Fundamentos de Seguridad Informatica

Aplicaciones Totales en Línea. Atl
En México

$ 7,000
IVA inc.
¿Quieres hablar con un asesor sobre este curso?
Compara este curso con otros similares
Ver más cursos similares

Información importante

  • Curso
  • México
  • 32 horas de clase
Descripción

Objetivo del curso: Dar los fundamentos de Seguridad Informática. Y aplicar el examen de certificación. Destinatarios del curso: Estudiante Universitario Profesional en Tecnologías de la Información (tanto del área de infraestructura como desarrollo) y no tienes experiencia en seguridad informática.

Información importante
Instalaciones

Dónde se imparte y en qué fechas

Inicio Ubicación
Consultar
México
Medellin No. 8 Piso 4 Esquina Chapultepec, Col. Roma Del. Cuauhtemoc Mexico D.F., 06700, Ciudad de México, México
Ver mapa

Preguntas Frecuentes

· Requisitos

Conocimientos básicos de computo

Opiniones

No hay opiniones de este curso todavía

Programa académico

CONTENIDO:

Module 01: Information Security Fundamentals

§ Internet Security Threat Report

§ Malicious Activity by Country

§ Data Breaches Caused due to Identity Theft

§ Information Security

§ Need for Security

§ The Security, Functionality, and Ease of Use Triangle

§ Elements of Security

§ Common Terminologies

§ Trends in Security

§ 20-Year Trend: Stronger Attack Tools

§ Statistics Related to Security

§ Attack on Social Network Sites for Identity Theft

§ Information Security Laws and Regulations

Module 02: Addressing Threats

§ What is a Threat

§ Monthly Malware Statistics: April 2009

§ Monthly Malware Statistics: March 2009

§ Monthly Malware Statistics: February 2009

§ Monthly Malware Statistics: January 2009

§ Monthly Malware Statistics: December 2008

§ Knowing Terms: Vulnerability, Exploit

§ Internal Threat

§ Sniffing

§ External Threat

§ Types of External Threats

§ Social Engineering

§ Denial of Service Attack (DoS)

§ Distributed Denial of Service Attack (DDoS)

§ Virus and Worm

§ Trojan and Rootkit

§ Corporate Espionage

§ Accidental Security Breach

§ Automated Computer Attack

§ Countermeasures

§ Vulnerabilities in Windows

Module 03: Backdoors, Virus, and Worms

§ Introduction to Virus

§ Worms

§ Backdoors

§ What is a Trojan

§ Working of Trojans

§ Overt and Covert Channels

§ How is a Worm Different from a Virus

§ Virus History

§ Stages of Virus Life

§ Modes of Virus Infection

§ Indications of a Virus Attack

§ Underground Writers

§ Prevention is Better than Cure

§ Anti-Virus Software

§ Popular Anti-Virus Packages

§ Top 10 Viruses - 2009

Module 04: Introduction to the Linux Operating System

§ Why Linux

§ Linux Basics

§ Why Do Hackers Use Linux

§ Why is Linux Hacked

§ How to Apply Patches to Vulnerable Programs

§ Linux Rootkits

o Linux Rootkit: Knark

o Linux Rootkit: Adore

o Linux Rootkit: Ramen

o Linux Rootkit: Beastkit

o Linux Rootkit: phalanx2

§ Rootkit Countermeasures

Module 05: Password Cracking

§ Authentication - Definition

§ Microsoft Passport Authentication

§ What is a Password Cracker

§ Modus Operandi of an Attacker Using Password Cracker

§ How Does A Password Cracker Work

§ Attacks - Classification

§ Password Guessing

§ Dictionary Maker

§ John The Ripper

§ Brutus

§ Passwords: Dos

§ Passwords: Don’ts

§ Password Generators

Module 06: Cryptography

§ Basics of Cryptography

§ Public-key Cryptography

§ Working of Encryption

§ Digital Signature

§ SSH

§ RSA (Rivest Shamir Adleman)

§ Example of RSA algorithm

§ RSA Attacks

§ RSA Challenge

§ MD5

§ SHA (Secure Hash Algorithm)

§ Code Breaking: Methodologies

§ Disk Encryption

§ Role of Cryptography in Data Security

Module 07: Web Servers and Web Applications

§ Active Servers Across All Domains

§ Top Web Server Developers

§ Web Servers

§ How Web Servers Work

§ How are Web Servers Compromised

§ Popular Web Servers

§ IIS Components

§ IIS Vulnerabilities

§ IIS Vulnerabilities Detection: Tools

§ Apache Vulnerability

§ Web Server Security Measures

§ Web Application

§ Web Application Set Up

§ Web Application Threats

Module 08: Wireless Networks

§ Introduction to Wireless Networking

§ Business and Wireless Attacks

§ Wireless Standards

§ Components of Wireless Network

§ Types of Wireless Network

§ Setting up WLAN

§ Detecting a Wireless Network

§ How to Access a WLAN

§ Advantages and Disadvantages of a Wireless Network

§ Antennas

§ SSID

§ Access Point Positioning

§ Rogue Access Points

§ Techniques to Detect Open Wireless Networks

§ Netstumbler Tool

§ MiniStumbler Tool

§ Kismet Tool

Module 09: Intrusion Detection System

§ Intrusion Detection Systems (IDS)

§ Types of Intrusion Detection System

§ Ways to Detect an Intrusion

§ System Integrity Verifiers (SIV)

§ Intrusion Detection Tools

o Snort

o IDS Testing Tool: Traffic IQ Professional

§ IDS Software Vendors

Module 10: Firewalls and Honeypots

§ Introduction

§ Terminology

§ What is a Firewall

§ Firewall Identification

§ Firewalking

§ Banner Grabbing

§ Placing Backdoors through Firewalls

§ What is an Honeypot

§ The Honeynet Project

§ Types of Honeypots

§ Advantages and Disadvantages of an Honeypot

§ Where to Place Honeypot

§ Honeypots

o Honeypot - KFSensor

o Honeypot-SPECTER

§ What to Do When Hacked

Module 11: Hacking Cycle

§ Stages of Hacking Cycle

o Phase 1 - Reconnaissance

o Phase 2 - Scanning

o Phase 3 - Gaining Access

o Phase 4 - Maintaining Access

o Phase 5 - Covering Tracks

§ Computer Crimes and Implications

§ Legal Perspective (US Federal Law)

Module 12: Introduction to Ethical Hacking

§ Attacks Carried out Using Hacked PC

§ Hacker Classes

§ Hacktivism

§ What do Ethical Hackers do

§ Profile of an Ethical Hacker

§ How do They Go About It

§ Penetration Testing vis-à-vis Ethical Hacking

§ Modes of Ethical Hacking

§ Security Testing

§ General Prevention

§ Computer Crimes and Security Survey


Compara este curso con otros similares
Ver más cursos similares