Maxtrain.com - [email protected] - 513-322-8888 - 866-595-6863
The Certified Security Awareness Principles certification course is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and countermeasures associated with these attacks. The weakest link in any companies’ security program is a poorly trained employee. Don`t let this be you. Once a student understands what can happen, they will know what to look for. And with that understanding, be able to keep the information they have been entrusted with as safe as possible.
The social engineering portion of the class is designed to teach the participants the skills used by social engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking, and cyber-terrorism are all phrases that describe crimes that use over-the-wire technology to attack, steal, and terrorize their victims. The key to most of these over-the-wire attacks being successful is information they receive through social engineering. Does it work? Can smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering: “I was so successful with that attack that I rarely had to resort to a technical attack.” If you’re afraid of having your identity, credit card credentials, or business information compromised, then this is the training you have been looking for.
The 2 day instructor-led Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure information. One of the most valuable skill sets of a C)SS is that they understand how to train others on security as well.
With 11 up-to-date Modules, the Certified Security Sentinel will teach you security best practices applicable to keeping the information you are entrusted with secure.
Mile2 is Accredited by the NSA-CNSS, Approved on Homelands Security NICCS Framework, and is on the FBI’s Tier 1-3 Certification Training Chart.
Self-Study Package includes (1-year access):
• What are the Risks? • Known Risks • Did You Know? • What are the Risks? • Things you NEED to know! • The “Hacker” • What is Identity Theft? • Fighting Identity Theft • Practice • Demo • Don`t Panic!
• Overview • User Attacks • User Awareness • Passwords • Generating Passwords • Keeping Track Of Passwords • eWallet • Encryption Tools • Other Password Options • Windows Administrator Account • Demo • Windows Processes • Task Manager • Processes Tab • Searching Processes • Web Research • Process Information • Bad Processes • Removing Suspect Processes • Start-Up Tuners • Downloads • The User • E-Mail Links • Demo
• Overview • Internet Protection Solutions • Choosing a Package • Free Anti-Virus & Spyware • Free Anti-Malware & Anti Spyware • Updating • Scheduling a Scan? • Demo • Patch Management • Demo • Internet Anonymizers • How They Work • Demo
• Why Are You Here? • The Employer`s Liability • Steps to an Effective Security Program • Starting at the Top • Why This All Matters • Areas of Concern • What`s In This For Me? • Course Format
• Module Objectives • Why Can`t I Just Do What I Want? • Internet Acceptable Use Policy • The Internet at Work • Internet Basics • Internet Threats • Internet Access • Your Web Browser • ActiveX & Java • Media Files • E-Mail • Chat • Web Storage • Web Proxies • P2P • Spyware • Countermeasures • Demo
• Module Objectives • What`s a LAN? • Logging In • Installing Applications • OS Utilities • Network Drives • Sharing • Removable Storage • Email Attachments • Virus Scanner • Management Software • Monitoring • Demos
• Module Objectives • Work from Home • Your Home PC • From Your House to Work • Wireless • Hot Spots • Web Access for Email • Profile Management • VPNs • Demo
• Introduction • What is Social Engineering? • Definition of Social Engineering • Goals of Social Engineering • Types of Social Engineering • Attacks by Phone • Dumpster Diving • On-Line Social Engineering • On-Line Social Engineering • Persuasion • Social Engineering Roles • Reverse Social Engineering • What We Cover • Examples of our labs
• Outline • Introduction • How are People Motivated? • Avoiding Pain • Pursuing Pleasure • Baselining • How to Read a Person • Body Movements • What About Over the Phone? • Re-Framing • Putting on the Right “Spin” • Marketing • Alter Perceptions of Pain or Pleasure • Saving-Face • Verbal Judo • Putting It All Together • Practice • Summary
• Outline • Introduction • Google Hacks • Google Hacks Continued • Other Research Techniques • Dumpster Diving • Email Addresses • Current SOPs • Vendor Agreements • Inter-Office Memos • Shoulder Surfing • Eavesdropping • E-mail • Telephone Calls • Cubicles/Office Areas • Restaurants and Bars • Job Descriptions • Conclusion
• Outline • Introduction • Impersonation in Person • The Job Interview • The Inspector • Delivery Person • Vendors/Contractors • Impersonation on the Phone • Help Desk • IT Staff • Asking for Help • Summary • NMAP TCP Connect Scan • TCP Connect Port Scan • Nmap (cont.) • Tool Practice : TCP half-open & Ping Scan • Half-open Scan • Firewalled Ports • NMAP Service Version Detection • Additional NMAP Scans • NMAP UDP Scans • UDP Port Scan • Null Sessions • Syntax for a Null Session • SMB Null Sessions & Hardcoded Named Pipes • Windows Networking Services Countermeasures • Review
The C)SS is a course on cyber security designed for those who don't know anything about security but need to. We recommend this course for anyone who wants to be secure on the Internet, especially employees at work.
After you complete the C)SS course and get certified, we recommend you to further develop your security skill-set by being certified as a Certified Information Systems Officer, which will prepare you to advise businesses on security issues and implement solutions.