» » » Security 5 Boot Camp Interactive CDRom Tutorial

Information of news
16-10-2013, 21:21

Security 5 Boot Camp Interactive CDRom Tutorial

Category: Tutorials » Other

Security 5 Boot Camp Interactive CDRom Tutorial

Security 5 Boot Camp Interactive CDRom Tutorial
English | 663MB
Genre: eLearning

ARE YOU TRULY SAFE? Any computer user needs to know how to protect their information assets and securely connect to another system over a network. Security 5 attests for the working knowledge of a computer user to possess and achieve better efficiency in using computing resources.
Identity theft, credit card fraud, online banking phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information and hackers are some of the threats you will face on a daily basis. Are you prepared to face them and defend yourself? If you are someone who banks online, pays utility bills online, shops online, have children chatting online, downloads shareware and games, communicates over email, subscribes to a broadband connection or someone who uses a computer system at work or home, then you need to have Security5 training to help you guard your information assets.

The course is targeted towards todays knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them an advantage over common users.

Basic computing skills like browsing the web and checking emails.

Who Should Learn:
Office knowledge workers
Home users
Any person using computers in their office

Module 01: Foundations of Security
Essential terminology
Defining security
Need for security
Cyber crime
Information Security statistics
IS triangle
Security myths
How to harden security

Module 02: Basic Security Procedures
Why do I need to worry about my computers security?
Hardening of Operating System
Updating the system and configuring the updates
Disable unnecessary services
Strong password creation
Deployment of antivirus and firewall
Disable guest account access
Make Private folders
Security settings in MS Office applications

Module 03: Desktop Security
What is file sharing?
Types of file sharing
How to share folder?
Configuring shared folder permissions
Hiding files and folders
File sharing tips
File downloading tips
How to backup data and restore?
How to encrypt and decrypt files?
How to kill suspect processes?

Module 04: Administering Windows Securely
How to use the event viewer?
How to enable auditing in windows?
How to read logs on your system?
How to close ports?
Overview of the windows registry
How to restore the registry?
How to close a port?
Common internal commands
How to find services and ports they listen on?

Module 05: Recognizing Security Threats and attacks
Phishing and its countermeasures
Trojan Horse
Social engineering
Denial of Service
Port Scanning
Password cracking
Basic security measures

Module 06: Secure Internet Access
Basic browser security settings
How to restrict site access
Removing site from security zone
Secure website detection
Secure site and browser properties
Tools: Internet Filtering Software
Configuring Internet content access
Activating Content Advisor
How to deal with cookies
Using P2P networks securely
Choosing appropriate browser settings
Wireless network security features

Module 07: Working on the Internet
Precepts of Security
Knowing Encryption
Digital Certificate
Digital Signature
Working with email (web based)
Working with email (mail client)
Working with File Transfer FTP
Working with File Transfer – Web Folders
Knowing Online Payment Systems
Working with Credit Cards
Working with Instant Messengers
Working across File Sharing Networks
Working on Dialin Networks
Working with Portable Devices
Working with Wireless Devices
Working with USB devices
Working with Media Files
Working with 3rd party software

Module 08: Incident Response
What is Incident Response?
Incidents and responses:
Trojan attack
Boot sector virus attack
Corrupted registry
Automatic running of CDROM (autorun.inf)


Site BBcode/HTML Code:

Tags to an Article: Security, Boot, Camp, Interactive, CDRom

Dear visitor, you went to the site as unregistered user.
We recommend you Sign up or Login to website under your name.
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.