Wednesday, December 22, 2010









Description: It is the basic information Security course for the newbies.
Prerequisites
Basic computing skills like browsing the membrane and checking e-mails.
Who Should Attend:
* Office knowledge workers
* Home users
* Any non-IT part using computers in their office

Certification Exam
Module 01: Foundations of Security
* Essential nomenclature
* Defining security
* Need for security
* Cyber crime
* Information Security statistics
* IS trigon
* Security myths
* How to harden security

Module 02: Basic Security Procedures
* Why observe I need to worry about my computer’s security?
* Introduction
* Hardening of Operating System
* Updating the rule and configuring the updates
* Disable unnecessary services
* Strong password creation
* Deployment of antivirus and firewall
* Disable visitor account access
* “Make Private” folders
* Security settings in MS Office applications

Module 03: Desktop Security
* What is toothed sharing?
* Types of file sharing
* How to share folder?
* Configuring shared folder permissions
* Hiding files and folders
* File sharing tips
* File downloading tips
* How to backup data and restore?
* How to encrypt and decrypt files?
* How to slay suspect processes?

Module 04: Administering Windows Securely
* How to use the incident viewer?
* How to enable auditing in windows?
* How to read logs attached your system?
* How to close ports?
* Overview of the windows registry
* How to renew the registry?
* How to close a port?
* Common internal commands
* How to supply services and ports they listen on?

Module 05: Recognizing Security Threats and attacks
* Phishing and its countermeasures
* Virus
* Trojan Horse
* Worms
* Spyware
* Adware
* Keylogger
* Social engineering
* Denial of Service
* Spamming
* Port Scanning
* Password cracking
* Basic surety measures

Module 06: Secure Internet Access
* Basic browser security settings
* How to hedge in site access
* Removing site from security zone
* Secure website detection
* Secure position and browser properties
* Tools: Internet Filtering Software
* Configuring Internet content admission
* Activating Content Advisor
* How to deal with cookies
* Using P2P networks securely
* Choosing appropriate browser settings
* Wireless reticulated security features

Module 07: Working on the Internet
* Precepts of Security
* Knowing Encryption
* Digital Certificate
* Digital Signature
* Working by e-mail (web based)
* Working with e-mail (mail client)
* Working with File Transfer- FTP
* Working with File Transfer – Web Folders
* Knowing Online Payment Systems
* Working through Credit Cards
* Working with Instant Messengers
* Working across File Sharing Networks
* Working without interrupti~ Dial-in Networks
* Working with Portable Devices
* Working with Wireless Devices
* Working with USB devices
* Working with Media Files
* Working with 3rd party software

Module 08: Incident Response
* What is Incident Response?
* Incidents and responses:
* Trojan rush upon
* Boot sector virus attack
* Corrupted registry
* Automatic running of CD-ROM (autorun.inf)

Download Here:
http://www.megaupload.com/?d=ZUQ1X52B
http://www.megaupload.com/?d=A0L2YXOD
http://www.megaupload.com/?d=CQ37G985
http://www.megaupload.com/?d=ZUQ1X52B

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Pageviews

Followers

Blog Archive

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -