- Home
- Cyber Security
- EC-Council Security Specialist
EC-Council Security Specialist
Cyber Security
Description
Curriculum
Description
EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.
COURSE OVERVIEW
This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security
COURSE ACHIEVMENTS
- 100% Certification
- 60% Attendance
- 100% Competence
Curriculum
Course Details
- Module 01: Key issues plaguing the information security, network security, and computer forensics
- Module 02: Fundamentals of networks and various components of the OSI and TCP/IP model
- Module 03: Various network security protocols
- Module 04: Various types of information security threats and attacks, and their countermeasures
- Module 05: Social engineering techniques, identify theft, and social engineering countermeasures
- Module 06: Different stages of hacking cycle
- Module 07: Identification, authentication, and authorization concepts
- Module 08: Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Module 08: Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Module 08: Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Module 09: Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot
- Module 10: Fundamentals of IDS and IDS evasion techniques
- Module 11: Data backup techniques and VPN security
- Module 12: Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security
- Module 13: Different types of web server and web application attacks, and countermeasures
- Module 14: Fundamentals of ethical hacking and pen testing
- Module 15: Incident handling and response process
- Module 16: Cyber-crime and computer forensics investigation methodology
- Module 17: Different types of digital evidence and digital evidence examination process
- Module 18: Different type of file systems and their comparison (based on limit and features)
- Module 19: Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism
- Module 20: Steganography and its techniques
- Module 21: Different types of log capturing, time synchronization, and log capturing tools
- Module 22: E-mails tracking and e-mail crimes investigation
- Module 23: Writing investigation report