• Home
uCertify Logo
  • Login or Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Powered by uCertify
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

CIW: Web Security Associate

(1D0-571) / ISBN: 9781616916633
This course includes
Lessons
TestPrep
LiveLab (Add-on)
Mentoring (Add-on)
1D0-571 : CIW: Web Security Associate
Share
Try This Course
4.5 Rating 2 Reviews
Are you an instructor?
Request a free evaluation copy

CIW: Web Security Associate

Create new career opportunities by being CIW certified with the CIW: Web Security Associate course and lab. The lab provides a hands-on learning experience in a safe, online environment. The complete course provides skills for exam topics such as network security, firewalls, and much more.
Here's what you will get

The CIW Web Security Associate certification is a vendor-neutral, entry-level credential designed for IT professionals. This certification covers various aspects of Internet security and its principles such as securing your network from unauthorized activity, establishing an effective security policy, and the different types of hacker activities that you are most likely to encounter. The exam covers topics of network security, encryption of data, applying security principles, identifying security attacks, firewall types, common firewall technologies, and many more.

Lessons
  • 16+ Lessons
  • 230+ Exercises
  • 86+ Flashcards
  • 86+ Glossary of terms
TestPrep
  • 62+ Pre Assessment Questions
  • 2+ Full Length Tests
  • 107+ Post Assessment Questions
  • 124+ Practice Test Questions
LiveLab (Add-on)
  • 35+ LiveLab
Here's what you will learn
Download Course Outline
Lesson 1: What Is Security?
  • Network Security Background
  • What Is Security?
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • What You Are Trying to Protect
  • Who Is the Threat?
  • Security Standards
  • Lesson Summary
Lesson 2: Elements of Security
  • Security Elements and Mechanisms
  • The Security Policy
  • Determining Backups
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks
  • Lesson Summary
  • Optional lab
Lesson 3: Applied Encryption
  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric-Key Encryption
  • One-Way (Hash) Encryption
  • Applied Encryption Processes
  • Encryption Review
  • Lesson Summary
  • Optional Lab
Lesson 4: Types of Attacks
  • Network Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Malware (Malicious Software)
  • Social Engineering Attacks
  • Denial-of-Service (DOS) Attacks
  • Distributed Denial-of-Service (DDOS) Attacks
  • Spoofing Attacks
  • Scanning Attacks
  • Man-in-the-Middle Attacks
  • Bots and Botnets
  • SQL Injection
  • Auditing
  • Lesson Summary
  • Optional Lab
Lesson 5: Recent Networking Vulnerability Considerations
  • Networking Vulnerability Considerations
  • Wireless Network Technologies and Security
  • IEEE 802.11 Wireless Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Wireless Network Security Problems
  • Wireless Network Security Solutions
  • Site Surveys
  • Convergence Networking and Security
  • Web 2.0 Technologies
  • Greynet Applications
  • Vulnerabilities with Data at Rest
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking
  • Lesson Summary
  • Optional Lab
Lesson 6: General Security Principles
  • Common Security Principles
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security
  • Lesson Summary
  • Optional lab
Lesson 7: Protocol Layers and Security
  • TCP/IP Security Introduction
  • OSI Reference Model Review
  • Data Encapsulation
  • The TCP/IP Stack and the OSI Reference Model
  • Link/Network Access Layer
  • Network/Internet Layer
  • Transport Layer
  • Application Layer
  • Protocol Analyzers
  • Lesson Summary
  • Optional Lab
Lesson 8: Securing Resources
  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security and Repetition
  • Lesson Summary
  • Optional Lab
Lesson 9: Firewalls and Virtual Private Networks
  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and Disadvantages
  • Configuring Proxy Servers
  • URL Filtering
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)
  • Lesson Summary
  • Optional Lab
Lesson 10: Levels of Firewall Protection
  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together
  • Lesson Summary
  • Optional Lab
Lesson 11: Detecting and Distracting Hackers
  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker
  • Lesson Summary
Lesson 12: Incident Response
  • Creating an Incident Response Policy
  • Determining If an Attack Has Occurred
  • Executing the Response Plan
  • Analyzing and Learning
  • Lesson Summary
Appendix A: Web Security Associate Objectives and Locations
Appendix B: Internet Security Resources
  • General
  • UNIX
  • Windows Server 2003
Appendix C: Commercial Products Used in This Course
  • Microsoft Windows Server 2003
  • Ubuntu Linux
Appendix D: Works Consulted

Hands on Activities (Live Labs)

What Is Security?

  • Causing a Darkcomet trojan infection

Elements of Security

  • Viewing and modifying default access control settings
  • Viewing the effects of hostile JavaScript in Browser
  • Configuring execution control lists in Windows Server 2016
  • Creating an execution control list for the su command in Linux
  • Creating an access control list for Apache Server  

Applied Encryption

  • Encrypting File with AES Algorithm
  • Installing GPG4win on Windows Server 2016
  • Generating a keypair using Kleopatra
  • Exporting and Importing public keys using Kleopatra
  • Encrypting and Decrypting messages using Kleopatra
  • Using MD5sum to create checksums in Ubuntu Linux
  • Generating a key pair using GPG for Ubuntu Linux
  • Signing the shared public keys in Linux
  • Encrypting and decrypting files using GPG
  • Creating a signature file
  • Signing files with GPG

Types of Attacks

  • Using John the Ripper in Windows Server 2016
  • Conducting a virus scan in Windows to help thwart attacks
  • Analyzing a SYN flood in a packet sniffer
  • Identifying network-based attacks
  • Using Nmap to scan a system in Windows Server 2016
  • Analyzing a SYN flood using Linux and Windows Server 2016
  • Identifying and analyzing Land and Teardrop attacks
  • Analyzing a Smurf attack

Recent Networking Vulnerability Considerations

  • Installing a war-driving application and analyzing a site survey capture
  • Analyzing traffic captured from site survey software

General Security Principles

  • Increasing physical security using the Syskey utility

Protocol Layers and Security

  • Examining a packet capture in Wireshark

Securing Resources

  • Securing an Apache Web server
  • Securing the FTP service
  • Scanning systems in Ubuntu Linux

Firewalls and Virtual Private Networks

  • Using the iptables command to create a personal firewall in Linux

Detecting and Distracting Hackers

  • Setting a logon tripwire script in Windows Server 2016
  • Using Tripwire for Linux
Exam FAQs
What are the prerequisites for this exam?

Here is the pre-requisite:

  • CIW Web Foundations Associate or equivalent knowledge
What is the exam registration fee? USD 150
Where do I take the exam? Pearson VUE
What is the format of the exam? The exam consists of linear, multiple choice, fill in the blank, fact-based, and situational questions.
How many questions are asked in the exam? The exam contains 62 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 76%
What is the exam's retake policy?

Here are the retake policies:

  • A 24-hour waiting period is required between the first and second attempt exam.
  • If a candidate passes a CIW exam, they will not be allowed to retake that CIW exam.
  • 30 calendar days waiting period from the date of the previous sitting before any third or subsequent sitting exam.
What is the validity of the certification? CIW certifications do not expire.
Where can I find more information about this exam? To know more about the , click here.
What are the career opportunities after passing this exam?
  • IT Security Officer
  • Firewall Administrator
  • Application Developer
  • Systems Administrator
  • Network Server Administrator
Customer Testimonials
Karthik Karur Maniaraas
As an online learner, I very much enjoyed each lesson in the way it is explained. Time to time quizzes, practice assessments, and practical labs kept me the course interesting throughout my course. This online course covers all necessary knowledge about security at an enterprise level. I would strongly recommend this course for all the beginners who would like to step into the world of web security.
Abraham Andresen
Whether you are looking to brush up your skills to take the exam or you are responsible for finding training that will meet the needs of a Web Security Associate and prepare you for the CIW Exam – this course meets the mark and excels! Great work on this masterpiece, uCertify.

Show more

×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept