Certified Security Sentinel

En Miguel Hidalgo

$ 23,000
más IVA
*Precio Orientativo
Importe original en USD:
US$ 1,200
¿Quieres hablar con un Asesor sobre este curso?

Información importante

Tipología Curso
Nivel Nivel intermedio
Lugar Miguel hidalgo
Horas lectivas 14h
Duración 2 Días
Inicio Fechas a escoger
  • Curso
  • Nivel intermedio
  • Miguel hidalgo
  • 14h
  • Duración:
    2 Días
  • Inicio:
    Fechas a escoger

This courseteaches general security awareness aswell as how to develop a strong security culture within your company’s
community. The Social Engineeringportion of the class is designed toteach the participants the skills usedby Social Engineers to facilitate theextraction of information from anorganization using technical and non-technical methods.

Información importante Instalaciones

Dónde se imparte y en qué fechas

Inicio Ubicación
Fechas a escoger
Miguel Hidalgo
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700, Ciudad de México (Distrito Federal), México
Ver mapa
Inicio Fechas a escoger
Miguel Hidalgo
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700, Ciudad de México (Distrito Federal), México
Ver mapa

Preguntas Frecuentes

· ¿Cuáles son los objetivos de este curso?

The mile2 Certified Security Sentinelprogram is innovative and trainsstudents on how attacks areperformed, the skills necessary toperform an attack, how to train peopleto identify an attack but mostimportantly: how to train internaltargets so that the training is effectiveand lasts.

· ¿A quién va dirigido?

Anyone End User Company Employee Basic Computer User


No hay opiniones de este curso todavía

¿Qué aprendes en este curso?

Seguridad de redes
Certified Security Sentinel
Seguridad informática
Aseguramiento de una computadora personal
Riesgos de seguridad informática
Robo de identidad
Defensa contra robo de identidad
Windows Administrator Account
Eliminación de procesos sospechosos
Soluciones de protección en internet
Security Awareness
Amenazas en internet
Aplicaciones de seguridad


Hector Solis
Hector Solis
Gerente de TI

Programa académico

Course Outline

· Basic Security: How to secure a computer for personal internet use

§ What are the Risks?

§ Known Risks

§ Did You Know?

§ What are the Risks?

§ Things you NEED to know!

§ The “Hacker”

§ What is Identity Theft?

§ Fighting Identity Theft

§ Practice

§ Demo

§ Don’t Panic!

· User Awareness

§ Overview

§ User Attacks

§ User Awareness

§ Passwords

§ Generating Passwords

§ Keeping Track Of Passwords

§ eWallet

§ Encryption Tools

§ Other Password Options

§ Windows Administrator Account

§ Demo

§ Windows Processes

§ Task Manager

§ Processes Tab

§ Searching Processes

§ Web Research

§ Process Information

§ Bad Processes

§ Removing Suspect Processes

§ Start-Up Tuners

§ Downloads

§ The User

§ E-Mail Links

§ Demo

· Implementing Countermeasures

§ Overview

§ Internet Protection Solutions

§ Choosing a Package

§ Free Anti-Virus & Spyware

§ Free Anti-Malware & Anti Spyware

§ Updating

§ Scheduling a Scan?

§ Demo

§ Patch Management

§ Demo

§ Internet Anonymizers

§ How They Work

§ Demo

· Essential Security Awareness for Everyone

§ Why Are You Here?

§ The Employer’s Liability

§ Steps to an Effective Security Program

§ Starting at the Top

§ Why This All Matters

§ Areas of Concern

§ What’s In This For Me?

§ Course Format

· Using the Internet at Work

§ Module Objectives

§ Why Can’t I Just Do What I Want?

§ Internet Acceptable Use Policy

§ The Internet at Work

§ Internet Basics

§ Internet Threats

§ Internet Access

§ Your Web Browser

§ ActiveX & Java

§ Media Files

§ E-Mail

§ Chat

§ Web Storage

§ Web Proxies

§ P2P

§ Spyware

§ Countermeasures

§ Demo

· Accessing the Company's Network Through Your Assigned Computer

§ Module Objectives

§ What’s a LAN?

§ Logging In

§ Installing Applications

§ OS Utilities

§ Network Drives

§ Sharing

§ Removable Storage

§ Email Attachments

§ Virus Scanner

§ Management Software

§ Monitoring

§ Demos

· Accessing the Corporate Network Remotely

§ Module Objectives

§ Work from Home

§ Your Home PC

§ From Your House to Work

§ Wireless

§ Hot Spots

§ Web Access for Email

§ Profile Management

§ VPNs

§ Demo

· Social Engineering

§ Introduction

§ What is Social Engineering?

§ Definition of Social Engineering

§ Goals of Social Engineering

§ Types of Social Engineering

§ Attacks by Phone

§ Dumpster Diving

§ On-Line Social Engineering

§ On-Line Social Engineering

§ Persuasion

§ Social Engineering Roles

§ Reverse Social Engineering

§ What We Cover

§ Examples of our labs

· Understanding and Manipulating our Target

§ Outline

§ Introduction

§ How are People Motivated?

§ Avoiding Pain

§ Pursuing Pleasure

§ Baselining

§ How to Read a Person

§ Body Movements

§ What About Over the Phone?

§ Re-Framing

§ Putting on the Right “Spin”

§ Marketing

§ Alter Perceptions of Pain or Pleasure

§ Saving-Face

§ Verbal Judo

§ Putting It All Together

§ Practice

§ Summary

· Researching Our Target

§ Outline

§ Introduction

§ Google Hacks

§ Google Hacks Continued

§ Other Research Techniques

§ Dumpster Diving

§ Email Addresses

§ Current SOPs

§ Vendor Agreements

§ Inter-Office Memos

§ Shoulder Surfing

§ Eavesdropping

Los usuarios que se interesaron por este curso también han mostrado interés por...
Ver más cursos similares