ECSS: EC-Council Certified Security Specialist

EC-Council Certified Security Specialist

(EDRP)

EC-Council

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security. 

Next Available Date

Class-room

I would like to receive email from Makintouch Consulting and learn about other offerings related to this course.

Course Description

Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security. 

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.

Target Audience

ECSS is designed for anyone who want to enhance their skills and make career in information security, network security, and computer forensics fields.

Prerequisites

No formal pre-requisites for this course.

Course Outline

  • Information Security Fundamentals
  • Web Security
  • Ethical Hacking and Pen Testing
  • Incident Response
  • Information Security Threats and Attack
  • Computer Forensics Fundamentals
  • Digital Evidence
  • Understanding File Systems
  • Windows Forensics
  • Steganography
  • Analyzing Logs
  • E-mail Crime and Computer Forensics
  • Writing Investigative Report
  • Network Forensics and Investigating
  • Network Traffic
  • Networking Fundamentals
  • Secure Network Protocols
  • Hacking Cycle
  • Cryptography
  • Firewalls
  • Intrusion Detection System
  • Data Backup
  • Virtual Private Network
  • Wireless Network Security
  • Identification, Authentication, and Authorization
  • Social Engineering

Course Objectives

By the end of this training you will:

  • Acquire the relevant knowledge and skills required to clear the PMP® certification exam
  • Key issues plaguing the information security, network security, and computer forensics
  • Fundamentals of networks and various components of the OSI and TCP/IP model
  • Various types of information security threats and attacks, and their countermeasures
  • Identification, authentication, and authorization concepts
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Fundamentals of IDS and IDS evasion techniques
  • Data backup techniques and VPN security
  • Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot Social engineering techniques, identify theft, and social engineering countermeasures
  • Different stages of hacking cycle
  • Various network security protocols
  • Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security
  • Different types of web server and web application attacks, and countermeasures
  • Fundamentals of ethical hacking and pen testing
  • Incident handling and response process
  • Cyber-crime and computer forensics investigation methodology
  • Different types of digital evidence and digital evidence examination process
  • Different type of file systems and their comparison (based on limit and features)
  • Steganography and its techniques
  • Different types of log capturing, time synchronization, and log capturing tools
  • E-mails tracking and e-mail crimes investigation
  • Writing investigation report
  • Gathering volatile and non-volatile information from Windows and network
  • forensics analysis mechanism

Need more info? Let us know and we will be happy to respond

DETAILS


5 DAYS
INTERMEDIATE
LAGOS, ABUJA

Our Popular Courses

We are always there to support you!

Whether you are looking to accelerate your career, earn your certification, or learn something for personal reasons, Makintouch got you covered.

CEH v.1095%
CISSP85%
Project Management Professional95%
Installing & Config. Windows Server 201690%
Advanced Excel75%

php shell download
istanbul escort