EC-Council Security5 Course

EC-Council Security5 Course | 615 MB




Description: It is the basic information Security course for the newbies.
Prerequisites
Basic computing skills like browsing the membrane and checking e-mails.
Who Should Attend:
* Office knowledge workers
* Home users
* Any non-IT part using computers in their office
Schedule:
Please visit EC-Council&rs>quo;s Accredited Training Centers to obtain all of our upcoming classes, dates and locations.
Duration:
2 days (9:00 - 5:00)
Certification Exam
Students force of ~ be prepared for EC-Council’s Security 5 exam 112-12 put ~ the last day of the class.
Module 01: Foundations of Security
* Essential nomenclature
* Defining security
* Need for security
* Cyber crime
* Information Security statistics
* IS trigon
* Security myths
* How to harden security
Module 02: Basic Security Procedures
* Why observe I need to worry about my computer’s security?
* Introduction
* Hardening of Operating System
* Updating the rule and configuring the updates
* Disable unnecessary services
* Strong password creation
* Deployment of antivirus and firewall
* Disable visitor account access
* “Make Private” folders
* Security settings in MS Office applications
Module 03: Desktop Security
* What is toothed sharing?
* Types of file sharing
* How to share folder?
* Configuring shared folder permissions
* Hiding files and folders
* File sharing tips
* File downloading tips
* How to backup data and restore?
* How to encrypt and decrypt files?
* How to slay suspect processes?
Module 04: Administering Windows Securely
* How to use the incident viewer?
* How to enable auditing in windows?
* How to read logs attached your system?
* How to close ports?
* Overview of the windows registry
* How to renew the registry?
* How to close a port?
* Common internal commands
* How to supply services and ports they listen on?
Module 05: Recognizing Security Threats and attacks
* Phishing and its countermeasures
* Virus
* Trojan Horse
* Worms
* Spyware
* Adware
* Keylogger
* Social engineering
* Denial of Service
* Spamming
* Port Scanning
* Password cracking
* Basic surety measures
Module 06: Secure Internet Access
* Basic browser security settings
* How to hedge in site access
* Removing site from security zone
* Secure website detection
* Secure position and browser properties
* Tools: Internet Filtering Software
* Configuring Internet content admission
* Activating Content Advisor
* How to deal with cookies
* Using P2P networks securely
* Choosing appropriate browser settings
* Wireless reticulated security features
Module 07: Working on the Internet
* Precepts of Security
* Knowing Encryption
* Digital Certificate
* Digital Signature
* Working by e-mail (web based)
* Working with e-mail (mail client)
* Working with File Transfer- FTP
* Working with File Transfer – Web Folders
* Knowing Online Payment Systems
* Working through Credit Cards
* Working with Instant Messengers
* Working across File Sharing Networks
* Working without interrupti~ Dial-in Networks
* Working with Portable Devices
* Working with Wireless Devices
* Working with USB devices
* Working with Media Files
* Working with 3rd party software
Module 08: Incident Response
* What is Incident Response?
* Incidents and responses:
* Trojan rush upon
* Boot sector virus attack
* Corrupted registry
* Automatic running of CD-ROM (autorun.inf)

Downloadhttp://hotfile.com/list/998051/4d5ef45

Comments

Popular posts from this blog

Internet Download Manager 6.02 Beta

How To Encoding, Editing of x264 Mkv movies using Megui, Mkvmerge

Not Responding Permanent Solution