EC-Council - Security5

Varighed

Varighed:

Kun 2 dage

Metode

Metode:

Klasseværelse / Online / Hybrid

Næste dato

Næste dato:

30/9/2024 (Mandag)

Overview

The goal of this 2 day accelerated course is to teach non-technical students the basic knowledge of Computer Security and Computer Networks so that they are aware of actual hacker frauds like Identity Theft, Viruses, Trojans and Phishing.

We will arm you with knowledge that can complement the system administrator's security safeguards and the chief security officer's security architecture for the corporation.

Those holding the EC Security5 Certificate have learned how to guard their own or their companies information assets.

Our Security5 Certification Program

  • Allows you to achieve your certifications in a fraction of the time of 'traditional training' while delivering industry-leading exam passing percentages
  • Helps students grasp complex technical concepts more easily by identifying and catering to individual student learning styles through a mixed visual, auditory and kinaesthetic-tactual delivery system
  • Enhances retention by employing accelerated learning techniques focused on committing information to long-term memory

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Benefits

Having proof of your skills and knowledge gives you the edge over other candidates when applying for a job. Here are some additional benefits of earning Security|5:

  • Independent validation of achievement of a level of competency accepted and valued by the industry
  • Proven understanding of common frauds like Identity Theft, Phishing, email hoaxes, viruses and backdoors
  • Increased knowledge, leading to increased job satisfaction
  • Better career perspective with better IT knowledge
  • Proof of transferable skills and a solid credential, which make you more marketable

What Security5 Can do for Your Company

Certification provides companies with skilled employees, leading to:

  • Less security risks through better trained employees
  • Higher awareness of frauds like social engineering
  • Increased productivity as certified professionals are able to perform at accepted industry standards

Who Should Earn a Security5 Certification?

  • Office knowledge workers
  • Home users
  • Any non-IT person using computers in their office

Increase your value on the job market

  • Security5 is a globally recognized certification
  • Security5 is the ideal starting point for anyone interested in learning computer networking and security basics

Curriculum

Course Materials

Students attending this blended-learning program will receive a robust set of course materials that caters to each of the three primary individual learning-intake styles (auditory, visual, and kinaesthetic-tactual) - critical for a sucessful accelerated learning experience.

Daily lectures and review sessions are supplemented by a combination of Proprietary Lab Manual and Program Courseware - developed to address the unique demands of accelerated learners.

Course program

Foundations of Security

  • Essential terminology
  • Defining security
  • Need for security
  • Cyber crime
  • Information Security statistics
  • IS triangle
  • Security myths
  • How to harden security

Basic Security Procedures

  • Why do I need to worry about my computer's security?
  • Introduction
  • Hardening of Operating System
  • Updating the system and configuring the updates
  • Disable unnecessary services
  • Strong password creation
  • Deployment of antivirus and firewall
  • Disable guest account access
  • Make Private folders
  • Security settings in MS Office applications

Desktop Security

  • What is file sharing?
  • Types of file sharing
  • How to share folder?
  • Configuring shared folder permissions
  • Hiding files and folders
  • File sharing tips
  • File downloading tips
  • How to backup data and restore?
  • How to encrypt and decrypt files?
  • How to kill suspect processes?

Administering Windows Securely

  • How to use the event viewer?
  • How to enable auditing in windows?
  • How to read logs on your system?
  • How to close ports?
  • Overview of the windows registry
  • How to restore the registry?
  • How to close a port?
  • Common internal commands
  • How to find services and ports they listen on?

Recognizing Security Threats and attacks

  • Phishing and its countermeasures
  • Virus
  • Trojan Horse
  • Worms
  • Spyware
  • Adware
  • Keylogger
  • Social engineering
  • Denial of Service
  • Spamming
  • Port Scanning
  • Password cracking
  • Basic security measures

Secure Internet Access

  • Basic browser security settings
  • How to restrict site access
  • Removing site from security zone
  • Secure website detection
  • Secure site and browser properties
  • Tools: Internet Filtering Software
  • Configuring Internet content access
  • Activating Content Advisor
  • How to deal with cookies
  • Using P2P networks securely
  • Choosing appropriate browser settings
  • Wireless network security features

Working on the Internet

  • Precepts of Security
  • Knowing Encryption
  • Digital Certificate
  • Digital Signature
  • Working with e-mail (web based)
  • Working with e-mail (mail client)
  • Working with File Transfer - FTP
  • Working with File Transfer - Web Folders

Knowing Online Payment Systems

  • Working with Credit Cards
  • Working with Instant Messengers
  • Working across File Sharing Networks
  • Working on Dial-in Networks
  • Working with Portable Devices
  • Working with Wireless Devices
  • Working with USB devices
  • Working with Media Files
  • Working with 3rd party software

Incident Response

  • What is Incident Response?
  • Incidents and responses:
  • Trojan attack
  • Boot sector virus attack
  • Corrupted registry
  • Automatic running of CD-ROM (autorun.inf)

Exam Track

The Security5 program certifies individuals in the security discipline. To achieve the Security5 certification, candidates must pass exam 112-12 Security Foundations which will be hold on the 2nd day in the afternoon.

What's Included

EC-Council official courseware

  • EC-Council - Security5 courseware kit

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Certificeringsgaranti

Prerequisites

Students who are successful in the Security5 Certification Firebrand Training should possess basic computing skills such as browsing the web and checking e-mails.

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 89 88 66 05 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Kundereferencer

Her er Firebrand Training review afsnit. Siden 2001 har vi trænet præcist 134.561 studerende og professionelle og bedt dem alle om at gennemgå vores Accelerated Learning. Lige nu har 95,63% sagt, at Firebrand har overgået deres forventninger.

Læs anmeldelser fra de seneste accelererede kurser nedenfor, eller besøg Firebrand Stories for skriftlige og videointerviews med vores alumner.


"Any student that has no understanding of security, would really benfit from a this course and an excellent trainer who really enjoys the subject. "
S.K. (7/11/2011 (Mandag) til 8/11/2011 (Tirsdag))

"The staff at Firebrand Training were very friendly and helpful. Accommodation was excellent."
Anon.. (7/11/2011 (Mandag) til 8/11/2011 (Tirsdag))

"Course material was made enjoyable and accessible and the preparation for the exam was excellent."
N.B. (7/11/2011 (Mandag) til 8/11/2011 (Tirsdag))

"Venue and training centre are well suited for learning. The training itself was easy to follow and understand. "
Primrose Staplehurst, HMRC. (7/3/2011 (Mandag) til 8/3/2011 (Tirsdag))

"I enjoyed the training and found it all very useful both and my home and working environment. "
Anonym (7/3/2011 (Mandag) til 8/3/2011 (Tirsdag))

Kursusdatoer

Starter

Slutter

Tilgængelighed

Sted

Tilmelding

27/5/2024 (Mandag)

28/5/2024 (Tirsdag)

Afsluttet - Giv feedback

-

 

30/9/2024 (Mandag)

1/10/2024 (Tirsdag)

Venteliste

Landsdækkende

 

11/11/2024 (Mandag)

12/11/2024 (Tirsdag)

Begrænsede pladser

Landsdækkende

 

 

3/2/2025 (Mandag)

4/2/2025 (Tirsdag)

Tilgængelige pladser

Landsdækkende

 

17/3/2025 (Mandag)

18/3/2025 (Tirsdag)

Tilgængelige pladser

Landsdækkende

 

Seneste anmeldelser fra vores studerende