Skip Ribbon Commands
Skip to main content
Version HistoryVersion History

Course ID

CSS

Title

Certified Security Sentinel

Price

$995.00

Duration

2 Days

Audience

 

Level

 

Delivery Method

 

Software Assurance

 

Microsoft CPE

 

Course Audience

​The C)SS is a course on cyber security designed for those who have limited knowledge about security, but need to know more to protect their company’s assets. 


Course Objectives

​Upon Completion Students will:

  • Understand security best practices on how to keep information secure
  • Have knowledge to identify a security breach
  • Be ready to sit for the C)SS Exam

 

 

 

 

Related Courses:

C)ISSO: Information Systems Security Officer

C)SLO: Security Leadership Officer


Course Content

With 11 up-to-date Modules, the Certified Security Sentinel will teach you security best practices applicable to keeping the information you are entrusted with secure.  


Course Description

​The Certified Security Sentinel certification course is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and countermeasures associated with these attacks. The weakest link in any companies' security program is a poorly trained employee. Don’t let this be you. Once a student understands what can happen, they will know what to look for. And with that understanding, be able to keep the information they have been entrusted with as safe as possible.

The social engineering portion of the class is designed to teach the participants the skills used by social engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking, and cyber-terrorism are all phrases that describe crimes that use over-the-wire technology to attack, steal, and terrorize their victims. The key to most of these over-the-wire attacks being successful is information they receive through social engineering. Does it work? Can smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering: “I was so successful with that attack that I rarely had to resort to a technical attack.” If you're afraid of having your identity, credit card credentials, or business information compromised, then this is the training you have been looking for.

The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure information. One of the most valuable skill sets of a C)SS is that they understand how to train others on security as well.


Course Prerequisites

None 

Course Outline

​Basic Computer Security

What are the Risks?

Known Risks

Did You Know?

What are the Risks?

Things you NEED to know!

The “Hacker”

What is Identity Theft?

Fighting Identity Theft

Practice

Demo

Don’t Panic!


User Awareness

Overview

User Attacks

User Awareness

Passwords

Generating Passwords

Keeping Track Of Passwords

eWallet

Encryption Tools

Other Password Options

Windows Administrator Account

Demo

Windows Processes

Task Manager

Processes Tab

Searching Processes

Web Research

Process Information

Bad Processes

Removing Suspect Processes

Start-Up Tuners

Downloads

The User

E-Mail Links

Demo


Implementing Countermeasures

Overview

Internet Protection Solutions 

Choosing a Package

Free Anti-Virus & Spyware

Free Anti-Malware & Anti Spyware

Updating

Scheduling a Scan?

Demo

Patch Management

Demo

Internet Anonymizers

How They Work

Demo


Essential Security Awareness

Why Are You Here?

The Employer’s Liability

Steps to an Effective Security Program

Starting at the Top

Why This All Matters

Areas of Concern

What’s In This For Me?

Course Format


Using the Internet at Work

Module Objectives

Why Can’t I Just Do What I Want?

Internet Acceptable Use Policy

The Internet at Work

Internet Basics

Internet Threats

Internet Access

Your Web Browser

ActiveX & Java

Media Files

E-Mail

Chat

Web Storage

Web Proxies

P2P

Spyware

Countermeasures

Demo


Accessing the Network Locally

Module Objectives

What’s a LAN?

Logging In

Installing Applications

OS Utilities

Network Drives

Sharing

Removable Storage

Email Attachments

Virus Scanner

Management Software

Monitoring

Demos


Accessing the Network Remotely

Module Objectives

Work from Home

Your Home PC

From Your House to Work

Wireless

Hot Spots

Web Access for Email

Profile Management

VPNs

Demo


Social Engineering

Introduction

What is Social Engineering?

Definition of Social Engineering

Goals of Social Engineering

Types of Social Engineering

Attacks by Phone

Dumpster Diving

On-Line Social Engineering

On-Line Social Engineering

Persuasion

Social Engineering Roles

Reverse Social Engineering

What We Cover

Examples of our labs


Understanding and Interacting with our Target

Outline

Introduction

How are People Motivated?

Avoiding Pain

Pursuing Pleasure

Baselining

How to Read a Person

Body Movements

What About Over the Phone?

Re-Framing

Putting on the Right “Spin”

Marketing

Alter Perceptions of Pain or Pleasure

Saving-Face

Verbal Judo

Putting It All Together

Practice

Summary


Researching Our Target

Outline

Introduction

Google Hacks

Google Hacks Continued

Other Research Techniques

Dumpster Diving

Email Addresses

Current SOPs

Vendor Agreements

Inter-Office Memos

Shoulder Surfing

Eavesdropping

E-mail

Telephone Calls

Cubicles/Office Areas

Restaurants and Bars

Job Descriptions

Conclusion


Methods of Deception

Outline

Introduction

Impersonation in Person

The Job Interview

The Inspector

Delivery Person

Vendors/Contractors

Impersonation on the Phone

Help Desk 

IT Staff

Asking for Help

Summary

NMAP TCP Connect Scan

TCP Connect Port Scan

Nmap (cont.)

Tool Practice : TCP half-open & Ping Scan

Half-open Scan

Firewalled Ports

NMAP Service Version Detection

Additional NMAP Scans

NMAP UDP Scans

UDP Port Scan

Null Sessions

Syntax for a Null Session

SMB Null Sessions & Hardcoded Named Pipes

Windows Networking Services Countermeasures

Review

Status

Active

Technology

CyberSecurity

Category

Cybersecurity

SubCategory

Cybersecurity Foundations

Details

Certified Security Sentinel

Attachments

Version: 4.0
Created at 5/12/2015 4:43 PM by Cole
Last modified at 6/29/2015 11:40 AM by GSATRAIN\Administrator