CIW Web Security Associate
Hours: 72 / Access Length: 12 Months / Delivery: Online, Self-Paced
Retail Price: $1,423.00
Course Overview:
Web Security Associate teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter.
This course identifies security principles and techniques that enable you to stop a hacker by understanding how to implement access control lists, operating system hardening and firewall technology. It also teaches you how to personalize your network security system so you can create a solution that adheres to universal principles, but also conforms to your business needs in responding to specific hacker attacks.
You will learn about authentication procedures, encryption standards and implementations that help ensure proper user authentication. You will also learn about the specific ports and protocols that hackers manipulate, and about direct and indirect ways to protect your network operating systems. Finally, you will learn how to respond to and report hacker activity, engage in proactive detection, and always keep your company's needs in mind.
Course Outline:
What Is Security?
- Network Security Background
- What Is Security?
- Hacker Statistics
- The Myth of 100-Percent Security
- Attributes of an Effective Security Matrix
- What You Are Trying to Protect
- Who Is the Threat?
- Security Standards
Elements of Security
- Security Elements and Mechanisms
- The Security Policy
- Determining Backups
- Encryption
- Authentication
- Specific Authentication Techniques
- Access Control
- Auditing
- Security Tradeoffs and Drawbacks
Applied Encryption
- Reasons to Use Encryption
- Creating Trust Relationships
- Symmetric-Key Encryption
- Symmetric Algorithms
- Asymmetric-Key Encryption
- One-Way (Hash) Encryption
- Applied Encryption Processes
- Encryption Review
Types of Attacks
- Network Attack Categories
- Brute-Force and Dictionary Attacks
- System Bugs and Back Doors
- Malware (Malicious Software)
- Social Engineering Attacks
- Denial-of-Service (DOS) Attacks
- Distributed Denial-of-Service
- (DDOS) Attacks
- Spoofing Attacks
- Scanning Attacks
- Man-in-the-Middle Attacks
- Bots and Botnets
- SQL Injection
- Auditing
Recent Networking Vulnerability
- Considerations
- Networking Vulnerability
- Considerations
- Wireless Network Technologies and Security
- IEEE 802.11 Wireless Standards
- Wireless Networking Modes
- Wireless Application Protocol (WAP)
- Wireless Network Security Problems
- Wireless Network Security Solutions
- Site Surveys
- Convergence Networking and Security
- Web 2.0 Technologies
- Greynet Applications
- Vulnerabilities with Data at Rest
- Security Threats from Trusted Users
- Anonymous Downloads and Indiscriminate Link-Clicking
General Security Principles
- Common Security Principles
- Be Paranoid
- You Must Have a Security Policy
- No System or Technique Stands Alone
- Minimize the Damage
- Deploy Companywide Enforcement
- Provide Training
- Use an Integrated Security Strategy
- Place Equipment According to Needs
- Identify Security Business Issues
- Consider Physical Security
Protocol Layers and Security
- TCP/IP Security Introduction
- OSI Reference Model Review
- Data Encapsulation
- The TCP/IP Stack and the OSI
- Reference Model
- Link/Network Access Layer
- Network/Internet Layer
- Transport Layer
- Application Layer
- Protocol Analyzers
Securing Resources
- TCP/IP Security Vulnerabilities
- Implementing Security
- Resources and Services
- Protecting TCP/IP Services
- Simple Mail Transfer Protocol (SMTP)
- Physical Security
- Testing Systems
- Security Testing Software
- Security and Repetition
Firewalls and Virtual Private Networks
- Access Control Overview
- Definition and Description of a Firewall
- The Role of a Firewall
- Firewall Terminology
- Firewall Configuration Defaults
- Creating Packet Filter Rules
- Packet Filter Advantages and Disadvantages
- Configuring Proxy Servers
- URL Filtering
- Remote Access and Virtual Private
- Networks (VPNs)
- Public Key Infrastructure (PKI)
Levels of Firewall Protection
- Designing a Firewall
- Types of Bastion Hosts
- Hardware Issues
- Common Firewall Designs
- Putting It All Together
Detecting and Distracting
- Hackers
- Proactive Detection
- Distracting the Hacker
- Deterring the Hacker
Incident Response
- Creating an Incident Response Policy
- Determining If an Attack Has
- Occurred
- Executing the Response Plan
- Analyzing and Learning
All necessary materials are included.
System Requirements:
Internet Connectivity Requirements:
- Cable, Fiber, DSL, or LEO Satellite (i.e. Starlink) internet with speeds of at least 10mb/sec download and 5mb/sec upload are recommended for the best experience.
NOTE: While cellular hotspots may allow access to our courses, users may experience connectivity issues by trying to access our learning management system. This is due to the potential high download and upload latency of cellular connections. Therefore, it is not recommended that students use a cellular hotspot as their primary way of accessing their courses.
Hardware Requirements:
- CPU: 1 GHz or higher
- RAM: 4 GB or higher
- Resolution: 1280 x 720 or higher. 1920x1080 resolution is recommended for the best experience.
- Speakers / Headphones
- Microphone for Webinar or Live Online sessions.
Operating System Requirements:
- Windows 7 or higher.
- Mac OSX 10 or higher.
- Latest Chrome OS
- Latest Linux Distributions
NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.
Web Browser Requirements:
- Latest Google Chrome is recommended for the best experience.
- Latest Mozilla FireFox
- Latest Microsoft Edge
- Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
- Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
- PDF reader program (Adobe Reader, FoxIt)
- Courses may require other software that is described in the above course outline.
** The course outlines displayed on this website are subject to change at any time without prior notice. **