User name:
Password:
 

 

Copyright © 2006.
cisco-certificatiom.co.uk
All Rights Reserved
CIW Security 1D0-470 Series: Auditing and Log Analysis
Product Code: ciws10 Time: 4.0 hour(s) CEUs: Available

Summary:

This course provides information on how to define a baseline of network performance for security auditing, analyze log files, create a network security assessment report, and suggest ways to improve compliance to a security policy.

Objectives:

  • Audit network activity in Windows NT/2000 and Linux
  • Use log analysis to identify suspicious network activity
  • Create a security audit report
  • Recommend steps for improving security compliance
  • Enable proactive detection of security problems
  • Configure a personal firewall
  • Use SSH for data security and authentication


Topics:

  • Log analysis
  • Firewall and router logs
  • Operating system logs
  • Filtering logs
  • Suspicious activity
  • Additional logs
  • Log auditing tools
  • Generating reports
  • Auditing recommendations
  • Creating the assessment report
  • Improving compliance
  • Improving router security
  • Enabling proactive detection
  • Host auditing solutions
  • Personal firewalls
  • Replacing and updating services
  • Secure shell

Technical Requirements:

P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.

Copyright � 2006 Webteks. All rights reserved.