EC-Council Security5

Security5 Certification:
EC-Council Security5

Certify I.T Training's EC-Council Security5 Training Package includes expert instructor-led training modules with customized presentations, practice simulators and learning supplements for an all-inclusive training program that provides the benefits of classroom training at your own pace.

EC-Council's Security5 certification training course from is the entry-level certification for professionals interested in learning computer security basics and networking. Security5 stands for the five components of IT Security: Firewalls, Anti-Virus, IDS, Networking and Web Security. With this course, students will learn the basic networking and security skills and to begin high-end IT programs.

The Online Traning Academy's Security5 training course teaches today's knowledge workers the ‘Alphabet Soup of Security' so that students can distinguish between the legitimate and malevolent and guard their information assets. Identity theft, credit card fraud, online banking Phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information and hackers are some of the threats you will face on a daily basis. The Online Traning Academy's Security5 training will prepare you to face them and defend yourself.

Certify I.T Training follows the approved Microsoft course curriculum, ensuring you receive the training and knowledge needed to succeed.Certify I.T Training is so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!


Deployment Methods


EC-Council Security5, 1 Yr Access, & Technical Email Support, 1 Study guide, 40 hours Self Study, 1 Yr Technical Email Support, Training simulations.

EC-Council Security5

Course Outline

Module 01: Foundations of Security
Essential terminology
Defining security
Need for security
Cyber crime
Information Security statistics
IS triangle
Security myths
How to Harden Security

Module 02: Basic Security Procedures
Why do I need to worry about my computer’s security?
Hardening of Operating System
Updating the system and configuring the updates
Disable unnecessary services
Strong password creation
Deployment of anti virus and firewall
Disable guest account access “Make Private” folders
Security settings in MS Office applications
Desktop Security

Module 03: File Sharing
Types of file sharing
How to share folders
Configuring shared folder permissions
Hiding files and folders
File sharing tips
File downloading tips
How to backup data and restore
How to encrypt and decrypt files
How to kill suspect processes

Module 04: Administering Windows Securely
How to use the event viewer
How to enable auditing in windows
How to read logs on your system
How to close ports
How to restore the registry
How to close a port
Common internal commands
How to find services and ports they listen on

Module 05: Recognizing Security Threats and Attacks
Phishing and its countermeasures
Social engineering
Denial of Service
Port Scanning
Password cracking
Basic security measures

Module 06: Secure Internet Access
Basic browser security settings
How to restrict site access
Removing site from security zone
Secure website detection
Secure site and browser properties
Tools: Internet Filtering Software
Configuring Internet content access
Activating Content Advisor
How to deal with cookies
Using P2P networks securely
Choosing appropriate browser settings
Wireless network security features

Module 07: Working on the Internet
Precepts of Security
Knowing Encryption
Digital Certificate
Digital Signature
Working with e-mail (web based)
Working with e-mail (mail client)
Working with File Transfer - FTP
Working with File Transfer – Web Folders

Module 08: Online Payment Systems
Working with Credit Cards
Working with Instant Messengers
Working across File Sharing Networks
Working on Dial-in Networks
Working with Portable Devices
Working with Wireless Devices
Working with USB devices
Working with Media Files
Working with 3rd party software

Module 09: Incident Response
What is Incident Response?
Incidents and responses: Trojan attack
Boot sector virus attack
Corrupted registry
Automatic running of CD-ROM (autorun.inf)

About us | Contact us | Support | T&C | Privacy Policy | Site Map | Guarantee ©2010 - 2013 Certify IT Training