Certified E-commerce Consultant (CEC)



Similar documents
Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Certified Secretaries Management Assistants (CSMA) Syllabus. Version 1.0

Chapter 4: Networking and the Internet

Introduction to E-commerce

Certificate in Web Development and Administration

The Information Security Problem

Web Security, Privacy, and Commerce

IT3503 Web Development Techniques (Optional)

CIWv5 E-Commerce Designer Preliminary Blueprint (May 2005 Release)

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

SSL Overview for Resellers

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Lotus Domino Security

Entrepreneurship and the Internet

Answer Question No. 1 which is compulsory and any five from the rest. a) What are the various components of electronic commerce applications?

Networking: EC Council Network Security Administrator NSA

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Web Hosting/Domain Names

Introduction to Cyber Security / Information Security

Pemrograman Web. 1. Pengenalan Web Server. M. Udin Harun Al Rasyid, S.Kom, Ph.D

How To Choose The Right Affiliate Tracking Software

Internet marketing techniques (CPL, Banner Exchange, Opt-In lists, Commission Junction, Click Trade, bcentral, Value Click, etc)

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

OCR LEVEL 3 CAMBRIDGE TECHNICAL

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Web Hosting Features. Small Office Premium. Small Office. Basic Premium. Enterprise. Basic. General

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

E-Business, E-Commerce

Detailed Table of Contents

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Additional information >>> HERE <<< Getting Instant Access free web hosting with cpanel and mysql Real User Experience

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Chapter 4. Learning Objectives. Learning Objectives. Building an E-commerce Web Site. Building an E-commerce Web Site: A Systematic Approach

AUSTIN COMMUNITY COLLEGE CONTINUING EDUCATION. Marketing on The World Wide Web. (18 hours) ITNW 6023 COURSE SYLLABUS

Security Evaluation CLX.Sentinel

Security + Certification (ITSY 1076) Syllabus

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

GUIDE TO WEBSITES AND E-COMMERCE

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005

IT3504: Web Development Techniques (Optional)

Web and e-business Technologies

E-COMMERCE and SECURITY - 1DL018

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

KERN COMMUNITY COLLEGE DISTRICT CERRO COSO COLLEGE DMA C201 COURSE OUTLINE OF RECORD

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.

E-Customer Relationship Management

Web Application Worms & Browser Insecurity

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

TIME SCHEDULE OBJECTIVES

Quick Reference Guide: Shared Hosting

Security aspects of e-tailing. Chapter 7

Sage HRMS 2014 Sage Employee Self Service

Web Foundations Series Internet Business Associate

Web 2.0 Technology Overview. Lecture 8 GSL Peru 2014

How to check if I care for the safety of my Clients?

Syllabus E-Business and E-commerce

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1

AASTMT Acceptable Use Policy

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Electronic Commerce. Chapter Overview

DKIM Enabled Two Factor Authenticated Secure Mail Client

ebusiness & ecommerce

Using etoken for SSL Web Authentication. SSL V3.0 Overview

The e-payment Systems

Protecting Your Organisation from Targeted Cyber Intrusion

THE COMPLETE GUIDE TO AFFILIATE MARKETING ON THE WEB

Network Security Bible Dr. Eric Cole, Dr. Ronald Krutz, and James W. Conley WILEY

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluating the impact of research online with Google Analytics

Chapter 11: E-Commerce

Fundamental Points of the ABScard Technology

Transferring Your Hosting Account

JVA-122. Secure Java Web Development

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE

Cornerstones of Security

End User Guide The guide for /ftp account owner

Chapter 6. E-commerce Marketing Concepts. Copyright 2009 Pearson Education, Inc. Slide 6-1

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Basics of Internet Security

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Client Server Registration Protocol


INFORMATION SECURITY TRAINING CATALOG (2015)

Internet Marketing [points 1-8] INR 17,950 (16,000+1,950) (inclusive of all taxes)

INSTANT MESSAGING SECURITY

Detailed Description about course module wise:

III B.Com. (International Business) [ ] Semester: V Core: Practices of E-Business 517B Multiple Choice Questions.

Business Information System Courses Description

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire


Hong Kong Baptist University

Web Extras. Customer Service Description. Version 3.0. February 26, 2002

Transcription:

Certified E-commerce Consultant (CEC) Syllabus

Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without written permission from the issuer is strictly prohibited. Its disposal is permitted in unchanged form and solely for informational purposes. Declaration of Responsibilities ACTA S.A. hereby declares that they carry out constant inspections so that this syllabus strictly covers the quality criteria in terms of the validity of its contents. Nevertheless, they carry no responsibility for any damage that may occur through the use of a part or of the whole of this syllabus. Its content may be modified or revoked whenever necessary with no previous notification. Syllabus Update The syllabus is published at: www.acta.edu.gr and is the only one that ACTA S.A. recognizes as an information point for those concerned. ACTA S.A. Thessaloniki: Egnatias 1 P.O. Box: 54630 Tel.: +30 2310 510870 Fax: 2310 510871 email: info@acta.edu.gr Athens: V. Sofias 55 P.O. Box: 11521 Tel.: +30 210 7239770 Fax: 210 7239777 email: athens@acta.edu.gr Page 2 of 11

Syllabus Content Sections 1. INTERNET AND ENTREPRENEURSHIP... 4 2. INTRODUCTION TO E-COMMERCE... 5 3. E-BUSINESS MODELS... 5 4. SECURITY AND ENCRYPTION... 5 5. E-PAYMENT SYSTEMS... 7 6. BUILDING AN E-COMMERCE SITE... 7 7. INTERNET MARKETING STRATEGIES... 9 8. WEB PRESENCE EVALUATION... 9 9. LEGAL ASPECTS OF E-COMMERCE... 10 Page 3 of 11

Explanatory Note The candidates must be familiar with the basic concepts of e-commerce. Start of Syllabus 1. INTERNET AND ENTREPRENEURSHIP 1.1. Growth of the Internet 1.2. The Internet: key technology concepts 1.2.1. Client/server computing 1.2.2. Communications protocols 1.2.3. Domain Name System (DNS) 1.3. Internet services 1.3.1. World Wide Web (www) 1.3.2. E-Mail 1.3.3. Telnet 1.3.4. File Transfer Protocol (FTP) 1.3.5. Other services 1.4. Accessing the internet 1.4.1. Common methods of internet access 1.5. Browsing the web 1.5.1. Web Browsers and World Wide Web 1.5.2. Search engines 1.5.2.1. Introduction to Search engines 1.5.2.2. Basic Search operators 1.5.3. Safety on the Net 1.5.4. Web ethics. Internet and computer ethical behavior 1.6. Online business 1.6.1. Examples Page 4 of 11

2. INTRODUCTION TO E-COMMERCE 2.1. History of E-commerce 2.2. E-commerce and E-business 2.3. Advantages of E-commerce 2.4. Technologies for E-commerce 2.5. E-commerce cycle 2.6. Types of E-commerce 2.6.1. B2B 2.6.2. B2C 2.6.3. C2C 2.6.4. P2P 2.6.5. Other types (B2G, C2G) 2.6.5.1. E-government 3. E-BUSINESS MODELS 3.1. E-commerce business models Definitions 3.2. A framework for the classification of e-business models (according to European Commission) 3.2.1. Ε-shop 3.2.2. E-procurement 3.2.3. E-auction 3.2.4. Ε-mall 3.2.5. Ε-marketplace 3.2.6. Virtual communities 3.2.7. Value chain service provider 3.2.8. Value chain integrators 3.2.9. Collaboration platforms 3.2.10. Information brokerage 3.2.11. Trust and other services 3.2.12. Classification of e-business models 3.3. Conclusions 4. SECURITY AND ENCRYPTION 4.1. The E-commerce security environment Page 5 of 11

4.2. Common security threats in the E-commerce environment 4.2.1. Threats in a typical E-commerce transaction - Key points of vulnerability 4.2.2. Malicious code 4.2.3. Phishing 4.2.4. Hacking 4.2.5. Credit card fraud 4.2.6. Spoofing (Pharming) 4.2.7. Sniffing 4.2.8. Other threats 4.3. Technology solutions 4.3.1. Protecting Internet communications (encryption) 4.3.2. Securing channels of communication (SSL, Secure HTTP, VPN) 4.3.3. Protecting networks (firewalls) 4.3.4. Protecting servers and clients 4.4. Encryption 4.4.1. Introduction to encryption 4.4.2. History of encryption 4.4.3. Why you should use encryption? 4.4.4. Methods of encryption 4.4.4.1. Symmetric Key Encryption 4.4.4.2. Asymmetric Key Encryption 4.4.4.3. Comparison of symmetric and asymmetric algorithms 4.4.5. Public Key Infrastructure (PKI) 4.4.5.1. Public key encryption 4.4.5.2. Digital signature 4.4.5.3. Hash functions 4.4.5.4. Create and Verify Digital Signatures 4.4.5.5. Certification of digital signature 4.4.5.5.1. Registration Authority 4.4.5.5.2. Certification Authority 4.4.5.5.3. Dissemination Service 4.4.5.5.4. Revocation Management and Status Service 4.4.5.6. Encryption programs 4.4.5.6.1. PGP 4.4.5.6.2. X.509 4.5. Securing channels of communication 4.5.1. SSL 4.5.2. Secure HTTP 4.5.3. VPN 4.6. Protecting networks 4.6.1. Firewalls 4.6.2. Proxy servers 4.7. Protecting servers and clients 4.7.1. Authentication and access control mechanisms Page 6 of 11

4.7.2. Antivirus software 5. E-PAYMENT SYSTEMS 5.1. Types of payment systems 5.1.1. Cash, Checking transfer, Credit card, Store value card 5.2. Payment data 5.3. Introduction to E-payment system 5.4. Types of E-payment systems 5.4.1. Credit card 5.4.1.1. How an online credit card transaction works 5.4.1.2. The SET (Secure Electronic Transaction) protocol 5.4.1.3. How SET transaction work 5.4.2. Prepaid cards 5.4.3. Digital wallets 5.4.3.1. An introduction to PayPal 5.4.4. Debit cards 5.4.5. Money transfer services 5.5. Online payment methods 5.6. Future looks in payment systems 5.6.1. M-payment 6. BUILDING AN E-COMMERCE SITE 6.1 Decisions in building a site 6.2 In-house vs outsourcing 6.3 Factors in web site optimization 6.3.1 Page generation 6.3.2 Page content 6.3.3 Page delivery 6.4 Web site architecture 6.4.1 1-tier 6.4.2 2-tier 6.4.3 3-tier 6.4.4 Multi-tier Page 7 of 11

6.5 Web server software 6.5.1 The web server software choice 6.5.2 Basic functionalities provided by web servers 6.5.3 Client side programming 6.5.3.1 Active X Controls 6.5.3.2 Plug ins 6.5.3.3 JavaScript 6.5.3.4 VBScript 6.5.3.5 Java Applets 6.5.4 Server side programming 6.5.4.1 Cgi 6.5.4.2 Asp 6.5.4.3 Php 6.5.4.4 Jsp 6.5.5 Comparison of technologies 6.6 Application servers 6.7 Database Management Systems 6.7.1 Microsoft SQL Server 6.7.2 MySQL 6.7.3 Oracle database 6.7.4 Sybase Adaptive Server Enterprise 6.7.5 PostgreSQL 6.8 Case studies 6.9 Choosing hardware 6.10 Website design 6.10.1 Content management 6.10.2 Presentation plan 6.10.3 Navigation plan 6.10.4 Web authoring tools 6.10.4.1 Microsoft FrontPage 6.10.4.2 Macromedia Dreamweaver 6.10.4.3 Adobe Go Live 6.11 Page delivery 6.11.1 Telecommunication infrastructure needs and demand 6.12 E-banking 6.12.1 E-banking solutions in Greece 6.13 Outsourcing 6.13.1 Choosing the best solution Page 8 of 11

7. INTERNET MARKETING STRATEGIES 7.1 Intro to Internet marketing 7.2 Internet Marketing Technologies 7.2.1 Web transaction logs 7.2.2 Cookies and Web bugs 7.2.3 Databases, data warehouses and data mining 7.2.4 Advertising networks 7.2.4.1 Case study. Double click 7.2.5 Customer Relationship Management (CRM) systems 7.3 Website promotion methods 7.4 Search Engine Submission Service - Listing a website in Search Results 7.4.1 How web search engines work 7.4.2 Key-words 7.4.3 Meta tags 7.4.4 Web crawlers 7.4.5 Fundamental differences between search engines 7.4.6 Search engine optimization 7.4.7 How Google AdWords work 7.5 Ε-mail marketing 7.5.1 An approach to the spam problem 7.6 Display and Rich Media Ads 7.6.1 Banner and pop ups 7.7 Other forms of online advertisements 7.7.1 Referrals (affiliate relationship marketing) 7.7.2 Blog advertising 7.8 Viral marketing 7.8.1 Case study: Hotmail, Amazon, Geocities, ICQ 7.9 Traditional offline communications 7.10 Mixing offline and online marketing communications 7.11 How well does online advertising work 8. WEB PRESENCE EVALUATION 8.1 Measuring online marketing results Page 9 of 11

8.2 Information from analysis 8.3 Validation of information 8.4 Log analyzer software 8.5 Glossary 8.5.1 Hits 8.5.2 Requests or page views 8.5.3 Impressions 8.5.4 Users ή Unique IP Addresses 8.5.5 CTR (Click Through Rate) 8.5.6 Visits (or sessions) 8.5.7 Average requests per visit 8.5.8 Request duration 8.5.9 Entry pages 8.5.10 Exit pages 8.5.11 Errors (or 404 Errors) 8.5.12 Referrer Data (or Referrals) 8.6 Popularity references 9. LEGAL ASPECTS OF E-COMMERCE 9.1. Η Ευρωπαϊκή και Ελληνική νοµοθεσία για τις ηλεκτρονικές συναλλαγές σήµερα 9.2. The legal framework for e-markets in Europe 9.3. EU legislation 9.3.1. E-commerce E-transactions 9.3.2. Communications 9.3.3. E-payment systems 9.3.4. Domain name registration 9.3.5. Copyright intellectual property 9.3.6. E-crime 9.3.7. Data protection 9.3.8. Consumer protection 9.3.9. Tax 9.4. Greek legislation 9.5. EU Directives. Adaptation on Greek legislation. 9.5.1. The E-Commerce Directive (2000/31/EC) 9.5.1.1. Key points 9.5.1.2. Application results 9.5.2. Directive 1999/93/EC for electronic signatures Page 10 of 11

9.5.2.1. Key points 9.5.3. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data 9.5.3.1. Key points 9.6. Conclusions End of Syllabus Page 11 of 11