1D0-470 : CIW Security Analyst

Retired. This product is no longer available.

The CIW Security Analyst exam is a mandatory part of the Master CIW Administrator and CIW Grand Master Developer certifications. The 1D0-470 exam is proof of a person's competence across a spectrum of skills including implementing e-business security policies, identifying security threats, developing countermeasures using firewall systems and attack-recognition technologies, and managing the deployment of security solutions.
32 32
CIW Security Analyst

Here's what you will get

The CIW Security Analyst Certification is a standalone certification from CIW with the exam code 1D0-470.

CIW Security Analyst 1D0-470 exam is a required part of the following CIW certifications:

This 1D0-470 exam also provides credit towards the CIW Professional Certification, it is an optional exam for this certification. This exam is retired, effective June 30th, 2011. Certifications previously awarded will remain valid.

Test prep
Pre-assessment Questions
Full Length Tests
Post-Assessment Questions
Exam FAQs
What is the exam registration fee? 150
Where do I take the exam? The CIW exams are administered by Pearson VUE and Prometric at the testing centers available worldwide.
What is the format of the exam? The exam consists of Multiple Choice questions.
What are the pre-requisites of the exam?

CIW has the following pre-requisites for 1D0-470 exam:

  • Complete the CIW Certification Agreement.
  • Pass one required CIW exam
  • Submit proof of one valid networking administration certification from an approved vendor to become a CIW Security Analyst
How many questions are asked in the exam? The exam contains 60 questions.
What is the duration of the exam? 75 minutes
What is the passing score?
  • 75% Overall Score
  • 70% or better (per section)
What is the exam's retake policy?

In the event that you fail your first attempt at passing the CIW Security Analyst exam, CIW's retake policy is:

  • If a candidate fails a CIW exam on his or her first attempt, a 24-hour waiting period is required between the first and second sittings of that CIW exam.
  • Candidates who fail the second attempt at a CIW exam are required to wait for a period of no fewer than thirty calendar days from the date of the previous sitting before any third or subsequent sitting of the same CIW exam.
  • If a candidate passes a CIW exam, the candidate will not be allowed to retake that CIW exam.
What is the validity of the certification? This exam is retired and you can no longer take this exam. Click here for more information.
Where can I find more information about this exam? To know more about the 1D0-470, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?

The CIW certified person has several career opportunities open up to them, including:

  • Application developer
  • Web developer
  • Web site designer
  • Web server developer

Here's what you will learn

  • Network perimeter security and elements of an effective security policy.
  • Encryption, including the three main encryption methods used in internetworking.
  • Universal guidelines and principles for effectiv...idelines to create effective specific solutions.
  • Security principles and security attack identification.
  • Firewall types and common firewall terminology.
  • Firewall system planning including levels of protection.
  • Network firewall deployment.
  • Network security including industry security eva...delines used to determine three security levels.
  • Mechanisms used to implement security systems, t... and threats to Windows server and UNIX systems.
  • Permissions identification, assignment and usage, system defaults, and security commands.
  • System patches and fixes including application of system patches.
  • Windows server Registry modifications, including... effective security in Windows server and Linux.
  • Security auditing principles, security auditor s chief duties and network risk factor assessment.
  • Security auditing and discovery processes, audit...network-based and host-based discovery software.
  • Penetration strategies and methods, including identification of potential attacks.
  • User activities baseline, log analysis, and auditing of various activities.
  • Security policy compliance and assessment reports.
  • Operating system add-ons, including personal firewalls and native auditing.