£180.00
Certification Name: CIW Web Security Associate
Exam ID: 1D0-571
Number of Questions: 62
Passing Score: 76%
Time Limit: 90 minutes
Course Names: CIW Web Security Associate
Mode of Study: Online – Self study
Duration: One Year – Part time
Whats Included: CIW Online, E-Books, Practice Exams
Web Security Associate teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. This course identifies security principles and techniques that enable you to stop a hacker by understanding how to implement access control lists, operating system hardening and firewall technology. It also teaches you how to personalize your network security system so you can create a solution that adheres to universal principles, but also conforms to your business needs in responding to specific hacker attacks. You will learn about authentication procedures, encryption standards and implementations that help ensure proper user authentication. You will also learn about the specific ports and protocols that hackers manipulate, and about direct and indirect ways to protect your network operating systems. Finally, you will learn how to respond to and report hacker activity, engage in proactive detection, and always keep your company’s needs in mind. The CIW Web Security Associate course is for individuals who want to know how to secure networks from unauthorized activities. Individuals with these security skills can pursue or advance careers in many aspects of online and network security: Secure your network from unauthorized activity; implement access control lists, operating system hardening and firewall technology; personalize your network security system; ensure proper user authentication; protect network operating systems; and respond to and report hacker activity. What Is Security? Network Security Background Elements of Security Security Elements and Mechanisms Applied Encryption Reasons to Use Encryption Types of Attacks Network Attack Categories Recent Networking Vulnerability Considerations Networking Vulnerability Considerations General Security Principles Common Security Principles Protocol Layers and Security TCP/IP Security Introduction Securing Resources TCP/IP Security Vulnerabilities Firewalls and Virtual Private Networks Access Control Overview Levels of Firewall Protection Designing a Firewall Detecting and Distracting Hackers Proactive Detection Incident Response Creating an Incident Response Policy
What Is Security?
Hacker Statistics
The Myth of 100-Percent Security
Attributes of an Effective Security Matrix
What You Are Trying to Protect
Who Is the Threat?
Security Standards
The Security Policy
Determining Backups
Encryption
Authentication
Specific Authentication Techniques
Access Control
Auditing
Security Tradeoffs and Drawbacks
Creating Trust Relationships
Symmetric-Key Encryption
Symmetric Algorithms
Asymmetric-Key Encryption
One-Way (Hash) Encryption
Applied Encryption Processes
Encryption Review
Brute-Force and Dictionary Attacks
System Bugs and Back Doors
Malware (Malicious Software)
Social Engineering Attacks
Denial-of-Service (DOS) Attacks
Distributed Denial-of-Service (DDOS) Attacks
Spoofing Attacks
Scanning Attacks
Man-in-the-Middle Attacks
Bots and Botnets
SQL Injection
Auditing
Wireless Network Technologies and Security
IEEE 802.11 Wireless Standards
Wireless Networking Modes
Wireless Application Protocol (WAP)
Wireless Network Security Problems
Wireless Network Security Solutions
Site Surveys
Convergence Networking and Security
Web 2.0 Technologies
Greynet Applications
Vulnerabilities with Data at Rest
Security Threats from Trusted Users
Anonymous Downloads and Indiscriminate Link-Clicking
Be Paranoid
You Must Have a Security Policy
No System or Technique Stands Alone
Minimize the Damage
Deploy Companywide Enforcement
Provide Training
Use an Integrated Security Strategy
Place Equipment According to Needs
Identify Security Business Issues
Consider Physical Security
OSI Reference Model Review
Data Encapsulation
The TCP/IP Stack and the OSI Reference Model
Link/Network Access Layer
Network/Internet Layer
Transport Layer
Application Layer
Protocol Analyzers
Implementing Security
Resources and Services
Protecting TCP/IP Services
Simple Mail Transfer Protocol (SMTP)
Physical Security
Testing Systems
Security Testing Software
Security and Repetition
Definition and Description of a Firewall
The Role of a Firewall
Firewall Terminology
Firewall Configuration Defaults
Creating Packet Filter Rules
Packet Filter Advantages and Disadvantages
Configuring Proxy Servers
URL Filtering
Remote Access and Virtual Private Networks (VPNs)
Public Key Infrastructure (PKI)
Types of Bastion Hosts
Hardware Issues
Common Firewall Designs
Putting It All Together
Distracting the Hacker
Deterring the Hacker
Determining If an Attack Has Occurred
Executing the Response Plan
Analyzing and Learning
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
Our exam centre is currently open and available during the new national restrictions with COVID-19 measures in place.
|