CIW Web Security Associate

Course

Online

£ 379 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Duration

    Flexible

  • Start date

    Different dates available

The CIW Web Security Associate course teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security.

This course identifies security principles and techniques that enable you to stop a hacker by understanding how to implement access control lists, operating system hardening and firewall technology. It also teaches you how to personalize your network security system so you can create a solution that adheres to universal principles, but also conforms to your business needs in responding tospecific hacker attacks. You will learn about authentication procedures, encryption standards and implementations that help ensure proper user authentication.

The CIW Web Security Associate course prepares candidates to take the CIW Web Security Associate exam. Candidates who also pass additional certification exams from third-party security training providers can earn the higher-level, CIW Web Security Specialist and CIW Web Security Professional certifications.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course


Key Topics

The CIW Web Design Specialist Course is divided into following lessons:

Lesson 1: What Is Security?
Lesson 2: Elements of Security
Lesson 3: Applied Encryption
Leson 4: Types of Attacks
Lesson 5: Recent Networking Vulnerability Considerations
Lesson 6: General Security Principles
Lesson 7: Protocol Layers and Security
Lesson 8: Securing Resources
Lesson 9: Firewalls and Virtual Private Networks
Lesson 10: Levels of Firewall Protection
Lesson 11: Detecting and Distracting Hackers
Lesson 12: Incident Response

There are no prerequisites for the Web Security Associate course. However, it is advisable that students should possess some basic Internet and networking knowledge.

This CIW Web Security Associate Course course will prepare you for following certification:

CIW Web Security Associate Certification
Exam Code: 1D0-571

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2016

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 17 years

Subjects

  • IT Security
  • IT
  • Web
  • Security
  • Web security
  • Web Programming

Teachers and trainers (1)

Support Advisor

Support Advisor

Support Advisor

Course programme

Course OutlineHow is the Course Structured?

The CIW Web Security Associate Course is divided into following lessons:

Lesson 1: What Is Security?

  • Network Security Background
  • What Is Security?
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • What You Are Trying to Protect
  • Who Is the Threat?
  • Security Standards

Lesson 2: Elements of Security

  • Security Elements and Mechanisms
  • The Security Policy
  • Determining Backups
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks

Lesson 3: Applied Encryption

  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric-Key Encryption
  • One-Way (Hash) Encryption
  • Applied Encryption Processes
  • Encryption Review

Lesson 4: Types of Attacks

  • Network Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Malware (Malicious Software)
  • Social Engineering Attacks
  • Denial-of-Service (DOS) Attacks
  • Distributed Denial-of-Service (DDOS) Attacks
  • Spoofing Attacks
  • Scanning Attacks
  • Man-in-the-Middle Attacks
  • Bots and Botnets
  • SQL Injection
  • Auditing

Lesson 5: Recent Networking Vulnerability Considerations

  • Networking Vulnerability Considerations
  • Wireless Network Technologies and Security
  • IEEE 802.11 Wireless Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Wireless Network Security Problems
  • Wireless Network Security Solutions
  • Site Surveys
  • Convergence Networking and Security
  • Web 2.0 Technologies
  • Greynet Applications
  • Vulnerabilities with Data at Rest
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking

Lesson 6: General Security Principles

  • Common Security Principles
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security

Lesson 7: Protocol Layers and Security

  • TCP/IP Security Introduction
  • OSI Reference Model Review
  • Data Encapsulation
  • The TCP/IP Stack and the OSI Reference Model
  • Link/Network Access Layer
  • Network/Internet Layer
  • Transport Layer
  • Application Layer
  • Protocol Analyzers

Lesson 8: Securing Resources

  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security and Repetition

Lesson 9: Firewalls and Virtual Private Networks

  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and Disadvantages
  • Configuring Proxy Servers
  • URL Filtering
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)

Lesson 10: Levels of Firewall Protection

  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together

Lesson 11: Detecting and Distracting Hackers

  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker

Lesson 12: Incident Response

  • Creating an Incident Response Policy
  • Determining If an Attack Has Occurred
  • Executing the Response Plan
  • Analyzing and Learning

CIW Web Security Associate

£ 379 VAT inc.