CIW Web Security Associate

  • کد آزمون : 1D0-571
  • تعداد سوالات : 62
  • نمره قبولی : 76%
  • مدت زمان : 90 دقیقه
  • هزینه مدرک :
  • پیش نیاز :
    • مدرک CIW Web Foundations Associate

توضیح درباره مدرک

The CIW Web Security Associate course teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security.

سرفصل ها

  • Network Security Background
  • What Is Security?
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • What You Are Trying to Protect
  • Who Is the Threat?
  • Security Standards
  • Lesson Summary
  • Security Elements and Mechanisms
  • The Security Policy
  • Determining Backups
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks
  • Lesson Summary
  • Optional lab
  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric-Key Encryption
  • One-Way (Hash) Encryption
  • Applied Encryption Processes
  • Encryption Review
  • Lesson Summary
  • Optional Lab
  • Network Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Malware (Malicious Software)
  • Social Engineering Attacks
  • Denial-of-Service (DOS) Attacks
  • Distributed Denial-of-Service (DDOS) Attacks
  • Spoofing Attacks
  • Scanning Attacks
  • Man-in-the-Middle Attacks
  • Bots and Botnets
  • SQL Injection
  • Auditing
  • Lesson Summary
  • Optional Lab
  • Networking Vulnerability Considerations
  • Wireless Network Technologies and Security
  • IEEE 802.11 Wireless Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Wireless Network Security Problems
  • Wireless Network Security Solutions
  • Site Surveys
  • Convergence Networking and Security
  • Web 2.0 Technologies
  • Greynet Applications
  • Vulnerabilities with Data at Rest
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking
  • Lesson Summary
  • Optional Lab
  • Common Security Principles
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security
  • Lesson Summary
  • Optional lab
  • TCP/IP Security Introduction
  • OSI Reference Model Review
  • Data Encapsulation
  • The TCP/IP Stack and the OSI Reference Model
  • Link/Network Access Layer
  • Network/Internet Layer
  • Transport Layer
  • Application Layer
  • Protocol Analyzers
  • Lesson Summary
  • Optional Lab
  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security and Repetition
  • Lesson Summary
  • Optional Lab
  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and Disadvantages
  • Configuring Proxy Servers
  • URL Filtering
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)
  • Lesson Summary
  • Optional Lab
  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together
  • Lesson Summary
  • Optional Lab
  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker
  • Lesson Summary
  • Creating an Incident Response Policy
  • Determining If an Attack Has Occurred
  • Executing the Response Plan
  • Analyzing and Learning
  • Lesson Summary
  • General
  • UNIX
  • Windows Server 2003
  • Microsoft Windows Server 2003
  • Ubuntu Linux