Web Security Series
Web Security Associate v2.0
Web Security Associate teaches you how to secure your local and cloud network devices and communications from unauthorized activity. This course teaches you network security principles, such as establishing an effective security policy, and about the different types of
This course identifies security principles and techniques that enable you to stop a
You will learn about authentication procedures, encryption standards and implementations that help ensure proper user authentication. You will also learn about the specific ports and protocols that cyber- attacks manipulate, and about direct and indirect ways to protect your network operating systems. Finally, you will learn how to respond to and report
Guided,
Topics
What Is Security?
Network Security Background What Is Security? Hacker Statistics Wireless Network Technologies and
Security
Wireless Network Security Problems Wireless Network Security
Solutions
Physical and Configuration Solutions
Convergence Networking and Security
Firewall Practices Applied to Virtual LANs (VLANs)
The Myth of
Matrix
What You Are Trying to Protect
Security Threats
Who Is the Threat?
Security Threats from Trusted Users
Anonymous Downloads and Indiscriminate
Security Standards Wireless Network Modes Wireless Application Protocol (WAP) Site Surveys
Web 2.0 Technologies
Greynet Applications Sensitive Data and Data
Classifications
Vulnerabilities with Data at Rest Data and Drive Sanitizing
Elements of Security
Security Elements and Mechanisms
The Security Policy
Determining Backups
Encryption
Authentication
Specific Authentication Techniques
Access Control
Auditing
Security Tradeoffs
Defense in Depth Strategies
Applied Encryptions
Reasons to Use Encryption Creating Trust Relationships
Types of Attacks
Network Attack Categories
Password Spraying Attacks
Rainbow Tables,
and Birthday Attacks
Password Storage Techniques
System Bugs and Back Doors
Malware (Malicious Software)
TLS Encryption
Social Engineering Attacks
Distributed
(DDOS) Attacks
Spoofing Attacks
Scanning Attacks
Bots and Botnets
Ransomware
SQL Injection
Auditing
General Security Principles
Common Security Principles Be Paranoid
You Must Have a Security Policy No System or Technique Stands
Alone
Minimize the Damage
Deploy Companywide Enforcement Provide Training
Use an Integrated Security Strategy Place Equipment According to
Needs
Identify Security Business Issues Consider Physical Security
Certification Partners, LLC - 1.800.228.1027 - 1.602.275.7700
www.CIWcertified.com -
Target Audience
The CIW Web Security Associate courseware teaches you how to secure your local and cloud network devices and communications from unauthorized activity. This course teaches you network security principles, such as establishing an effective security policy, and about the different types of cyber- attacker activities that you are most likely to encounter. Individuals with these security skills can pursue or advance careers in many aspects of online and network security.
Experience level from
•Network server administrators
•Firewall administrators
•Systems administrators
•Application developers
•IT Security Officers
IT security officers Job Responsibilities
Secure your network from unauthorized activity; implement access control lists, operating system hardening and firewall technology; personalize your network security system; ensure proper user authentication; protect network operating systems; and respond to and report hacker activity.
Prerequisites
There are no prerequisites for the Web Security Associate course. However, students should possess Internet and networking knowledge equivalent to what is presented in the CIW Web Foundations series courses. Web Security Associate builds upon this foundational knowledge to give students the skills and knowledge to manage and protect the security of online data, from a single computer to an entire corporate network.
Certification Partners, LLC - 1.800.228.1027 - 1.602.275.7700
www.CIWcertified.com