Certified Security Sentinel

Curso

En Miguel Hidalgo

$ 20,332.26 más IVA

*Precio estimado

Importe original en USD:

$ 1,200

Llama al centro

¿Necesitas un coach de formación?

Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.

Descripción

  • Tipología

    Curso

  • Nivel

    Nivel intermedio

  • Lugar

    Miguel hidalgo

  • Horas lectivas

    14h

  • Duración

    2 Días

  • Inicio

    Fechas disponibles

Mile2

This courseteaches general security awareness aswell as how to develop a strong security culture within your company’s
community. The Social Engineeringportion of the class is designed toteach the participants the skills usedby Social Engineers to facilitate theextraction of information from anorganization using technical and non-technical methods.

Precisiones importantes

Documentos

  • SS_Cetified_Security_Sentinel.pdf

Sedes y fechas disponibles

Ubicación

Inicio

Miguel Hidalgo (Ciudad de México (Distrito Federal))
Ver mapa
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700

Inicio

Fechas disponiblesInscripciones abiertas

Acerca de este curso

The mile2 Certified Security Sentinelprogram is innovative and trainsstudents on how attacks areperformed, the skills necessary toperform an attack, how to train peopleto identify an attack but mostimportantly: how to train internaltargets so that the training is effectiveand lasts.

Anyone
End User
Company Employee
Basic Computer User

Preguntas & Respuestas

Añade tu pregunta

Nuestros asesores y otros usuarios podrán responderte

¿Quién quieres que te responda?

Déjanos tus datos para recibir respuesta

Sólo publicaremos tu nombre y pregunta

Opiniones

Materias

  • Seguridad de redes
  • Hacking
  • Certified Security Sentinel
  • Seguridad informática
  • Aseguramiento de una computadora personal
  • Riesgos de seguridad informática
  • Robo de identidad
  • Defensa contra robo de identidad
  • Contraseñas
  • Windows Administrator Account
  • Eliminación de procesos sospechosos
  • Soluciones de protección en internet
  • Antivirus
  • Security Awareness
  • Amenazas en internet
  • Aplicaciones de seguridad

Profesores

Hector Solis

Hector Solis

Gerente de TI

Programa académico

Course Outline

· Basic Security: How to secure a computer for personal internet use

§ What are the Risks?

§ Known Risks

§ Did You Know?

§ What are the Risks?

§ Things you NEED to know!

§ The “Hacker”

§ What is Identity Theft?

§ Fighting Identity Theft

§ Practice

§ Demo

§ Don’t Panic!

· User Awareness

§ Overview

§ User Attacks

§ User Awareness

§ Passwords

§ Generating Passwords

§ Keeping Track Of Passwords

§ eWallet

§ Encryption Tools

§ Other Password Options

§ Windows Administrator Account

§ Demo

§ Windows Processes

§ Task Manager

§ Processes Tab

§ Searching Processes

§ Web Research

§ Process Information

§ Bad Processes

§ Removing Suspect Processes

§ Start-Up Tuners

§ Downloads

§ The User

§ E-Mail Links

§ Demo

· Implementing Countermeasures

§ Overview

§ Internet Protection Solutions

§ Choosing a Package

§ Free Anti-Virus & Spyware

§ Free Anti-Malware & Anti Spyware

§ Updating

§ Scheduling a Scan?

§ Demo

§ Patch Management

§ Demo

§ Internet Anonymizers

§ How They Work

§ Demo

· Essential Security Awareness for Everyone

§ Why Are You Here?

§ The Employer’s Liability

§ Steps to an Effective Security Program

§ Starting at the Top

§ Why This All Matters

§ Areas of Concern

§ What’s In This For Me?

§ Course Format

· Using the Internet at Work

§ Module Objectives

§ Why Can’t I Just Do What I Want?

§ Internet Acceptable Use Policy

§ The Internet at Work

§ Internet Basics

§ Internet Threats

§ Internet Access

§ Your Web Browser

§ ActiveX & Java

§ Media Files

§ E-Mail

§ Chat

§ Web Storage

§ Web Proxies

§ P2P

§ Spyware

§ Countermeasures

§ Demo

· Accessing the Company's Network Through Your Assigned Computer

§ Module Objectives

§ What’s a LAN?

§ Logging In

§ Installing Applications

§ OS Utilities

§ Network Drives

§ Sharing

§ Removable Storage

§ Email Attachments

§ Virus Scanner

§ Management Software

§ Monitoring

§ Demos

· Accessing the Corporate Network Remotely

§ Module Objectives

§ Work from Home

§ Your Home PC

§ From Your House to Work

§ Wireless

§ Hot Spots

§ Web Access for Email

§ Profile Management

§ VPNs

§ Demo

· Social Engineering

§ Introduction

§ What is Social Engineering?

§ Definition of Social Engineering

§ Goals of Social Engineering

§ Types of Social Engineering

§ Attacks by Phone

§ Dumpster Diving

§ On-Line Social Engineering

§ On-Line Social Engineering

§ Persuasion

§ Social Engineering Roles

§ Reverse Social Engineering

§ What We Cover

§ Examples of our labs

· Understanding and Manipulating our Target

§ Outline

§ Introduction

§ How are People Motivated?

§ Avoiding Pain

§ Pursuing Pleasure

§ Baselining

§ How to Read a Person

§ Body Movements

§ What About Over the Phone?

§ Re-Framing

§ Putting on the Right “Spin”

§ Marketing

§ Alter Perceptions of Pain or Pleasure

§ Saving-Face

§ Verbal Judo

§ Putting It All Together

§ Practice

§ Summary

· Researching Our Target

§ Outline

§ Introduction

§ Google Hacks

§ Google Hacks Continued

§ Other Research Techniques

§ Dumpster Diving

§ Email Addresses

§ Current SOPs

§ Vendor Agreements

§ Inter-Office Memos

§ Shoulder Surfing

§ Eavesdropping

Llama al centro

¿Necesitas un coach de formación?

Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.

Certified Security Sentinel

$ 20,332.26 más IVA

*Precio estimado

Importe original en USD:

$ 1,200