1D0-571 : CIW: Web Security Associate

1D0-571
CIW: Web Security Associate
ISBN : 978-1-61691-663-3
Gain hands-on expertise in CIW Web Security Associate certification: 1D0-571 exam by CIW Web Security Associate course. CIW Web Security Associate certification is a vendor neutral, entry-level credential designed for IT professionals to validate their skills and competence required in preventing and managing hacker penetration; authentication procedures, encryption standards and implementations; ports and protocols that hackers manipulate; proactive detection and response/reporting methods; and corporate network security policies.

Here's what you will get

The CIW Web Security Associate course covers various aspects of internet security and its principles such as how to secure your network from unauthorized activity; establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter.

Lessons
16+
Exercises
231+
Flashcards
86+
Glossary of terms
86+
Pre-assessment Questions
62+
Full Length Tests
2+
Post-Assessment Questions
107+
live lab
35+
Exam FAQs
How many questions are asked in the exam? The exam contains 62 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 76%
What are the career opportunities after passing this exam?
  • Network server administrators
  • Firewall administrators
  • Systems administrators
  • Application developers
  • IT security officers

Here's what you will learn

  • Network Security Background
  • What Is Security?
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • What You Are Trying to Protect
  • Who Is the Threat?
  • Security Standards
  • Lesson Summary
  • Security Elements and Mechanisms
  • The Security Policy
  • Determining Backups
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks
  • Lesson Summary
  • Optional lab
  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric-Key Encryption
  • One-Way (Hash) Encryption
  • Applied Encryption Processes
  • Encryption Review
  • Lesson Summary
  • Optional Lab
  • Network Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Malware (Malicious Software)
  • Social Engineering Attacks
  • Denial-of-Service (DOS) Attacks
  • Distributed Denial-of-Service (DDOS) Attacks
  • Spoofing Attacks
  • Scanning Attacks
  • Man-in-the-Middle Attacks
  • Bots and Botnets
  • SQL Injection
  • Auditing
  • Lesson Summary
  • Optional Lab
  • Networking Vulnerability Considerations
  • Wireless Network Technologies and Security
  • IEEE 802.11 Wireless Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Wireless Network Security Problems
  • Wireless Network Security Solutions
  • Site Surveys
  • Convergence Networking and Security
  • Web 2.0 Technologies
  • Greynet Applications
  • Vulnerabilities with Data at Rest
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking
  • Lesson Summary
  • Optional Lab
  • Common Security Principles
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security
  • Lesson Summary
  • Optional lab
  • TCP/IP Security Introduction
  • OSI Reference Model Review
  • Data Encapsulation
  • The TCP/IP Stack and the OSI Reference Model
  • Link/Network Access Layer
  • Network/Internet Layer
  • Transport Layer
  • Application Layer
  • Protocol Analyzers
  • Lesson Summary
  • Optional Lab
  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security and Repetition
  • Lesson Summary
  • Optional Lab
  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and Disadvantages
  • Configuring Proxy Servers
  • URL Filtering
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)
  • Lesson Summary
  • Optional Lab
  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together
  • Lesson Summary
  • Optional Lab
  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker
  • Lesson Summary
  • Creating an Incident Response Policy
  • Determining If an Attack Has Occurred
  • Executing the Response Plan
  • Analyzing and Learning
  • Lesson Summary
  • Microsoft Windows Server 2003
  • Ubuntu Linux

Hands on Activities (Live Labs)

uCertify

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved
app_store
google_play