Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  

Security 5 Boot Camp Tutorial
Security 5 Boot Camp Tutorial
Date: 02 April 2011, 06:29

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " Security 5 Boot Camp Tutorial " from UseNet for FREE!

Security 5 Boot Camp Tutorial | 633MB
English | ISO | MPEG4 (H264) 640?480 | AAC 22050Hz stereo
Genre: elearning

Prerequisites
Basic computing skills like browsing the web and checking e-mails.
Who Should Attend:
* Office knowledge workers
* Home users
* Any non-IT person using computers in their office
chedule:
Please visit EC-Council’s Accredited Training Centers to find all of our upcoming classes, dates and locations.
uration:
2 days (9:00 – 5:00)
ertification Exam
Students will be prepared for EC-Council’s Security 5 exam 112-12 on the last day of the class.
Module 01: Foundations of Security
* Essential terminology
* Defining security
* Need for security
* Cyber crime
* Information Security statistics
* IS triangle
* Security myths
* How to harden security
Module 02: Basic Security Procedures
* Why do I need to worry about my computer’s security?
* Introduction
* Hardening of Operating System
* Updating the system and configuring the updates
* Disable unnecessary services
* Strong password creation
* Deployment of antivirus and firewall
* Disable guest account access
* “Make Private” folders
* Security settings in MS Office applications
Module 03: Desktop Security
* What is file sharing?
* Types of file sharing
* How to share folder?
* Configuring shared folder permissions
* Hiding files and folders
* File sharing tips
* File downloading tips
* How to backup data and restore?
* How to encrypt and decrypt files?
* How to kill suspect processes?
Module 04: Administering Windows Securely
* How to use the event viewer?
* How to enable auditing in windows?
* How to read logs on your system?
* How to close ports?
* Overview of the windows registry
* How to restore the registry?
* How to close a port?
* Common internal commands
* How to find services and ports they listen on?
Module 05: Recognizing Security Threats and attacks
* Phishing and its countermeasures
* Virus
* Trojan Horse
* Worms
* Spyware
* Adware
* Keylogger
* Social engineering
* Denial of Service
* Spamming
* Port Scanning
* Password cracking
* Basic security measures
Module 06: Secure Internet Access
* Basic browser security settings
* How to restrict site access
* Removing site from security zone
* Secure website detection
* Secure site and browser properties
* Tools: Internet Filtering Software
* Configuring Internet content access
* Activating Content Advisor
* How to deal with cookies
* Using P2P networks securely
* Choosing appropriate browser settings
* Wireless network security features
Module 07: Working on the Internet
* Precepts of Security
* Knowing Encryption
* Digital Certificate
* Digital Signature
* Working with e-mail (web based)
* Working with e-mail (mail client)
* Working with File Transfer- FTP
* Working with File Transfer – Web Folders
* Knowing Online Payment Systems
* Working with Credit Cards
* Working with Instant Messengers
* Working across File Sharing Networks
* Working on Dial-in Networks
* Working with Portable Devices
* Working with Wireless Devices
* Working with USB devices
* Working with Media Files
* Working with 3rd party software
Module 08: Incident Response
* What is Incident Response?
* Incidents and responses:
* Trojan attack
* Boot sector virus attack
* Corrupted registry
* Automatic running of CD-ROM (autorun.inf)
Any computer user needs to know how to protect their information assets and securely connect to another system over a network. Security5 certification attests for the working knowledge a computer user possesses to achieve better efficiency in using computing resources. The certification is targeted towards today’s knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them an advantage over common users.
Security 5 Boot Camp Tutorial

links are interchangable. Use "JDownloader" to download free from the 120 sites that do not have to wait.!

DISCLAIMER:

This site does not store Security 5 Boot Camp Tutorial on its server. We only index and link to Security 5 Boot Camp Tutorial provided by other sites. Please contact the content providers to delete Security 5 Boot Camp Tutorial if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches