Security Support
About the Course/Course Objective
Who is an IT Security Support Technician ?
IT Security Support Technician is the one who can:
• Identify, diagnose, troubleshoot, resolve internet & intranet security related issues
• Monitor and maintain the uptime of various types of network security devices such as:
o Antivirus server and clients
o Hardware and software Firewalls
o Intrusion detection and Prevention Systems
o Wi-Fi Access points
What does an IT Security Support Technician do?
Using Basic knowledge about viruses, malwares, spyware, cyber security policies, etc. he/she can perform following functions:
• Diagnosing and resolving the basic IT security related problems
• Primary level of fault finding and take necessary actions
• Installing and Configuring antivirus software & its update
• Installing and configuring windows firewalls
• Configuring secure remote access
• Configuring & maintaining a secure Wi-Fi network
Syllabus
Skills: Using Antivirus Software, Antispam Technologies, Configuring Windows Firewall, Firewalls ,Proxy server and routers, MAC Address Filtering, Network Address Translation, Secure Remote Access, Authentication and Encryption, Man in the Middle of Attack, Denial of Service Attack, Using network packet capturing tool
Tools: Open source antivirus, Antispyware, Windows firewall, Wifi security settings, Antispam settings
Detailed Syllabus:
Security Support
Removing Viruses and Malwares
1.Using Antivirus Software
2.Adware’s and Spywares
3.Antispam Technologies
4.Installing Free Antivirus and Scanning the PC
5.Installing Free Antispyware and scanning Pc for Adware and Spywares
Securing LAN
1.Firewalls
2.Proxy server
3.Routers
4.Configuring Windows Firewall
5.Overview of IPS and IDS
6.Securing Servers - Server Hardening
7.Windows Server Hardening
Securing Wi-Fi Network
1.WEP, WPA and WPA2
2.MAC Address Filtering
Network Access Security
1.Authentication and Encryption
2.Network Address Translation
3.Secure Remote Access
4.Secure Remote Access - Configuring VPN in Windows 7
Cyber Attacks
1.Common Cyber Attack
2.Man in the Middle Attack
3.Denial of Service Attack
4.Using network packet capturing tool