Mile2

Certified Security Sentinel

Sicap
En México

US$ 1,200 - ($ 24,938)
más IVA
¿Quieres hablar con un asesor sobre este curso?

Información importante

  • Curso
  • Nivel intermedio
  • México
  • 14 horas de clase
  • Duración:
    2 Días
  • Cuándo:
    A definir
Descripción

This courseteaches general security awareness aswell as how to develop a strong security culture within your company’s
community. The Social Engineeringportion of the class is designed toteach the participants the skills usedby Social Engineers to facilitate theextraction of information from anorganization using technical and non-technical methods.

Información importante Instalaciones

Dónde se imparte y en qué fechas

Inicio Ubicación
A definir
México
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700, Ciudad de México, México
Ver mapa

Preguntas Frecuentes

· ¿Cuáles son los objetivos de este curso?

The mile2 Certified Security Sentinelprogram is innovative and trainsstudents on how attacks areperformed, the skills necessary toperform an attack, how to train peopleto identify an attack but mostimportantly: how to train internaltargets so that the training is effectiveand lasts.

· ¿A quién va dirigido?

Anyone End User Company Employee Basic Computer User

Opiniones

No hay opiniones de este curso todavía

¿Qué aprendes en este curso?

Seguridad de redes
Hacking

Profesores

Hector Solis
Hector Solis
Gerente de TI

Programa académico

Course Outline

· Basic Security: How to secure a computer for personal internet use

§ What are the Risks?

§ Known Risks

§ Did You Know?

§ What are the Risks?

§ Things you NEED to know!

§ The “Hacker”

§ What is Identity Theft?

§ Fighting Identity Theft

§ Practice

§ Demo

§ Don’t Panic!

· User Awareness

§ Overview

§ User Attacks

§ User Awareness

§ Passwords

§ Generating Passwords

§ Keeping Track Of Passwords

§ eWallet

§ Encryption Tools

§ Other Password Options

§ Windows Administrator Account

§ Demo

§ Windows Processes

§ Task Manager

§ Processes Tab

§ Searching Processes

§ Web Research

§ Process Information

§ Bad Processes

§ Removing Suspect Processes

§ Start-Up Tuners

§ Downloads

§ The User

§ E-Mail Links

§ Demo

· Implementing Countermeasures

§ Overview

§ Internet Protection Solutions

§ Choosing a Package

§ Free Anti-Virus & Spyware

§ Free Anti-Malware & Anti Spyware

§ Updating

§ Scheduling a Scan?

§ Demo

§ Patch Management

§ Demo

§ Internet Anonymizers

§ How They Work

§ Demo

· Essential Security Awareness for Everyone

§ Why Are You Here?

§ The Employer’s Liability

§ Steps to an Effective Security Program

§ Starting at the Top

§ Why This All Matters

§ Areas of Concern

§ What’s In This For Me?

§ Course Format

· Using the Internet at Work

§ Module Objectives

§ Why Can’t I Just Do What I Want?

§ Internet Acceptable Use Policy

§ The Internet at Work

§ Internet Basics

§ Internet Threats

§ Internet Access

§ Your Web Browser

§ ActiveX & Java

§ Media Files

§ E-Mail

§ Chat

§ Web Storage

§ Web Proxies

§ P2P

§ Spyware

§ Countermeasures

§ Demo

· Accessing the Company's Network Through Your Assigned Computer

§ Module Objectives

§ What’s a LAN?

§ Logging In

§ Installing Applications

§ OS Utilities

§ Network Drives

§ Sharing

§ Removable Storage

§ Email Attachments

§ Virus Scanner

§ Management Software

§ Monitoring

§ Demos

· Accessing the Corporate Network Remotely

§ Module Objectives

§ Work from Home

§ Your Home PC

§ From Your House to Work

§ Wireless

§ Hot Spots

§ Web Access for Email

§ Profile Management

§ VPNs

§ Demo

· Social Engineering

§ Introduction

§ What is Social Engineering?

§ Definition of Social Engineering

§ Goals of Social Engineering

§ Types of Social Engineering

§ Attacks by Phone

§ Dumpster Diving

§ On-Line Social Engineering

§ On-Line Social Engineering

§ Persuasion

§ Social Engineering Roles

§ Reverse Social Engineering

§ What We Cover

§ Examples of our labs

· Understanding and Manipulating our Target

§ Outline

§ Introduction

§ How are People Motivated?

§ Avoiding Pain

§ Pursuing Pleasure

§ Baselining

§ How to Read a Person

§ Body Movements

§ What About Over the Phone?

§ Re-Framing

§ Putting on the Right “Spin”

§ Marketing

§ Alter Perceptions of Pain or Pleasure

§ Saving-Face

§ Verbal Judo

§ Putting It All Together

§ Practice

§ Summary

· Researching Our Target

§ Outline

§ Introduction

§ Google Hacks

§ Google Hacks Continued

§ Other Research Techniques

§ Dumpster Diving

§ Email Addresses

§ Current SOPs

§ Vendor Agreements

§ Inter-Office Memos

§ Shoulder Surfing

§ Eavesdropping


Compara este curso con otros similares
Ver más cursos similares