User name:
Password:
 

 

Copyright © 2006.
cisco-certificatiom.co.uk
All Rights Reserved
CIW Security 1D0-470 Series: Attack Types and Encryption
Product Code: ciws02 Time: 4.0 hour(s) CEUs: Available

Summary:

This course provides a detailed introduction to the encryption process for e-mail and other Internet applications, including the interaction of symmetric, asymmetric (public key), and hash encryption, SSL, and S-HTTP. It also provides an introduction to security attacks and how they can be prevented.

Objectives:

  • Explain the e-mail encryption process and its components
  • Explain the differences between SSL and S-HTTP
  • Use common applications to encrypt messages and files
  • List and describe the categories of security attack: brute force/dictionary, buffer overflow, Trojan, DOS/DDOS, and man in the middle
  • List methods of preventing each type of attack


Topics:

  • Applied encryption
  • Symmetric-key encryption
  • Asymmetric encryption
  • Applied packet-filtering
  • E-mail encryption applications
  • File and Web encryption applications
  • Brute force and dictionary attacks
  • System bugs, back doors, and Trojans
  • Social engineering and non-direct attacks

Technical Requirements:

P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.

Copyright � 2006 Webteks. All rights reserved.