Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
E-Business: Security Techniques
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Business Analysis Training. BusinessObjects training, Business Skills and Technology training,

E-Business Skills Training Overview

Addressing the topic of security should be a major consideration for any E-Business. As the number of companies using the Internet in their daily operations continues to grow, so does the number of security threats to those companies. E-Business: Security Techniques explores the security fundamentals involved in minimizing those risks. This course introduces students to concepts such as securing Web clients, servers, and communications. It also investigates the use of firewalls and digital certificates and concludes with a discussion of legal issues.

Courses Objecties:

You will identify how to prepare and present data for effective communication.


Prerequisites

E-Business: Security Techniques was designed for the decision-making E-Business professional who wants to understand and explore the Web security options that exist for companies today. It is suggested that students have a basic knowledge of how the Internet works. An understanding of computer networking is also helpful. To ensure your success, we recommend you first take the following courses or have equivalent knowledge:

  • Technical Introduction to the Internet:
  • E-Business: Fundamentals of E-Commerce:
  • E-Business: Practical Applications:
Hardware/Software Requirements

You will need:
  • A 133 MHz or faster Pentium-based PC.
  • 32 MB of RAM.
  • 160 MB of hard disk space.
  • Monitor capable of displaying 800 x 600 pixels at 256 colors or more.
  • Microsoft Windows 95, 98, or NT 4.0.
  • Microsoft Internet Explorer 5.0 or higher.
Performance-Based Objectives

Lesson objectives help students become comfortable with the course, and also provide a means to evaluate learning. Upon successful completion of this course, students will be able to:
  • Assess the security risks associated with your E-Business.
  • Discuss the security threats that exist for your company's internal Web clients and evaluate the options available to minimize those risks.
  • Analyze the security threats that exist for your company's servers and evaluate the options available to minimize those risks.
  • Compare the types of firewalls that can be implemented in your E-Business.
  • Describe cryptography and the encryption systems available for securing Web communications.
  • Obtain digital certificates.
  • Develop security incident response procedures.
Course duration

1 Day


E-Business Skills Training outline

Lesson 1: E-Business Security Fundamentals
  • Topic 1A: The Nature of E-Business Creates Unique Security Concerns
  • Task 1A-1: Discussing the Unique Concerns of E-Business Security
  • Topic 1B: E-Business Network Architectures
  • Task 1B-1: Examining Network Architectures and Security
  • Topic 1C: E-Business Security Threats
  • Task 1C-1: Describing Security Threats and Incidents
  • Topic 1D: Risk Assessment
  • Task 1D-1: Exploring Risk Assessment for Your E-Business
Lesson 2: Securing Your Company's Internal Web Clients
  • Topic 2A: Privacy Issues Concerning Your E-Business
  • Task 2A-1: Evaluating Your Current Company Policies and Enforceability Procedures Regarding Privacy Issues
  • Topic 2B: Applications that are Security Threats to Web Clients
  • Task 2B-1: Exploring Browser Security Options
Lesson 3: Securing Your Company's E-Business Servers
  • Topic 3A: Securing Your Host Computer
  • Task 3A-1: Discussing Host Security
  • Topic 3B: Securing Your Web Server Software
  • Task 3B-1: Discussing How to Secure Your Web Server Software
Lesson 4: Firewalls
  • Topic 4A: Firewall Uses and Designs
  • Task 4A-1: Examining Firewalls
Lesson 5: Securing Web Communications for Your E-Business
  • Task 5A-1: Analyzing Encryption Methods
  • Topic 5B: Encryption Systems
  • Task 5B-1: Examining Encryption Systems
Lesson 6: Digital Certificates
  • Topic 6A: Certificate Authorities
  • Task 6A-1: Discussing CAs and the Certificates they Issue
  • Topic 6B: Types of Digital Certificates
  • Task 6B-1: Verifying the List of CAs Your Browser is Configured to Trust
  • Task 6B-2: Exploring Verisign's Class Levels
  • Task 6B-3: Viewing a Site's Server Certificate
Lesson 7: Security Management of Your E-Business
  • Topic 7A: Responding to Security Incidents
  • Topic 7B: Legal Issues that Concern Your E-Business
  • Task 7B-1: Investigating a Federally Prosecuted Computer Case
  • Task 7B-2: Exploring the CERT site

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved
Copyright © SB