Certified E-commerce Consultant (CEC) Syllabus
Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without written permission from the issuer is strictly prohibited. Its disposal is permitted in unchanged form and solely for informational purposes. Declaration of Responsibilities ACTA S.A. hereby declares that they carry out constant inspections so that this syllabus strictly covers the quality criteria in terms of the validity of its contents. Nevertheless, they carry no responsibility for any damage that may occur through the use of a part or of the whole of this syllabus. Its content may be modified or revoked whenever necessary with no previous notification. Syllabus Update The syllabus is published at: www.acta.edu.gr and is the only one that ACTA S.A. recognizes as an information point for those concerned. ACTA S.A. Thessaloniki: Egnatias 1 P.O. Box: 54630 Tel.: +30 2310 510870 Fax: 2310 510871 email: info@acta.edu.gr Athens: V. Sofias 55 P.O. Box: 11521 Tel.: +30 210 7239770 Fax: 210 7239777 email: athens@acta.edu.gr Page 2 of 11
Syllabus Content Sections 1. INTERNET AND ENTREPRENEURSHIP... 4 2. INTRODUCTION TO E-COMMERCE... 5 3. E-BUSINESS MODELS... 5 4. SECURITY AND ENCRYPTION... 5 5. E-PAYMENT SYSTEMS... 7 6. BUILDING AN E-COMMERCE SITE... 7 7. INTERNET MARKETING STRATEGIES... 9 8. WEB PRESENCE EVALUATION... 9 9. LEGAL ASPECTS OF E-COMMERCE... 10 Page 3 of 11
Explanatory Note The candidates must be familiar with the basic concepts of e-commerce. Start of Syllabus 1. INTERNET AND ENTREPRENEURSHIP 1.1. Growth of the Internet 1.2. The Internet: key technology concepts 1.2.1. Client/server computing 1.2.2. Communications protocols 1.2.3. Domain Name System (DNS) 1.3. Internet services 1.3.1. World Wide Web (www) 1.3.2. E-Mail 1.3.3. Telnet 1.3.4. File Transfer Protocol (FTP) 1.3.5. Other services 1.4. Accessing the internet 1.4.1. Common methods of internet access 1.5. Browsing the web 1.5.1. Web Browsers and World Wide Web 1.5.2. Search engines 1.5.2.1. Introduction to Search engines 1.5.2.2. Basic Search operators 1.5.3. Safety on the Net 1.5.4. Web ethics. Internet and computer ethical behavior 1.6. Online business 1.6.1. Examples Page 4 of 11
2. INTRODUCTION TO E-COMMERCE 2.1. History of E-commerce 2.2. E-commerce and E-business 2.3. Advantages of E-commerce 2.4. Technologies for E-commerce 2.5. E-commerce cycle 2.6. Types of E-commerce 2.6.1. B2B 2.6.2. B2C 2.6.3. C2C 2.6.4. P2P 2.6.5. Other types (B2G, C2G) 2.6.5.1. E-government 3. E-BUSINESS MODELS 3.1. E-commerce business models Definitions 3.2. A framework for the classification of e-business models (according to European Commission) 3.2.1. Ε-shop 3.2.2. E-procurement 3.2.3. E-auction 3.2.4. Ε-mall 3.2.5. Ε-marketplace 3.2.6. Virtual communities 3.2.7. Value chain service provider 3.2.8. Value chain integrators 3.2.9. Collaboration platforms 3.2.10. Information brokerage 3.2.11. Trust and other services 3.2.12. Classification of e-business models 3.3. Conclusions 4. SECURITY AND ENCRYPTION 4.1. The E-commerce security environment Page 5 of 11
4.2. Common security threats in the E-commerce environment 4.2.1. Threats in a typical E-commerce transaction - Key points of vulnerability 4.2.2. Malicious code 4.2.3. Phishing 4.2.4. Hacking 4.2.5. Credit card fraud 4.2.6. Spoofing (Pharming) 4.2.7. Sniffing 4.2.8. Other threats 4.3. Technology solutions 4.3.1. Protecting Internet communications (encryption) 4.3.2. Securing channels of communication (SSL, Secure HTTP, VPN) 4.3.3. Protecting networks (firewalls) 4.3.4. Protecting servers and clients 4.4. Encryption 4.4.1. Introduction to encryption 4.4.2. History of encryption 4.4.3. Why you should use encryption? 4.4.4. Methods of encryption 4.4.4.1. Symmetric Key Encryption 4.4.4.2. Asymmetric Key Encryption 4.4.4.3. Comparison of symmetric and asymmetric algorithms 4.4.5. Public Key Infrastructure (PKI) 4.4.5.1. Public key encryption 4.4.5.2. Digital signature 4.4.5.3. Hash functions 4.4.5.4. Create and Verify Digital Signatures 4.4.5.5. Certification of digital signature 4.4.5.5.1. Registration Authority 4.4.5.5.2. Certification Authority 4.4.5.5.3. Dissemination Service 4.4.5.5.4. Revocation Management and Status Service 4.4.5.6. Encryption programs 4.4.5.6.1. PGP 4.4.5.6.2. X.509 4.5. Securing channels of communication 4.5.1. SSL 4.5.2. Secure HTTP 4.5.3. VPN 4.6. Protecting networks 4.6.1. Firewalls 4.6.2. Proxy servers 4.7. Protecting servers and clients 4.7.1. Authentication and access control mechanisms Page 6 of 11
4.7.2. Antivirus software 5. E-PAYMENT SYSTEMS 5.1. Types of payment systems 5.1.1. Cash, Checking transfer, Credit card, Store value card 5.2. Payment data 5.3. Introduction to E-payment system 5.4. Types of E-payment systems 5.4.1. Credit card 5.4.1.1. How an online credit card transaction works 5.4.1.2. The SET (Secure Electronic Transaction) protocol 5.4.1.3. How SET transaction work 5.4.2. Prepaid cards 5.4.3. Digital wallets 5.4.3.1. An introduction to PayPal 5.4.4. Debit cards 5.4.5. Money transfer services 5.5. Online payment methods 5.6. Future looks in payment systems 5.6.1. M-payment 6. BUILDING AN E-COMMERCE SITE 6.1 Decisions in building a site 6.2 In-house vs outsourcing 6.3 Factors in web site optimization 6.3.1 Page generation 6.3.2 Page content 6.3.3 Page delivery 6.4 Web site architecture 6.4.1 1-tier 6.4.2 2-tier 6.4.3 3-tier 6.4.4 Multi-tier Page 7 of 11
6.5 Web server software 6.5.1 The web server software choice 6.5.2 Basic functionalities provided by web servers 6.5.3 Client side programming 6.5.3.1 Active X Controls 6.5.3.2 Plug ins 6.5.3.3 JavaScript 6.5.3.4 VBScript 6.5.3.5 Java Applets 6.5.4 Server side programming 6.5.4.1 Cgi 6.5.4.2 Asp 6.5.4.3 Php 6.5.4.4 Jsp 6.5.5 Comparison of technologies 6.6 Application servers 6.7 Database Management Systems 6.7.1 Microsoft SQL Server 6.7.2 MySQL 6.7.3 Oracle database 6.7.4 Sybase Adaptive Server Enterprise 6.7.5 PostgreSQL 6.8 Case studies 6.9 Choosing hardware 6.10 Website design 6.10.1 Content management 6.10.2 Presentation plan 6.10.3 Navigation plan 6.10.4 Web authoring tools 6.10.4.1 Microsoft FrontPage 6.10.4.2 Macromedia Dreamweaver 6.10.4.3 Adobe Go Live 6.11 Page delivery 6.11.1 Telecommunication infrastructure needs and demand 6.12 E-banking 6.12.1 E-banking solutions in Greece 6.13 Outsourcing 6.13.1 Choosing the best solution Page 8 of 11
7. INTERNET MARKETING STRATEGIES 7.1 Intro to Internet marketing 7.2 Internet Marketing Technologies 7.2.1 Web transaction logs 7.2.2 Cookies and Web bugs 7.2.3 Databases, data warehouses and data mining 7.2.4 Advertising networks 7.2.4.1 Case study. Double click 7.2.5 Customer Relationship Management (CRM) systems 7.3 Website promotion methods 7.4 Search Engine Submission Service - Listing a website in Search Results 7.4.1 How web search engines work 7.4.2 Key-words 7.4.3 Meta tags 7.4.4 Web crawlers 7.4.5 Fundamental differences between search engines 7.4.6 Search engine optimization 7.4.7 How Google AdWords work 7.5 Ε-mail marketing 7.5.1 An approach to the spam problem 7.6 Display and Rich Media Ads 7.6.1 Banner and pop ups 7.7 Other forms of online advertisements 7.7.1 Referrals (affiliate relationship marketing) 7.7.2 Blog advertising 7.8 Viral marketing 7.8.1 Case study: Hotmail, Amazon, Geocities, ICQ 7.9 Traditional offline communications 7.10 Mixing offline and online marketing communications 7.11 How well does online advertising work 8. WEB PRESENCE EVALUATION 8.1 Measuring online marketing results Page 9 of 11
8.2 Information from analysis 8.3 Validation of information 8.4 Log analyzer software 8.5 Glossary 8.5.1 Hits 8.5.2 Requests or page views 8.5.3 Impressions 8.5.4 Users ή Unique IP Addresses 8.5.5 CTR (Click Through Rate) 8.5.6 Visits (or sessions) 8.5.7 Average requests per visit 8.5.8 Request duration 8.5.9 Entry pages 8.5.10 Exit pages 8.5.11 Errors (or 404 Errors) 8.5.12 Referrer Data (or Referrals) 8.6 Popularity references 9. LEGAL ASPECTS OF E-COMMERCE 9.1. Η Ευρωπαϊκή και Ελληνική νοµοθεσία για τις ηλεκτρονικές συναλλαγές σήµερα 9.2. The legal framework for e-markets in Europe 9.3. EU legislation 9.3.1. E-commerce E-transactions 9.3.2. Communications 9.3.3. E-payment systems 9.3.4. Domain name registration 9.3.5. Copyright intellectual property 9.3.6. E-crime 9.3.7. Data protection 9.3.8. Consumer protection 9.3.9. Tax 9.4. Greek legislation 9.5. EU Directives. Adaptation on Greek legislation. 9.5.1. The E-Commerce Directive (2000/31/EC) 9.5.1.1. Key points 9.5.1.2. Application results 9.5.2. Directive 1999/93/EC for electronic signatures Page 10 of 11
9.5.2.1. Key points 9.5.3. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data 9.5.3.1. Key points 9.6. Conclusions End of Syllabus Page 11 of 11