Managing Web Security

(WGU-1D0-571) / ISBN : 978-1-61691-856-9
Lessons
Lab
TestPrep
96 Reviews
Get A Free Trial

Skills You’ll Get

The CIW Web Security Associate course covers various aspects of internet security and its principles such as how to secure your network from unauthorized activity; establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter.

1

Welcome to Managing Web Security

  • Learning Resources
  • Pacing Guide
2

What Is Security?

  • Network Security Background
  • What Is Security?
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • What You Are Trying to Protect
  • Who Is the Threat?
  • Security Standards
  • Lesson Summary
3

Elements of Security

  • Security Elements and Mechanisms
  • The Security Policy
  • Determining Backups
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks
  • Lesson Summary
4

Applied Encryption

  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric-Key Encryption
  • One-Way (Hash) Encryption
  • Applied Encryption Processes
  • Encryption Review
  • Lesson Summary
5

Types of Attacks

  • Network Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Malware (Malicious Software)
  • Social Engineering Attacks
  • Denial-of-Service (DOS) Attacks
  • Distributed Denial-of-Service (DDOS) Attacks
  • Spoofing Attacks
  • Scanning Attacks
  • Man-in-the-Middle Attacks
  • Bots and Botnets
  • SQL Injection
  • Auditing
  • Lesson Summary
6

Recent Networking Vulnerability Considerations

  • Networking Vulnerability Considerations
  • Wireless Network Technologies and Security
  • IEEE 802.11 Wireless Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Wireless Network Security Problems
  • Wireless Network Security Solutions
  • Site Surveys
  • Convergence Networking and Security
  • Web 2.0 Technologies
  • Greynet Applications
  • Vulnerabilities with Data at Rest
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking
  • Lesson Summary
7

General Security Principles

  • Common Security Principles
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security
  • Lesson Summary
8

Protocol Layers and Security

  • TCP/IP Security Introduction
  • OSI Reference Model Review
  • Data Encapsulation
  • The TCP/IP Stack and the OSI Reference Model
  • Link/Network Access Layer
  • Network/Internet Layer
  • Transport Layer
  • Application Layer
  • Protocol Analyzers
  • Lesson Summary
9

Securing Resources

  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security and Repetition
  • Lesson Summary
10

Firewalls and Virtual Private Networks

  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and Disadvantages
  • Configuring Proxy Servers
  • URL Filtering
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)
  • Lesson Summary
11

Levels of Firewall Protection

  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together
  • Lesson Summary
12

Detecting and Distracting Hackers

  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker
  • Lesson Summary
13

Incident Response

  • Creating an Incident Response Policy
  • Determining If an Attack Has Occurred
  • Executing the Response Plan
  • Analyzing and Learning
  • Lesson Summary
A

Appendix A: Web Security Associate Objectives and Locations

B

Appendix B: Internet Security Resources

  • General
  • UNIX
  • Windows Server 2003
C

Appendix C: Commercial Products Used in This Course

  • Microsoft Windows Server 2003
  • Ubuntu Linux
D

Appendix D: Works Consulted

1

What Is Security?

  • Causing a Darkcomet trojan infection
2

Elements of Security

  • Viewing and modifying default access control settings
  • Viewing the effects of hostile JavaScript in Browser
  • Configuring execution control lists in Windows Server 2016
  • Creating an execution control list for the su command in Linux
  • Creating an access control list for Apache Server  
3

Applied Encryption

  • Encrypting File with AES Algorithm
  • Installing GPG4win on Windows Server 2016
  • Generating a keypair using Kleopatra
  • Exporting and Importing public keys using Kleopatra
  • Encrypting and Decrypting messages using Kleopatra
  • Using MD5sum to create checksums in Ubuntu Linux
  • Generating a key pair using GPG for Ubuntu Linux
  • Signing the shared public keys in Linux
  • Encrypting and decrypting files using GPG
  • Creating a signature file
  • Signing files with GPG
4

Types of Attacks

  • Using John the Ripper in Windows Server 2016
  • Conducting a virus scan in Windows to help thwart attacks
  • Analyzing a SYN flood in a packet sniffer
  • Identifying network-based attacks
  • Using Nmap to scan a system in Windows Server 2016
  • Analyzing a SYN flood using Linux and Windows Server 2016
  • Identifying and analyzing Land and Teardrop attacks
  • Analyzing a Smurf attack
5

Recent Networking Vulnerability Considerations

  • Installing a war-driving application and analyzing a site survey capture
  • Analyzing traffic captured from site survey software
6

General Security Principles

  • Increasing physical security using the Syskey utility
7

Protocol Layers and Security

  • Examining a packet capture in Wireshark
8

Securing Resources

  • Securing an Apache Web server
  • Securing the FTP service
  • Scanning systems in Ubuntu Linux
9

Firewalls and Virtual Private Networks

  • Using the iptables command to create a personal firewall in Linux
10

Detecting and Distracting Hackers

  • Setting a logon tripwire script in Windows Server 2016
  • Using Tripwire for Linux

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

The exam contains 62 questions.

90 minutes

76%

Managing Web Security

$249.00

Buy Now

Related Courses

All Courses
scroll to top