CIW Web Security

CloudLabs

Projects

Assignment

24x7 Support

Lifetime Access

.

Course Overview

The CIW Web Security series consists of one CIW course and corresponding CIW certification exam, plus advanced CIW credentials that you can obtain by earning additional certifications from third-party security training providers. Whichever level of expertise you aim for, you can demonstrate to employers that you have the technical skills and knowledge to manage and protect the security of online data, from a single computer to an entire corporate network.The CIW Web Security series is for those who configure, manage and deploy e-business solutions servers, and implement e-business and network security solutions. This series offers three levels of credential to recognize the achievements of those who have also attained levels of proficiency in networking administration and now want to validate and prove their competencies in security.

At the end of the training, participants will be able to:

Pre-requisite

Basic knowledge of using the computer and Internet.

Duarion

5 days

Course Outline

  1. Identify a situation in which a security attack is likely to occur.
  2. Identify the most effective implementation of security system attributes in a specified situation.
  3. Match the resources in an organization with the security threats that are faced by them in a specified situation.
  4. Match the situations representing hacker attacks with the measures that should be taken to prevent them.
  5. Match encryption services with the situations in which they are implemented.
  6. Identify the most effective security policy that should be implemented in a specified scenario.
  7. Match authentication methods with the situations in which they are implemented.
  8. Identify the rationale for implementing an access control method in a specified situation.
  9. Identify the methods for implementing security elements in a specified scenario.
  1. Match the encryption methods with the situations in which they should be applied.
  2. Sequence the steps involved in an encryption process.
  3. Identify the decisions to be made for applying encryption to e-mail messages and text files in a specified situation.
  4. Install PGP in Windows NT by using the PGP files.
  5. Generate a key pair by using PGP for Windows NT.
  6. Export the public keys by using PGP for Windows NT.
  7. Import the public keys by using PGP for Windows NT.
  8. Encrypt an e-mail message by using PGP for Windows NT.
  9. Encrypt a text file by using PGP for Windows NT.
  1. Sequence the steps involved in the SHTTP process.
  2. Match the type of certificates with the situations in which they are used.
  3. Match the tunneling protocols with the situations in which they are applicable.
  4. Identify the correct combination of decisions to be taken while configuring IPSec for the specified requirements.
  5. Enable IPSec by using PGP.
  1. Identify the incidents that represent basic security attacks.
  2. Identify the incidents that represent advanced security attacks.
  3. Identify the situations in which physical level security principles are being followed.
  4. Identify the situations in which strategic level security principles are being followed

Reviews