Scroll to top button

1D0-571 : CIW: Web Security Associate

Start your prep for the CIW Web Security Associate 1D0-571 certification exam with the CIW Web Security Associate course. The cert guide focuses on all the objectives of the CIW 1D0-571 exam and offers skills and competency in preventing and managing hacker penetration; authentication procedures, encryption standards and implementations; ports and protocols that hackers manipulate; and a lot more. The study guide teaches all the basic and advanced concepts of Web security with an idea of detecting and distracting hackers, security resources, incident response, and a lot more.

Here's what you will get

CIW Web Security Associate certification is a vendor neutral, entry-level credential designed for IT professionals that covers various aspects of Internet security and its principles such as how to secure your network from unauthorized activity; establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter. The exam covers topics of network security, encryption of data, applying security principles, identifying security attacks, firewall types, common firewall technologies, and many more.

Lessons
Lessons
16+
Exercises
266+
Flashcards
86+
Glossary of terms
86+
Test prep
Pre-assessment Questions
62+
Full Length Tests
2+
Post-Assessment Questions
107+
Live Lab (Add-on Component)
live lab
35+
Exam FAQs
What are the prerequisites for this exam?

Here is the pre-requisite:

  • CIW Web Foundations Associate or equivalent knowledge
What is the exam registration fee? USD 150
Where do I take the exam? Pearson VUE
What is the format of the exam? The exam consists of linear, multiple choice, fill in the blank, fact-based, and situational questions.
How many questions are asked in the exam? The exam contains 62 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 76%
What is the exam's retake policy?

Here are the retake policies:

  • A 24-hour waiting period is required between the first and second attempt exam.
  • If a candidate passes a CIW exam, he will not be allowed to retake that CIW exam.
  • 30 calendar days waiting period from the date of the previous sitting before any third or subsequent sitting exam.
What is the validity of the certification? CIW certifications do not expire unless CIW changes its policy.
Where can I find more information about this exam? To know more about the 1D0-571, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • IT security officers
  • Application developers
  • Firewall administrators
  • Systems administrators
  • Network server administrators

Here's what you will learn

  • Network Security Background
  • What Is Security?
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • What You Are Trying to Protect
  • Who Is the Threat?
  • Security Standards
  • Lesson Summary
  • Security Elements and Mechanisms
  • The Security Policy
  • Determining Backups
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks
  • Lesson Summary
  • Optional lab
  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric-Key Encryption
  • One-Way (Hash) Encryption
  • Applied Encryption Processes
  • Encryption Review
  • Lesson Summary
  • Optional Lab
  • Network Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Malware (Malicious Software)
  • Social Engineering Attacks
  • Denial-of-Service (DOS) Attacks
  • Distributed Denial-of-Service (DDOS) Attacks
  • Spoofing Attacks
  • Scanning Attacks
  • Man-in-the-Middle Attacks
  • Bots and Botnets
  • SQL Injection
  • Auditing
  • Lesson Summary
  • Optional Lab
  • Networking Vulnerability Considerations
  • Wireless Network Technologies and Security
  • IEEE 802.11 Wireless Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Wireless Network Security Problems
  • Wireless Network Security Solutions
  • Site Surveys
  • Convergence Networking and Security
  • Web 2.0 Technologies
  • Greynet Applications
  • Vulnerabilities with Data at Rest
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking
  • Lesson Summary
  • Optional Lab
  • Common Security Principles
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security
  • Lesson Summary
  • Optional lab
  • TCP/IP Security Introduction
  • OSI Reference Model Review
  • Data Encapsulation
  • The TCP/IP Stack and the OSI Reference Model
  • Link/Network Access Layer
  • Network/Internet Layer
  • Transport Layer
  • Application Layer
  • Protocol Analyzers
  • Lesson Summary
  • Optional Lab
  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security and Repetition
  • Lesson Summary
  • Optional Lab
  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and Disadvantages
  • Configuring Proxy Servers
  • URL Filtering
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)
  • Lesson Summary
  • Optional Lab
  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together
  • Lesson Summary
  • Optional Lab
  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker
  • Lesson Summary
  • Creating an Incident Response Policy
  • Determining If an Attack Has Occurred
  • Executing the Response Plan
  • Analyzing and Learning
  • Lesson Summary
  • Microsoft Windows Server 2003
  • Ubuntu Linux

Hands on Activities (Live Labs)

ciw ciw
1D0-571
CIW: Web Security Associate
ISBN : 9781616916633