Description
Introduction
In this course, you apply guidelines to respond to virus and
worm attacks, denial-of-service attacks, and injection attacks.
This course also helps prepare you for certification exam
70-443.
Objectives
At the end of the course, students
will be able to:
- Design a Response Strategy for Threats and Attacks
- Design a Response Policy for Virus and Worm Attacks
- Design a Response Policy for Denial-of-Service Attacks
- Design a Response Policy for Internal and SQL Injection
Attacks
Modules &
Lessons
Course Overview
Module Introduction
Navigation Overview
Designing a Response Strategy for Threats
and Attacks
Module Introduction
Designing a Response Policy for Virus and
Wor…
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction In this course, you apply guidelines to respond to
virus and worm attacks, denial-of-service attacks, and injection
attacks.
This course also helps prepare you for certification exam
70-443.
Objectives At the end of the course, students will be able to:
- Design a Response Strategy for Threats and Attacks
- Design a Response Policy for Virus and Worm Attacks
- Design a Response Policy for Denial-of-Service Attacks
- Design a Response Policy for Internal and SQL Injection
Attacks
Modules & Lessons Course Overview Module Introduction
Navigation Overview Designing a Response Strategy for Threats and
Attacks Module Introduction Designing a Response Policy for Virus
and Worm Attacks Lesson Introduction Threats to SQL Server by
Viruses and Worms Best Practices for Reducing the Likelihood of
Virus and Worm Attacks Guidelines for Responding to Virus and Worm
Attacks Preparing a Response Strategy Self Test Designing a
Response Policy for Denial of Service Attacks Lesson Introduction
Symptoms of a Denial of Service Attack Identifying Symptoms of a
Denial of Service Attack Determining the Appropriate Response to a
Denial of Service Attack Self Test Designing a Response Policy for
Internal and SQL Injection Attacks Lesson Introduction Guidelines
for Responding to Internal Attacks Responding to Internal Attacks
What is a SQL Injection Attack? Guidelines for Reducing the
Likelihood of SQL Injection Attacks Self Test Lab: Designing a
Response Strategy for Threats and Attacks Lesson Introduction
Scenario Exercise: Designing a Response Policy for Virus and Worm
Attacks Exercise: Designing a Response Policy for Denial of Service
Attacks Exercise: Designing a Response Policy for Internal Attacks
Lab Review Module Summary Glossary Module Introduction System
Requirements To view this course, you need:
- A Pentium II, 256 MB RAM with a processor speed greater than or
equal to 400 MHZ
- Microsoft® Windows® 2000 or higher
- Microsoft Internet Explorer 6.0 or higher
- Adobe Flash 7.0 or higher (1MB disk space needed to
install)
- Microsoft Silverlight 4.0 or higher
- Microsoft Windows Media Player 7.0 or higher
- Microsoft XML Core Services 3.0 or higher
- A Super VGA monitor with minimum screen resolution 1024x768,
with 16-bit color.
- A sound card, and either speakers or headphones (for
multi-media audio).
- Internet bandwidth of 56K or faster. Broadband internet access
is recommended.
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.