Any computer user needs to know how to protect their information assets and securely connect to another system over a network.

Security5 certification attests for the working knowledge a computer user possesses to achieve better efficiency in using computing resources.

Target Audience

  • Office knowledge workers
  • Home users
  • Any non-IT person using computers in their office

Objectives

The objective of the certification is to impart essential know-how to knowledge workers and for organizations to leverage from standard security and networking practices. The knowledge base provided is of practical real-world value and does not plunge the learner into the complexity these subjects usually warrant.

This certification is an excellent complement to educational offerings in the domain of security and networking as it gives the student a hands-on exposure to the basic elements. This accelerates learning and acts as a catalyst to comprehending higher technology by the student.

Exam 112-12: Security Foundations Security5 exams are conducted online by Thomson Prometric.

Course Outline

Foundations of Security

  • Essential terminology
  • Defining security
  • Need for security
  • Cyber crime
  • Information Security statistics
  • IS triangle
  • Security myths
  • How to harden security

Basic Security Procedures

  • Why do I need to worry about my computer’s security?
  • Introduction
  • Hardening of Operating System
  • Updating the system and configuring the updates
  • Disable unnecessary services
  • Strong password creation
  • Deployment of antivirus and firewall
  • Disable guest account access
  • “Make Private” folders
  • Security settings in MS Office applications

Desktop Security

  • What is file sharing?
  • Types of file sharing
  • How to share folder?
  • Configuring shared folder permissions
  • Hiding files and folders
  • File sharing tips
  • File downloading tips
  • How to backup data and restore?
  • How to encrypt and decrypt files?
  • How to kill suspect processes?

Administering Windows Securely

  • How to use the event viewer?
  • How to enable auditing in windows?
  • How to read logs on your system?
  • How to close ports?
  • Overview of the windows registry
  • How to restore the registry?
  • How to close a port?
  • Common internal commands
  • How to find services and ports they listen on?

Recognizing Security Threats and attacks

  • Phishing and its countermeasures
  • Virus
  • Trojan Horse
  • Worms
  • Spyware
  • Adware
  • Keylogger
  • Social engineering
  • Denial of Service
  • Spamming
  • Port Scanning
  • Password cracking
  • Basic security measures

Secure Internet Access

  • Basic browser security settings
  • How to restrict site access
  • Removing site from security zone
  • Secure website detection
  • Secure site and browser properties
  • Tools: Internet Filtering Software
  • Configuring Internet content access
  • Activating Content Advisor
  • How to deal with cookies
  • Using P2P networks securely
  • Choosing appropriate browser settings
  • Wireless network security features

Working on the Internet

  • Precepts of Security
  • Knowing Encryption
  • Digital Certificate
  • Digital Signature
  • Working with e-mail (web based)
  • Working with e-mail (mail client)
  • Working with File Transfer- FTP
  • Working with File Transfer – Web Folders

Knowing Online Payment Systems

Incident Response

  • What is Incident Response?
  • Incidents and responses:
  • Trojan attack
  • Boot sector virus attack
  • Corrupted registry
  • Automatic running of CD-ROM (autorun.inf)

EquiTrain –a pision of Equinox International- equips organizations with IT skills that are the lifeblood of modern corporate life, as Theyll as the professional expertise required for ensuring productivity and to remain competitive now and tomorrow.

At EquiTrain, They tailor end-to-end training solutions that incorporate both IT and business consultancy to the specific needs of each inpidual customer. They can equip yTheir IT professionals with all they need to quickly maximize yTheir new technology investments as Theyll as pushing forward absolute beginners on their road to IT proficiency.

They offer a broad range of IT and Management training cTheirses and certifications from top technology vendors with a choice of on-site or offsite, public or closed and local or abroad training. Their portfolio of cTheirses is supplemented by Their strategic training alliance with world's leading providers of learning solutions.

See all Equitrain courses

Contact information not available.

Courses you can instantly connect with... أمن المنشأت الحيوية Future Academy

Is this the right course for you?

Rate our content

Didn't find what you were looking for ?

or