EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.
EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
TARGET AUDIENCE:
This course will benefit students who are interested in learning the fundamentals of information security, network security, and computer forensics.
COURSE PREREQUISITES:
Not available. Please contact.
COURSE CONTENT:
• Information Security Fundamentals
• Networking Fundamentals
• Secure Network Protocols
• Information Security Threats and Attacks
• Social Engineering
• Identification, Authentication, and Authorization
• Cryptography
• Firewalls
• Intrusion Detection System
• Data Backup
• Virtual Private Network
• Wireless Network Security
• Web Security
• Ethical Hacking and Pen Testing
• Incident response
• Computer Forensics Fundamentals
• Digital evidence
• Understanding File Systems
• Windows forensics
• Network Forensics and Investigating Network Traffic
• Steganography
• Analyzing logs
• E-mail Crime and Computer Forensics
• Writing Investigative Report
COURSE OBJECTIVE:
• Key issues plaguing the information security, network security, and computer forensics
• Fundamentals of networks and various components of the OSI and TCP/IP model
• Various network security protocols
• Various types of information security threats and attacks, and their countermeasures
• Social engineering techniques, identify theft, and social engineering countermeasures
• Different stages of hacking cycle
• Identification, authentication, and authorization concepts
• Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
• Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypo
• Fundamentals of IDS and IDS evasion techniques
• Data backup techniques and VPN security
FOLLOW ON COURSES:
Not available. Please contact.