Description
Introduction
In this online course, you learn, in depth, the fundamentals
of security attacks in relation to Windows Vista. This includes
attacks from viruses, worms, trojans, root kits, spyware, and
phishing. This also helps prepare you for certification exam
70-623. This online course is composed of a rich multimedia
experience coupled with comprehensive technical labs. It is
intended for IT Professionals who support Windows Vista in a home
environment.
To get the most out of this course it is recommended that you have
strong Windows Vista technical skills. This course also helps you
prepare to become a Microsoft IT Professional (MCITP).
Objectives
At the end of the course, students
will …
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction In this online course, you learn, in depth, the
fundamentals of security attacks in relation to Windows Vista. This
includes attacks from viruses, worms, trojans, root kits, spyware,
and phishing. This also helps prepare you for certification exam
70-623. This online course is composed of a rich multimedia
experience coupled with comprehensive technical labs. It is
intended for IT Professionals who support Windows Vista in a home
environment.
To get the most out of this course it is recommended that you have
strong Windows Vista technical skills. This course also helps you
prepare to become a Microsoft IT Professional (MCITP). Objectives
At the end of the course, students will be able to:
- Describe the key characteristics of Computer Viruses.
- Describe the key characteristics of Spyware and Phishing
Attacks.
- Describe how to reduce the risk of a computer attack.
- Describe the symptoms of a computer virus.
- Describe the symptoms of a Root Kit.
- Describe how to reduce the computer attack surface.
Modules & Lessons Course Overview Module Introduction
Navigation Overview Lab Information Course Information Fundamentals
of Windows Security Attacks Module Introduction Computer Viruses
Lesson Introduction What Are Computer Viruses? What Are the
Symptoms of a Computer Virus? What Are the Indicators of a Computer
Virus? The Life Cycle of a Computer Virus How Computer Worms Work
Characteristics of a Trojan Horse Self Test Spyware and Phishing
Attacks Lesson Introduction The Consequences of Spyware and
Phishing Attacks What is Spyware? What is Phishing? Self Test
Reducing the Risk of a Computer Attack Lesson Introduction What is
a Computer's Attack Surface? Guidelines for Reducing a Computer's
Attack Surface Methods of Virus Detection How to Configure Internet
Explorer 7 and Client E-Mail Application Security Settings
Guidelines for Safe Internet and E-Mail Usage Self Test Lab:
Fundamentals of Windows Security Attacks Lesson Introduction
Scenario Exercise Information Launch the Lab Lab Review Tech Tips
Lesson Introduction Why Trojan Horse? Advanced Malware Cleaning
Unexpected Spyware Module Summary System Requirements To view this
course, you need:
- A Pentium II, 256 MB RAM with a processor speed greater than or
equal to 400 MHZ
- Microsoft® Windows® 2000 or higher
- Microsoft Internet Explorer 6.0 or higher
- Adobe Flash 7.0 or higher (1MB disk space needed to
install)
- Microsoft Silverlight 4.0 or higher
- Microsoft Windows Media Player 7.0 or higher
- Microsoft XML Core Services 3.0 or higher
- A Super VGA monitor with minimum screen resolution 1024x768,
with 16-bit color.
- A sound card, and either speakers or headphones (for
multi-media audio).
- Internet bandwidth of 56K or faster. Broadband internet access
is recommended.
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.