This 4 day instructor-led training class is intended for students that have little to no knowledge of computer security or treats. This class provides students with a solid base line of knowledge that is necessary to have today. This class also provides students with the necessary knowledge to bridge the skills gap for enrollment into more advanced computer security classes.
Chapter 1: Introduction to Computer Security
- Threats to Network Security
- Terms
- Concepts and Approaches
- Laws about Network Security
- Security Resources
- CIA triangle
- Least priveleges
- MAC, DAC, RBAC
Chapter 2: The basics of networks and internet
- Network Basics
- How the internet works
- History of the internet
- Basic Network Utilities
- IPV6
- Other Network Devices
- Advanced Topics
Section II: Attacks
Chapter 3: Cyber Stalking, Fraud, and Abuse
- How Internet Fraud Works
- Laws about Internet Fraud
- Cyber bullying and Cyber Stalking
- Protecting Yourself Against Cyber Crime
Chapter 4: Denial of Service Attacks
- The Basics
- Syn Attack
- The Smurf Attack
- Distributed Reflection
- Denial of Service
- Real World Examples
- How to defend against DOS Attacks.
Chapter 5: Malware
- Virii
- Trojan Horses
- The Buffer Overflow Attack.
- Session hijacking
Chapter 6: Internet Fraud and Cyber Crime
Chapter7: Industrial Espionage in cyberspace
- What Is Industrial Espionage?
- Spyware
- How to Protect Against Industrial Espionage
- Scenarios: Real-World Spy Scenarios
Section III Security
Chapter 8: Encryption 101
- History of Encryption
- Modern Methods
- Virtual Private Networks
- Steganography
Chapter 9: Technical Aspects of Computer Security
Virus Scanners
- Firewalls
- Intrusion Detection Software
- IDS
- Honey Pots
- Anti Spyware
Chapter 10: Organizational Security
- Policies and procedures
- Disaster Recovery
Chapter 11: Network Scanning and Vulnerability Scanning
- Overview
- Port Scanners
- In Depth Searches
- MBSA
- NESSUS
Section IV Advanced Topics
Chapter 12: Cyber Terrorism and Information Warfare
- Economic Attack
- Compromising Defense
- General Mayhem
- Information Warfare
- Actual Cases
- Future Trends
Chapter 13: Cyber Detective: Finding what you need to know
on the net.
- General Searches
- Court Records and Criminal Checks
Chapter 14: Basic Computer Forensics
To Hire a proven Computer Security Subject Matter Expert Consultant and Instructor who teaches this class, call 800-798-3901 today!