CSS - Certified Security Sentinel

$1,750.00
Start Date Time Days Price GTR Availability
May 30, 2017 09:00 (EST) 2 $1,750.00 Register

Course Overview

The mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks. Employees will learn that the weakest link in any security program is a poorly trained department.  This course teaches general security awareness as well as how to develop a strong security culture within your company’s community. The Social Engineering portion of the class is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.

 

Computer fraud, black-hat hacking, cyber-terrorists; these phrases describe an innovative generation of criminals that use over-the-wire technology to attack us, steal from us and terrorize us. However, the best tool in their arsenal is not new. It is only used by the most experienced, the most dangerous, boldest hackers.

 

The mile2 Certified Security Sentinel program is innovative and trains students on how attacks are performed, the skills necessary to perform an attack, how to train people to identify an attack but most importantly:  how to train internal targets so that the training is effective and lasts.

 

Prerequisites:

  • None – This is an entry level course

 

Student Materials:

  • Student workbook


CPEs: 16

 

WHO SHOULD ATTEND?

  • Anyone

  • End User

  • Company Employee

  • Basic Computer User

 

UPON COMPLETION

Upon completion, the Certified Security Sentinel candidate will not only be able to competently take the CSS exam but will also understand basic cyber security knowledge to keep companies’ IP and IT infrastructure safe.

 

EXAM INFORMATION

The Certified Security Sentinel exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 1 hour and consists of 25 multiple choice questions.

 

OUTLINE

Module 1 – Basic Security: How to secure a computer for personal internet use

Module 2 – User Awareness

Module 3 – Implementing Countermeasures

Module 4 – Essential Security Awareness for Everyone

Module 5 – Using the Internet at Work

Module 6 – Accessing the Company’s Network through Your Assigned Computer

Module 7 – Accessing the Corporate Network Remotely

Module 8 – Social Engineering

Module 9 – Understanding and Manipulating our Target

Module 10 – Researching Our Target

Module 11 – Methods of Deception

 

COURSE DETAILS

Module 1 – Basic Security: How to secure a computer for personal internet use

What are the Risks?

Known Risks

Did You Know?

What are the Risks?

Things you NEED to know!

The “Hacker”

What is Identity Theft?

Fighting Identity Theft

Practice

Demo

Don’t Panic!

 

Module 2 – User Awareness

Overview

User Attacks

User Awareness

Passwords

Generating Passwords

Keeping Track Of Passwords

eWallet

Encryption Tools

Other Password Options

Windows Administrator Account

Demo

Windows Processes

Task Manager

Processes Tab

Searching Processes

Web Research

Process Information

Bad Processes

Removing Suspect Processes

Start-Up Tuners

Downloads

The User

E-Mail Links

Demo

 

Module 3 – Implementing Countermeasures

Overview

Internet Protection Solutions

Choosing a Package

Free Anti-Virus & Spyware

Free Anti-Malware & Anti Spyware

Updating

Scheduling a Scan?

Demo

Patch Management

Demo

Internet Anonymizers

How They Work

Demo

 

Module 4 – Essential Security Awareness for Everyone

Why Are You Here?

The Employer’s Liability

Steps to an Effective Security Program

Starting at the Top

Why This All Matters

Areas of Concern

What’s In This For Me?

Course Format

 

Module 5 – Using the Internet at Work

Module Objectives

Why Can’t I Just Do What I Want?

Internet Acceptable Use Policy

The Internet at Work

Internet Basics

Internet Threats

Internet Access

Your Web Browser

ActiveX & Java

Media Files

E-Mail

Chat

Web Storage

Web Proxies

P2P

Spyware

Countermeasures

Demo

 

Module 6 – Accessing the Company’s Network Through Your Assigned Computer

Module Objectives

What’s a LAN?

Logging In

Installing Applications

OS Utilities

Network Drives

Sharing

Removable Storage

Email Attachments

Virus Scanner

Management Software

Monitoring

Demos

 

Module 7 – Accessing the Corporate Network Remotely

Module Objectives

Work from Home

Your Home PC

From Your House to Work

Wireless

Hot Spots

Web Access for Email

Profile Management

VPNs

Demo

 

Module 8 – Social Engineering

Introduction

What is Social Engineering?

Definition of Social Engineering

Goals of Social Engineering

Types of Social Engineering

Attacks by Phone

Dumpster Diving

On-Line Social Engineering

On-Line Social Engineering

Persuasion

Social Engineering Roles

Reverse Social Engineering

What We Cover

Examples of our labs

 

Module 9 – Understanding and Manipulating our Target

Outline

Introduction

How are People Motivated?

Avoiding Pain

Pursuing Pleasure

Baselining

How to Read a Person

Body Movements

What About Over the Phone?

Re-Framing

Putting on the Right “Spin”

Marketing

Alter Perceptions of Pain or Pleasure

Saving-Face

Verbal Judo

Putting It All Together

Practice

Summary

 

Module 10 – Researching Our Target

Outline

Introduction

Google Hacks

Google Hacks Continued

Other Research Techniques

Dumpster Diving

Email Addresses

Current SOPs

Vendor Agreements

Inter-Office Memos

Shoulder Surfing

Eavesdropping

E-mail

Telephone Calls

Cubicles/Office Areas

Restaurants and Bars

Job Descriptions

Conclusion

 

Module 11 – Methods of Deception

Outline

Introduction

Impersonation in Person

The Job Interview

The Inspector

Delivery Person

Vendors/Contractors

Impersonation on the Phone

Help Desk           

IT Staff

Asking for Help

Summary