Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on 877-SOLARTECH
  • My Account
Solartech

CSS - Security Sentinal

$1,000.00

CSS - Security Sentinal

$1,000.00
Quantity:
Share

Product Description

Course Overview

The Certified Security Sentinel certification 2 day course is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and countermeasures associated with these attacks. The weakest link in any companies' security program is a poorly trained employee. Don’t let this be you. Once a student understands what can happen, they will know what to look for. And with that understanding, be able to keep the information they have been entrusted with as safe as possible.

The social engineering portion of the class is designed to teach the participants the skills used by social engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking, and cyber-terrorism are all phrases that describe crimes that use over-the-wire technology to attack, steal, and terrorize their victims. The key to most of these over-the-wire attacks being successful is information they receive through social engineering. Does it work? Can smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering: “I was so successful with that attack that I rarely had to resort to a technical attack.” If you're afraid of having your identity, credit card credentials, or business information compromised, then this is the training you have been looking for.

The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure information. One of the most valuable skill sets of a C)SS is that they understand how to train others on security as well.

Upon Completion

Students will:

  • Understand security best practices on how to keep information secure
  • Have knowledge to identify a security breach
  • Be ready to sit forthe C)SS exam

Who Should Attend

  • Employees who need to learn the basics of security.

COURSE CONTENT

Module 1 – Basic Computer Security 

  • What are the Risks?
  • Known Risks
  • Did You Know?
  • What are the Risks?
  • Things you NEED to know!
  • The “Hacker”
  • What is Identity Theft?
  • Fighting Identity Theft
  • Practice
  • Demo
  • Don’t Panic!

Module 2 - User Awareness

  • Overview
  • User Attacks
  • User Awareness
  • Passwords
  • Generating Passwords
  • Keeping Track Of Passwords
  • eWallet
  • Encryption Tools
  • Other Password Options
  • Windows Administrator Account
  • Demo
  • Windows Processes
  • Task Manager
  • Processes Tab
  • Searching Processes
  • Web Research
  • Process Information
  • Bad Processes
  • Removing Suspect Processes
  • Start-Up Tuners
  • Downloads
  • The User
  • E-Mail Links
  • Demo

Module 3 - Implementing Countermeasures

  • Overview
  • Internet Protection Solutions
  • Choosing a Package
  • Free Anti-Virus & Spyware
  • Free Anti-Malware & Anti Spyware
  • Updating
  • Scheduling a Scan?
  • Demo
  • Patch Management
  • Demo
  • Internet Anonymizers
  • How They Work
  • Demo

Module 4 - Essential Security Awareness

  • Why Are You Here?
  • The Employer’s Liability
  • Steps to an Effective Security Program
  • Starting at the Top
  • Why This All Matters
  • Areas of Concern
  • What’s In This For Me?
  • Course Format

Module 5 - Using the Internet at Work

  • Module Objectives
  • Why Can’t I Just Do What I Want?
  • Internet Acceptable Use Policy
  • The Internet at Work
  • Internet Basics
  • Internet Threats
  • Internet Access
  • Your Web Browser
  • ActiveX & Java
  • Media Files
  • E-Mail
  • Chat
  • Web Storage
  • Web Proxies
  • P2P
  • Spyware
  • Countermeasures
  • Demo

Module 6 - Accessing the Network Locally

  • Module Objectives
  • What’s a LAN?
  • Logging In
  • Installing Applications
  • OS Utilities
  • Network Drives
  • Sharing
  • Removable Storage
  • Email Attachments
  • Virus Scanner
  • Management Software
  • Monitoring
  • Demos

Module 7 - Accessing the Network Remotely

  • Module Objectives
  • Work from Home
  • Your Home PC
  • From Your House to Work
  • Wireless
  • Hot Spots
  • Web Access for Email
  • Profile Management
  • VPNs
  • Demo

Module 8 - Social Engineering

  • Introduction
  • What is Social Engineering?
  • Definition of Social Engineering
  • Goals of Social Engineering
  • Types of Social Engineering
  • Attacks by Phone
  • Dumpster Diving
  • On-Line Social Engineering
  • On-Line Social Engineering
  • Persuasion
  • Social Engineering Roles
  • Reverse Social Engineering
  • What We Cover
  • Examples of our labs

Module 9 - Understanding and Interacting with our Target

  • Outline
  • Introduction
  • How are People Motivated?
  • Avoiding Pain
  • Pursuing Pleasure
  • Baselining
  • How to Read a Person
  • Body Movements
  • What About Over the Phone?
  • Re-Framing
  • Putting on the Right “Spin”
  • Marketing
  • Alter Perceptions of Pain or Pleasure
  • Saving-Face
  • Verbal Judo
  • Putting It All Together
  • Practice
  • Summary

Module 10 - Researching Our Target

  • Outline
  • Introduction
  • Google Hacks
  • Google Hacks Continued
  • Other Research Techniques
  • Dumpster Diving
  • Email Addresses
  • Current SOPs
  • Vendor Agreements
  • Inter-Office Memos
  • Shoulder Surfing
  • Eavesdropping
  • E-mail
  • Telephone Calls
  • Cubicles/Office Areas
  • Restaurants and Bars
  • Job Descriptions
  • Conclusion

Module 11 - Methods of Deception

  • Outline
  • Introduction
  • Impersonation in Person
  • The Job Interview
  • The Inspector
  • Delivery Person
  • Vendors/Contractors
  • Impersonation on the Phone
  • Help Desk
  • IT Staff
  • Asking for Help
  • Summary
  • NMAP TCP Connect Scan
  • TCP Connect Port Scan
  • Nmap (cont.)
  • Tool Practice : TCP half-open & Ping Scan
  • Half-open Scan
  • Firewalled Ports
  • NMAP Service Version Detection
  • Additional NMAP Scans
  • NMAP UDP Scans
  • UDP Port Scan
  • Null Sessions
  • Syntax for a Null Session
  • SMB Null Sessions & Hardcoded Named Pipes
  • Windows Networking Services Countermeasures
  • Review

Product Reviews

Find Similar Products by Category