E-Business Skills Training Overview
Addressing the topic of security should be a major consideration for any E-Business. As the number of companies using the Internet in their daily operations continues to grow, so does the number of security threats to those companies. E-Business: Security Techniques explores the security fundamentals involved in minimizing those risks. This course introduces students to concepts such as securing Web clients, servers, and communications. It also investigates the use of firewalls and digital certificates and concludes with a discussion of legal issues.
Courses Objecties:
You will identify how to prepare and present data for effective communication.
Prerequisites
E-Business: Security Techniques was designed for the decision-making E-Business professional who wants to understand and explore the Web security options that exist for companies today. It is suggested that students have a basic knowledge of how the Internet works. An understanding of computer networking is also helpful. To ensure your success, we recommend you first take the following
courses or have equivalent knowledge:
- Technical Introduction to the Internet:
- E-Business: Fundamentals of E-Commerce:
- E-Business: Practical Applications:
Hardware/Software Requirements
You will need:
- A 133 MHz or faster Pentium-based PC.
- 32 MB of RAM.
- 160 MB of hard disk space.
- Monitor capable of displaying 800 x 600 pixels at 256 colors or more.
- Microsoft Windows 95, 98, or NT 4.0.
- Microsoft Internet Explorer 5.0 or higher.
Performance-Based Objectives
Lesson objectives help students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:
- Assess the security risks associated with your E-Business.
- Discuss the security threats that exist for your company's internal Web clients and evaluate the options available to minimize those risks.
- Analyze the security threats that exist for your company's servers and evaluate the options available to minimize those risks.
- Compare the types of firewalls that can be implemented in your E-Business.
- Describe cryptography and the encryption systems available for securing Web communications.
- Obtain digital certificates.
- Develop security incident response procedures.
Course duration
1 Day
E-Business Skills Training outline
Lesson 1: E-Business Security Fundamentals
- Topic 1A: The Nature of E-Business Creates Unique Security Concerns
- Task 1A-1: Discussing the Unique Concerns of E-Business Security
- Topic 1B: E-Business Network Architectures
- Task 1B-1: Examining Network Architectures and Security
- Topic 1C: E-Business Security Threats
- Task 1C-1: Describing Security Threats and Incidents
- Topic 1D: Risk Assessment
- Task 1D-1: Exploring Risk Assessment for Your E-Business
Lesson 2: Securing Your Company's Internal Web Clients
- Topic 2A: Privacy Issues Concerning Your E-Business
- Task 2A-1: Evaluating Your Current Company Policies and Enforceability Procedures Regarding Privacy Issues
- Topic 2B: Applications that are Security Threats to Web Clients
- Task 2B-1: Exploring Browser Security Options
Lesson 3: Securing Your Company's E-Business Servers
- Topic 3A: Securing Your Host Computer
- Task 3A-1: Discussing Host Security
- Topic 3B: Securing Your Web Server Software
- Task 3B-1: Discussing How to Secure Your Web Server Software
Lesson 4: Firewalls
- Topic 4A: Firewall Uses and Designs
- Task 4A-1: Examining Firewalls
Lesson 5: Securing Web Communications for Your E-Business
- Task 5A-1: Analyzing Encryption Methods
- Topic 5B: Encryption Systems
- Task 5B-1: Examining Encryption Systems
Lesson 6: Digital Certificates
- Topic 6A: Certificate Authorities
- Task 6A-1: Discussing CAs and the Certificates they Issue
- Topic 6B: Types of Digital Certificates
- Task 6B-1: Verifying the List of CAs Your Browser is Configured to Trust
- Task 6B-2: Exploring Verisign's Class Levels
- Task 6B-3: Viewing a Site's Server Certificate
Lesson 7: Security Management of Your E-Business
- Topic 7A: Responding to Security Incidents
- Topic 7B: Legal Issues that Concern Your E-Business
- Task 7B-1: Investigating a Federally Prosecuted Computer Case
- Task 7B-2: Exploring the CERT site
|