Fundamentos de Seguridad Informatica
Curso
En México
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
Descripción
-
Tipología
Curso
-
Lugar
México
-
Horas lectivas
32h
Objetivo del curso: Dar los fundamentos de Seguridad Informática. Y aplicar el examen de certificación. Destinatarios del curso: Estudiante Universitario Profesional en Tecnologías de la Información (tanto del área de infraestructura como desarrollo) y no tienes experiencia en seguridad informática.
Sedes y fechas disponibles
Ubicación
Inicio
Inicio
Acerca de este curso
Conocimientos básicos de computo
Opiniones
Programa académico
CONTENIDO:
Module 01: Information Security Fundamentals
§ Internet Security Threat Report
§ Malicious Activity by Country
§ Data Breaches Caused due to Identity Theft
§ Information Security
§ Need for Security
§ The Security, Functionality, and Ease of Use Triangle
§ Elements of Security
§ Common Terminologies
§ Trends in Security
§ 20-Year Trend: Stronger Attack Tools
§ Statistics Related to Security
§ Attack on Social Network Sites for Identity Theft
§ Information Security Laws and Regulations
Module 02: Addressing Threats
§ What is a Threat
§ Monthly Malware Statistics: April 2009
§ Monthly Malware Statistics: March 2009
§ Monthly Malware Statistics: February 2009
§ Monthly Malware Statistics: January 2009
§ Monthly Malware Statistics: December 2008
§ Knowing Terms: Vulnerability, Exploit
§ Internal Threat
§ Sniffing
§ External Threat
§ Types of External Threats
§ Social Engineering
§ Denial of Service Attack (DoS)
§ Distributed Denial of Service Attack (DDoS)
§ Virus and Worm
§ Trojan and Rootkit
§ Corporate Espionage
§ Accidental Security Breach
§ Automated Computer Attack
§ Countermeasures
§ Vulnerabilities in Windows
Module 03: Backdoors, Virus, and Worms
§ Introduction to Virus
§ Worms
§ Backdoors
§ What is a Trojan
§ Working of Trojans
§ Overt and Covert Channels
§ How is a Worm Different from a Virus
§ Virus History
§ Stages of Virus Life
§ Modes of Virus Infection
§ Indications of a Virus Attack
§ Underground Writers
§ Prevention is Better than Cure
§ Anti-Virus Software
§ Popular Anti-Virus Packages
§ Top 10 Viruses - 2009
Module 04: Introduction to the Linux Operating System
§ Why Linux
§ Linux Basics
§ Why Do Hackers Use Linux
§ Why is Linux Hacked
§ How to Apply Patches to Vulnerable Programs
§ Linux Rootkits
o Linux Rootkit: Knark
o Linux Rootkit: Adore
o Linux Rootkit: Ramen
o Linux Rootkit: Beastkit
o Linux Rootkit: phalanx2
§ Rootkit Countermeasures
Module 05: Password Cracking
§ Authentication - Definition
§ Microsoft Passport Authentication
§ What is a Password Cracker
§ Modus Operandi of an Attacker Using Password Cracker
§ How Does A Password Cracker Work
§ Attacks - Classification
§ Password Guessing
§ Dictionary Maker
§ John The Ripper
§ Brutus
§ Passwords: Dos
§ Passwords: Don’ts
§ Password Generators
Module 06: Cryptography
§ Basics of Cryptography
§ Public-key Cryptography
§ Working of Encryption
§ Digital Signature
§ SSH
§ RSA (Rivest Shamir Adleman)
§ Example of RSA algorithm
§ RSA Attacks
§ RSA Challenge
§ MD5
§ SHA (Secure Hash Algorithm)
§ Code Breaking: Methodologies
§ Disk Encryption
§ Role of Cryptography in Data Security
Module 07: Web Servers and Web Applications
§ Active Servers Across All Domains
§ Top Web Server Developers
§ Web Servers
§ How Web Servers Work
§ How are Web Servers Compromised
§ Popular Web Servers
§ IIS Components
§ IIS Vulnerabilities
§ IIS Vulnerabilities Detection: Tools
§ Apache Vulnerability
§ Web Server Security Measures
§ Web Application
§ Web Application Set Up
§ Web Application Threats
Module 08: Wireless Networks
§ Introduction to Wireless Networking
§ Business and Wireless Attacks
§ Wireless Standards
§ Components of Wireless Network
§ Types of Wireless Network
§ Setting up WLAN
§ Detecting a Wireless Network
§ How to Access a WLAN
§ Advantages and Disadvantages of a Wireless Network
§ Antennas
§ SSID
§ Access Point Positioning
§ Rogue Access Points
§ Techniques to Detect Open Wireless Networks
§ Netstumbler Tool
§ MiniStumbler Tool
§ Kismet Tool
Module 09: Intrusion Detection System
§ Intrusion Detection Systems (IDS)
§ Types of Intrusion Detection System
§ Ways to Detect an Intrusion
§ System Integrity Verifiers (SIV)
§ Intrusion Detection Tools
o Snort
o IDS Testing Tool: Traffic IQ Professional
§ IDS Software Vendors
Module 10: Firewalls and Honeypots
§ Introduction
§ Terminology
§ What is a Firewall
§ Firewall Identification
§ Firewalking
§ Banner Grabbing
§ Placing Backdoors through Firewalls
§ What is an Honeypot
§ The Honeynet Project
§ Types of Honeypots
§ Advantages and Disadvantages of an Honeypot
§ Where to Place Honeypot
§ Honeypots
o Honeypot - KFSensor
o Honeypot-SPECTER
§ What to Do When Hacked
Module 11: Hacking Cycle
§ Stages of Hacking Cycle
o Phase 1 - Reconnaissance
o Phase 2 - Scanning
o Phase 3 - Gaining Access
o Phase 4 - Maintaining Access
o Phase 5 - Covering Tracks
§ Computer Crimes and Implications
§ Legal Perspective (US Federal Law)
Module 12: Introduction to Ethical Hacking
§ Attacks Carried out Using Hacked PC
§ Hacker Classes
§ Hacktivism
§ What do Ethical Hackers do
§ Profile of an Ethical Hacker
§ How do They Go About It
§ Penetration Testing vis-à-vis Ethical Hacking
§ Modes of Ethical Hacking
§ Security Testing
§ General Prevention
§ Computer Crimes and Security Survey
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
Fundamentos de Seguridad Informatica