Professional Documents
Culture Documents
Course Outline
Exam 112-12
Essential Terminologies
Computer Security
Why Security?
Elements of Security
Layers of Security
What to Secure?
System Security
Password Cracking
Page 1
Page 2
Exam 112-12
Exam 112-12
Page 3
Encryption
o
Common Terminologies
What Is Encryption?
Objectives of Encryption
Usage of Encryption
Exam 112-12
Types of Encryption
o
Encryption Standards
Digital Certificates
o
Digital Signature
Cryptography Tools
TrueCrypt
Cryptography Tools
Page 4
Data Backup
Types of Backup
Restoring Data
Data Encryption
o
Exam 112-12
Physical Security
o
Browser Security
o
Internet Security
Page 5
Exam 112-12
Online Games
o
Social Risks
Social Engineering
Message from a Gamer About a Password Stolen by a Malicious Program
Protection Schemes, Cyber Prostitution, and Virtual Mugging
Page 6
Unsolicited Emails
Chat Rooms
Exam 112-12
Internet Laws
o
Highlights of DMCA
CAN-SPAM Act
Home Network
Network Devices
Steps for Home Networking
Page 7
Wireless Networks
Page 8
Exam 112-12
Sharing
Transferring Files
Use Firewall
Use Strong Passwords, Make Regular Backups, and Know about Encryption
Network Adapters
o
Exam 112-12
Online Shopping
o
Online Banking
McAfees SiteAdvisor
o
Rating Icons
Email Security
Spamming
Spamming Countermeasures
Page 9
Nigerian Scam
Exam 112-12
Scenario
Identity Theft
Page 10
Social Engineering
o
Exam 112-12
econsumer.gov
IP Hiding Tools
o
What is a Profile?
Page 11
Profile Settings
Exam 112-12
HIPAA Checklist
FERPA Checklist
Page 12
Worldwide Smartphone Sales to End Users by Operating System in 2011 Market Shares
IMEI Number
Mobile Malware
iPad Security
Page 13
Exam 112-12