: Windows 2000, Windows XP and Windows 2003
- MCAS Certification Training Course: Microsoft Certified Application Specialist - Office 2007
- Windows Vista for IT Professionals Certification Training Course
- CompTIA A+ Essentials
- CompTIA Network+ 2007
- CompTIA Security+ Certification Training Course
- CompTIA's Project+
- CompTIA's Server+ Certification
- CompTIA Linux+ Certification
- CompTIA PDI+: Printing and Document Imaging Certification
- MCSE 2003 | Microsoft Certified Systems Engineer Certification Training Course
- MCSE | Microsoft Certified Systems Engineer Messaging Certification Training Course
- MCSE | Microsoft Certified systems Engineer Security Certification Training Course:
- MCSA 2003 Certification Training Course | Microsoft Certified Systems Administrator
- MCSA: Messaging Certification Training Course: microsoft certified systems administrator
- MCSA 2003 Security Certification Training Course: Microsoft Certified systems administrator
- MCAD Certification Training Course: Microsoft Certified Application Developer
- MCITP Certification Training Course: Microsoft Certified IT Professional
- MCTS Certification Training Course: Microsoft Certified Technology Specialist
- MCDST Certification Training Course: Microsoft Certified Desktop Support Technician
- MCDBA Certification Training Course: Microsoft Certified Database Administrator
Accommodation
Foreign Exchange
Directory
Fax 2 Email
Finance
Furniture
Online Casino
Restaurant
Shop Online
Study IT Online
Web Design
Weddings
Work from Home
|
||
Company News
|
||