Computer Security Fundamentals

This 4 day instructor-led training class is intended for students that have little to no  knowledge of computer security or treats.  This class provides students with a solid base line of knowledge that is necessary to have today. This class also provides students with the necessary knowledge to bridge the skills gap for enrollment into more advanced computer security classes.

Chapter 1: Introduction to Computer Security

  • Threats to Network Security
  • Terms
  • Concepts and Approaches
  • Laws about Network Security
  • Security Resources
  • CIA triangle
  • Least priveleges
  • MAC, DAC, RBAC

Chapter 2: The basics of networks and internet

  • Network Basics
  • How the internet works
  • History of the internet
  • Basic Network Utilities
  • IPV6
  • Other Network Devices
  • Advanced Topics

Section II: Attacks

Chapter 3: Cyber Stalking, Fraud, and Abuse

  • How Internet Fraud Works
  • Laws about Internet Fraud
  • Cyber bullying and Cyber Stalking
  • Protecting Yourself Against Cyber Crime

Chapter 4: Denial of Service Attacks

  • The Basics
  • Syn Attack
  • The Smurf Attack
  • Distributed Reflection
  • Denial of Service
  • Real World Examples
  • How to defend against DOS Attacks.

Chapter 5: Malware

  • Virii
  • Trojan Horses
  • The Buffer Overflow Attack.
  • Session hijacking

Chapter 6: Internet Fraud and Cyber Crime

Chapter7: Industrial Espionage in cyberspace

  • What Is Industrial Espionage?
  • Spyware
  • How to Protect Against Industrial Espionage
  • Scenarios: Real-World Spy Scenarios

Section III Security

Chapter 8: Encryption 101

  • History of Encryption
  • Modern Methods
  • Virtual Private Networks
  • Steganography

Chapter 9: Technical Aspects of Computer Security


Virus Scanners

  • Firewalls
  • Intrusion Detection Software
  • IDS
  • Honey Pots
  • Anti Spyware

Chapter 10: Organizational Security

  • Policies and procedures
  • Disaster Recovery

Chapter 11: Network Scanning and Vulnerability Scanning

  • Overview
  • Port Scanners
  • In Depth Searches
  • MBSA
  • NESSUS

Section IV Advanced Topics

Chapter 12: Cyber Terrorism and Information Warfare

  • Economic Attack
  • Compromising Defense
  • General Mayhem
  • Information Warfare
  • Actual Cases
  • Future Trends

Chapter 13: Cyber Detective: Finding what you need to know
on the net.

  • General Searches
  • Court Records and Criminal Checks

Chapter 14: Basic Computer Forensics

To Hire a proven Computer Security Subject Matter Expert Consultant and Instructor who teaches this class, call 800-798-3901 today!

Leave a Reply