Szkolenia CIW

Cel szkolenia szkolenie zdalne - dlearning

kod: CIW-WSA | wersja: 2.0

Web Security Associate teaches you how to secure your local and cloud network devices and communications from unauthorized activity. This course teaches you network security principles, such as establishing an effective security policy, and about the different types of cyber-attacks activities that you are most likely to encaounter.

This course identifies security principles and techniques that enable you to stop a cyber-attacks by understanding how to implement access control lists, operating system hardening and firewall technology. It also teaches you how to personalize your network security system so you can create a solution that adheres to universal principles, but also conforms to your business needs in responding to specific cyber-attacks.

You will learn about authentication procedures, encryption standards and implementations that help ensure proper user authentication. You will also learn about the specific ports and protocols that cyber-attacks manipulate, and about direct and indirect ways to protect your network operating systems. Finally, you will learn how to respond to and report cyber-attacks activity, engage in proactive detection, and always keep your company's needs in mind. Appendixes are included in the back of this coursebook to provide resources for you as you continue to learn about applying security measures to your network.

Guided, step-by-step labs provide opportunities to practice new skills. You can challenge yourself and review your skills after each lesson with the Lesson Quizzes and Flash cards. Additional skill reinforcement is provided in the online Pre-Assessment, Activities, Lesson Quizzes, Optional Labs, Live Labs, Test Prep, Practice Exams and Post Assessment materials.

Target Audience:

The CIW Web Security Associate courseware teaches you how to secure your local and cloud network devices and communications from unauthorized activity. This course teaches you network security principles, such as establishing an effective security policy, and about the different types of cyber-attacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security.

Experience level from 0-3 years experience in the following job roles:

  • Network server administrators
  • Firewall administrators
  • Systems administrators
  • Application developers
  • IT Security Officers

Job Responsibilities:

Secure your network from unauthorized activity; implement access control lists, operating system hardening and firewall technology; personalize your network security system; ensure proper user authentication; protect network operating systems; and respond to and report hacker activity.

Plan szkolenia Rozwiń listę

  1. What Is Security?
    • Network Security Background
    • What Is Security? Hacker Statistics
    • Wireless Network Technologies and Security
    • Wireless Network Security Problems
    • Wireless Network Security Solutions
    • Physical and Configuration Solutions
    • Convergence Networking and Security
    • Firewall Practices Applied to Virtual LANs (VLANs)
    • Cyber-attacker Statistics
    • The Myth of 100-Percent Security
    • Attributes of an Effective Security Matrix
    • What You Are Trying to Protect
  2. Security Threats
    • Who Is the Threat?
    • Security Threats from Trusted Users
    • Anonymous Downloads and Indiscriminate Link-Clicking
    • Security Standards
    • Wireless Network Modes
    • Wireless Application Protocol (WAP)
    • Site Surveys
    • Web 2.0 Technologies
    • Greynet Applications
    • Sensitive Data and Data Classifications
    • Vulnerabilities with Data at Rest
    • Data and Drive Sanitizing
  3. Elements of Security
    • Security Elements and Mechanisms
    • The Security Policy
    • Determining Backups
    • Encryption
    • Authentication
    • Specific Authentication Techniques
    • Access Control
    • Auditing
    • Security Tradeoffs
    • Defense in Depth Strategies
  4. Applied Encryptions
    • Reasons to Use Encryption
    • Creating Trust Relationships
    • Symmetric-Key Encryption
    • Symmetric Algorithms
    • One-Way (Hash) Encryption
    • Asymmetric-Key Encryption
    • Encryption Review
    • Certification Authority (CA)
    • Full/Whole Disk Encryption
  5. Types of Attacks
    • Network Attack Categories
    • Brute-Force, Dictionary, and Password Spraying Attacks
    • Rainbow Tables, Pass-the-Hash, and Birthday Attacks
    • Password Storage Techniques
    • System Bugs and Back Doors
    • Malware (Malicious Software)
    • TLS Encryption
    • Social Engineering Attacks
    • Denial-of-Service (DOS) Attacks
    • Distributed Denial-of-Service (DDOS) Attacks
    • Spoofing Attacks
    • Scanning Attacks
    • Man-in-the-Middle Attacks
    • Bots and Botnets
    • Ransomware
    • SQL Injection
    • Cross-Site Scripting (XSS)
    • Cross-Site Request Forgery (CSRF)
    • Auditing
  6. General Security Principles
    • Common Security Principles
    • Be Paranoid
    • You Must Have a Security Policy
    • No System or Technique Stands Alone
    • Minimize the Damage
    • Deploy Companywide Enforcement
    • Provide Training
    • Use an Integrated Security Strategy
    • Place Equipment According to Needs
    • Identify Security Business Issues
    • Consider Physical Security
  7. Protocol Layers and Security
    • TCP/IP Security Introduction
    • OSI Reference Model Review
    • Data Encapsulation
    • The TCP/IP Stack and the OSI Reference Model
    • Link/Network Access Layer
    • Network/Internet Layer
    • Transport Layer
    • Application Layer
    • Protocol Analyzers
    • Domain Name Service (DNS)
    • Trusted Platform Modules and MicroSoft BitLocker
    • Secure TCP/IP Services
    • Change Management
  8. Securing Resources
    • TCP/IP Security Vulnerabilities
    • Implementing Security
    • Resources and Services
    • Protecting TCP/IP Services
    • Simple Mail Transfer Protocol (SMTP)
    • Bring Your Own Device (BYOD)
    • Internet of Things (IoT)
    • Communication Systems
    • Physical Security
    • Testing Systems
    • Security Testing Software
    • Specific tools
    • Security Assessments
    • Security and Repetition
  9. Firewalls and Virtual Private Networks
    • Access Control Overview
    • Definition and Description of a Firewall
    • The Role of a Firewall
    • Firewall Terminology
    • Operating System and Network Device Hardening
    • Firewall Configuration Defaults
    • Packet Filter Rules
    • Packet Filter Advantages and Disadvantages
    • Configuring Proxy Servers
    • URL Filtering
    • Remote Access and Virtual Private Networks (VPNs)
    • Public Key Infrastructure (PKI)
    • Cloud Computing and Virtualization
  10. Levels of Firewall Protection
    • Designing a Firewall
    • Types of Bastion Hosts
    • Hardware Issues
    • Common Firewall Designs
    • Putting It All Together
  11. Detecting and Distracting Cyber-attackers
    • Proactive Detection
    • Distracting the Cyber-attacker
    • Deterring the Cyber-attacker
  12. Incident Response
    • Risk Management, mitigation, and incident response
    • Creating an Incident Response Policy
    • Determining If an Attack Has Occurred
    • Executing the Response Plan
    • Analyzing and Learning
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania wstępne

There are no prerequisites for the Web Security Associate course. However, students should possess Internet and networking knowledge equivalent to what is presented in the CIW Web Foundations series courses. Web Security Associate builds upon this foundational knowledge to give students the skills and knowledge to manage and protect the security of online data, from a single computer to an entire corporate network.

Poziom trudności
Czas trwania 2 dni
Certyfikat

The participants will obtain certificates signed by CIW (course completion). The Web Security Associate course prepares candidates to take the Web Security Associate exam, which, if passed, earns the individual the CIW Web Security Associate certification.

Prowadzący

CIW Certified Instructor.

Wszystkie szkolenia CIW
Szkolenia powiązane tematycznie

Bezpieczeństwo IT

Formularz kontaktowy

Prosimy o wypełnienie poniższego formularza, jeśli chcą Państwo uzyskać więcej informacji o powyższym szkoleniu.






* pola oznaczone (*) są wymagane

Informacje o przetwarzaniu danych przez Compendium – Centrum Edukacyjne Spółka z o.o.

CENA 2250 PLN NETTO Czy wiesz, że możesz uzyskać do 100% dofinansowania na ten kurs?   Sprawdź jak »

zamknij

Kody rabatowe

Kod rabatowy, może dotyczyć (szkolenia, producenta, terminu). Jeżeli posiadasz kod rabatowy, to wpisz go w odpowiednie pole.
(kolor zielony oznacza wpisanie prawidłowego kodu | kolor czerwony oznacza, że wpisany kod jest nieprawidłowy)

FORMA SZKOLENIA ?

zamknij

Szkolenie stacjonarne

Szkolenia stacjonarne w Compendium CE odbywają się najczęściej w naszych lokalizacjach w Krakowie i Warszawie, ale także w miejscu ustalonym przez klienta. Grupa uczestnicząca w szkoleniu spotyka się w danym miejscu o określonym czasie i wraz z trenerem aktywnie uczestniczy w laboratoriach.

Szkolenie dlearning

W szkoleniach Compendium Distance Learning możesz uczestniczyć z dowolnego miejsca na świecie. Kursanci, dzięki zaawansowanej technologii, którą dostarcza Compendium CE, stale widzą i słyszą trenera, mogą mu zadawać pytania poprzez chat i mikrofon, a także uczestniczą w ćwiczeniach i laboratoriach, które rozwiązują wraz z prowadzącym. Po więcej informacji zajrzyj na stronę dlearning.eu

MATERIAŁY SZKOLENIOWE ?

zamknij

Materiały elektroniczne

Materiały elektroniczne: są to materiały szkoleniowe w wersji elektronicznej, które w zależności od dostawcy udostępniane są za pomocą dedykowanych aplikacji: Skillpipe, eVantage itd. lub w postaci dokumentów PDF.

Materiały ctab

Materiały ctab: cena zawiera tablet ctab oraz materiały szkoleniowe w formie elektronicznej bądź tradycyjne materiały szkoleniowe i materiały dodatkowe dostarczone w wersji elektronicznej w zależności od ustaleń z producentem (w postaci dokumentów PDF lub EPUB). Tak dostarczone materiały są przystosowane pod kątem wyświetlania ich na tablecie ctab. Po więcej informacji zajrzyj na stronę ctab.

 

WYBIERZ TERMIN SZKOLENIA

Brak ustalonych terminów dla tego szkolenia.

Zaproponuj własny termin

Najbliższe szkolenia CIW

Harmonogram szkoleń CIW