-
- MCITP: Server Administrator on Server 2008
- MCSA
- MCSE
- MCPD
-
- Bookkeeping and Pastel Accounting
- Receptionist
- Data Capturer
- Office Administrator
- Call Centre Agent (Non Aligned)
- Customer Service Consultant
- Executive Secretary
- Executive Secretary - Marketing and Sales
- Personal Assistant (PA)
- Office Administrator
- Business & Project Management
Security 5
EC-Council's Security 5 certification training course from Study IT Online is the entry-level certification for professionals interested in learning computer security basics and networking. Security5 stands for the five components of IT Security: Firewalls, Anti-Virus, IDS, Networking and Web Security. With this course, students will learn the basic networking and security skills and to begin high-end IT programs.
Study IT Online's Security5 training course teaches today's knowledge workers the ‘Alphabet Soup of Security’ so that students can distinguish between the legitimate and malevolent and guard their information assets. Identity theft, credit card fraud, online banking Phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information and hackers are some of the threats you will face on a daily basis. Study IT Online's Security5 training will prepare you to face them and defend yourself.
Study IT Online is an EC-Council Authorized Training Provider for online training, ensuring our course follows the approved curriculum and you receive the training and knowledge needed to succeed. Study IT Online is so certain this class meets and exceeds the exam objectives, we guarantee you will pass your exam!
Learning segments
EC-Council Security5
Module 01: Foundations of Security
- Essential terminology
- Defining security
- Need for security
- Cyber crime
- Information Security statistics
- IS triangle
- Security myths
- How to Harden Security
Module 02: Basic Security Procedures
- Why do I need to worry about my computer’s security?
- Hardening of Operating System
- Updating the system and configuring the updates
- Disable unnecessary services
- Strong password creation
- Deployment of anti virus and firewall
- Disable guest account access
- “Make Private” folders
- Security settings in MS Office applications
- Desktop Security
Module 03: File Sharing
- Types of file sharing
- How to share folders
- Configuring shared folder permissions
- Hiding files and folders
- File sharing tips
- File downloading tips
- How to backup data and restore
- How to encrypt and decrypt files
- How to kill suspect processes
Module 04: Administering Windows Securely
- How to use the event viewer
- How to enable auditing in windows
- How to read logs on your system
- How to close ports
- How to restore the registry
- How to close a port
- Common internal commands
- How to find services and ports they listen on
Module 05: Recognizing Security Threats and Attacks
- Phishing and its countermeasures
- Virus
- Worms
- Spyware
- Adware
- Keylogger
- Social engineering
- Denial of Service
- Spamming
- Port Scanning
- Password cracking
- Basic security measures
Module 06: Secure Internet Access
- Basic browser security settings
- How to restrict site access
- Removing site from security zone
- Secure website detection
- Secure site and browser properties
- Tools: Internet Filtering Software
- Configuring Internet content access
- Activating Content Advisor
- How to deal with cookies
- Using P2P networks securely
- Choosing appropriate browser settings
- Wireless network security features
Module 07: Working on the Internet
- Precepts of Security
- Knowing Encryption
- Digital Certificate
- Digital Signature
- Working with e-mail (web based)
- Working with e-mail (mail client)
- Working with File Transfer- FTP
- Working with File Transfer – Web Folders
Module 08: Online Payment Systems
- Working with Credit Cards
- Working with Instant Messengers
- Working across File Sharing Networks
- Working on Dial-in Networks
- Working with Portable Devices
- Working with Wireless Devices
- Working with USB devices
- Working with Media Files
- Working with 3rd party software
Module 09: Incident Response
- What is Incident Response?
- Incidents and responses:
- Trojan attack
- Boot sector virus attack
- Corrupted registry
- Automatic running of CD-ROM (autorun.inf)
NB :
- Our price does NOT include any exam vouchers.
- Qualification exams are held and managed by independent third parties.
- Vouchers will need to be purchased separately when you are ready.
- We sell vouchers at cost to all our students.
For More Information Email us at info@studyitonline.co.za
