Categories
Technical
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Blues
Chromatin
Fixing
Curtin
Frommers
Animas
Distiller
Knot
Immortalists
Financing
PowerPoint
Novartis
Exit
Chamoiseau
votre
Frame
Plisetskaya
Stupify
Proportional
Underbelly
DEATH
Fridge
Stefan
Hajj
Dolor
Greats
设计
Hawthorn
futura
Overcome
Hellman
Programozs
Earthworm
KMFDM
Sponge
Symbol
Managers
Retargetable
Einfach
Manhunter
Jasio
Nanouk
Released
Medicine
Replies
Sally
Rozelle
Objects
Offender
SkillSoft
Newest
Audiobooks & Video Training Jean-Christophe Grange - Le Concile De Pierre
Audiobooks & Video Training Love Is the Cure On Life, Loss, and the End of AIDS by Elton John
Audiobooks & Video Training The Art of Deception by Kevin Mitnick (Repost)
Audiobooks & Video Training Priscilla Masters-The Martha Gun Mystery Series Books 1-3
Audiobooks & Video Training A Study in Scarlet - by Sir Arthur Conan Doyle
Audiobooks & Video Training High Performance Mind by Anna Wise (Repost)
Audiobooks & Video Training Jason James - How I Made 24000 In One Hour (Repost)
Audiobooks & Video Training Famous Men of Greece (Yesterday's Classics) by John H. Haaren and A. B. Poland
Audiobooks & Video Training Freefall: America, Free Markets, and the Sinking of the World Economy by Joseph E. Stiglitz
Audiobooks & Video Training Richard P. Feynman - What Do You Care What Other People Think? (Repost)
Audiobooks & Video Training The Wikipedia Revolution
Audiobooks & Video Training NIV Audio Bible Dramatized CD by Zondervan Publishing
Audiobooks & Video Training Terence McKenna - Dreaming Awake at the End of Time
Audiobooks & Video Training Terence McKenna - True Hallucinations
Audiobooks & Video Training The Psychedelic Experience: A Manual Based on The Tibetan Book of the Dead
Audiobooks & Video Training A World Out of Time (State Series, Book 1)
Audiobooks & Video Training Le premier jour de Marc Levy
Audiobooks & Video Training Barry Schwartz - Practical Wisdom - The Right Way to Do the Right Thing (Repost)
Audiobooks & Video Training The Dip: A Little Book That Teaches You When to Quit (and When to Stick) by Seth Godin
Audiobooks & Video Training How to Be Black [Audiobook]
Audiobooks & Video Training Love Is the Cure On Life, Loss, and the End of AIDS by Elton John
Audiobooks & Video Training The Art of Deception by Kevin Mitnick (Repost)
Audiobooks & Video Training Priscilla Masters-The Martha Gun Mystery Series Books 1-3
Audiobooks & Video Training A Study in Scarlet - by Sir Arthur Conan Doyle
Audiobooks & Video Training High Performance Mind by Anna Wise (Repost)
Audiobooks & Video Training Jason James - How I Made 24000 In One Hour (Repost)
Audiobooks & Video Training Famous Men of Greece (Yesterday's Classics) by John H. Haaren and A. B. Poland
Audiobooks & Video Training Freefall: America, Free Markets, and the Sinking of the World Economy by Joseph E. Stiglitz
Audiobooks & Video Training Richard P. Feynman - What Do You Care What Other People Think? (Repost)
Audiobooks & Video Training The Wikipedia Revolution
Audiobooks & Video Training NIV Audio Bible Dramatized CD by Zondervan Publishing
Audiobooks & Video Training Terence McKenna - Dreaming Awake at the End of Time
Audiobooks & Video Training Terence McKenna - True Hallucinations
Audiobooks & Video Training The Psychedelic Experience: A Manual Based on The Tibetan Book of the Dead
Audiobooks & Video Training A World Out of Time (State Series, Book 1)
Audiobooks & Video Training Le premier jour de Marc Levy
Audiobooks & Video Training Barry Schwartz - Practical Wisdom - The Right Way to Do the Right Thing (Repost)
Audiobooks & Video Training The Dip: A Little Book That Teaches You When to Quit (and When to Stick) by Seth Godin
Audiobooks & Video Training How to Be Black [Audiobook]
Useful Links
Audiobooks & Video Training EC-Council Security5 Course
Posted on 2010-09-09
|
More English | ISO | MPEG4 (H264) 640x480 | AAC 22050Hz stereo Genre: elearning Any computer user needs to know how to protect their information assets and securely connect to another system over a network. Security5 certification attests for the working knowledge a computer user possesses to achieve better efficiency in using computing resources. The certification is targeted towards today's knowledge workers who use computing resources in their daily activities. It educates them on practical aspects of security and networking to give them an advantage over common users. Description: It is the basic information Security course for the newbies. Prerequisites Basic computing skills like browsing the web and checking e-mails. Who Should Attend: * Office knowledge workers * Home users * Any non-IT person using computers in their office chedule: Please visit EC-Council’s Accredited Training Centers to find all of our upcoming classes, dates and locations. uration: 2 days (9:00 - 5:00) ertification Exam Students will be prepared for EC-Council’s Security 5 exam 112-12 on the last day of the class. Module 01: Foundations of Security * Essential terminology * Defining security * Need for security * Cyber crime * Information Security statistics * IS triangle * Security myths * How to harden security Module 02: Basic Security Procedures * Why do I need to worry about my computer’s security? * Introduction * Hardening of Operating System * Updating the system and configuring the updates * Disable unnecessary services * Strong password creation * Deployment of antivirus and firewall * Disable guest account access * “Make Private” folders * Security settings in MS Office applications Module 03: Desktop Security * What is file sharing? * Types of file sharing * How to share folder? * Configuring shared folder permissions * Hiding files and folders * File sharing tips * File downloading tips * How to backup data and restore? * How to encrypt and decrypt files? * How to kill suspect processes? Module 04: Administering Windows Securely * How to use the event viewer? * How to enable auditing in windows? * How to read logs on your system? * How to close ports? * Overview of the windows registry * How to restore the registry? * How to close a port? * Common internal commands * How to find services and ports they listen on? Module 05: Recognizing Security Threats and attacks * Phishing and its countermeasures * Virus * Trojan Horse * Worms * Spyware * Adware * Keylogger * Social engineering * Denial of Service * Spamming * Port Scanning * Password cracking * Basic security measures Module 06: Secure Internet Access * Basic browser security settings * How to restrict site access * Removing site from security zone * Secure website detection * Secure site and browser properties * Tools: Internet Filtering Software * Configuring Internet content access * Activating Content Advisor * How to deal with cookies * Using P2P networks securely * Choosing appropriate browser settings * Wireless network security features Module 07: Working on the Internet * Precepts of Security * Knowing Encryption * Digital Certificate * Digital Signature * Working with e-mail (web based) * Working with e-mail (mail client) * Working with File Transfer- FTP * Working with File Transfer – Web Folders * Knowing Online Payment Systems * Working with Credit Cards * Working with Instant Messengers * Working across File Sharing Networks * Working on Dial-in Networks * Working with Portable Devices * Working with Wireless Devices * Working with USB devices * Working with Media Files * Working with 3rd party software Module 08: Incident Response * What is Incident Response? * Incidents and responses: * Trojan attack * Boot sector virus attack * Corrupted registry * Automatic running of CD-ROM (autorun.inf) Home page: Download: OR
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
http://www.eccouncil.org/…/security5_course_outline.aspx | Alive |
Download Link Part 1 | Alive |
Download Link Part 2 | Alive |
Download Link Part 3 | Alive |
Download Link Part 4 | Alive |
Download Link Part 5 | Alive |
Download Link Part 6 | Alive |
Download Link Part 7 | Alive |
Download Link Part 1 | Alive |
Download Link Part 2 | Alive |
Download Link Part 3 | Alive |
Download Link Part 4 | Alive |
Download Link Part 5 | Alive |
Download Link Part 6 | Alive |
Download Link Part 7 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: