EC-COUNCIL CERTIFIED SECURITY SPECIALIST
EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.
EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
Objetivos
Fundamentals of networks and various components of the OSI and TCP/IP model
Various network security protocols
Various types of information security threats and attacks, and their countermeasures
Social engineering techniques, identify theft, and social engineering countermeasures
Different stages of hacking cycle
Identification, authentication, and authorization concepts
Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypo
Fundamentals of IDS and IDS evasion techniques
Data backup techniques and VPN security
Ciberseguridad
Disponible en formato e-learning
Disponible en formato presencial
Disponible en formato a distancia
Descargar la información del curso
Subvención disponible
A través de Fundae, cumpliendo requisitos.
Duración
25 horas
- Dificultad 50%
- Nivel alcanzado 80%
Dirigido a
This course will benefit students who are interested in learning the fundamentals of information security, network security, and computer forensics.
Conocimientos requeridos
nan
Temario
Information Security Fundamentals
Networking Fundamentals
Secure Network Protocols
Information Security Threats and Attacks
Social Engineering
Identification, Authentication, and Authorization
Cryptography
Firewalls
Intrusion Detection System
Data Backup
Virtual Private Network
Wireless Network Security
Web Security
Ethical Hacking and Pen Testing
Incident response
Computer Forensics Fundamentals
Digital evidence
Understanding File Systems
Windows forensics
Network Forensics and Investigating Network Traffic
Steganography
Analyzing logs
E-mail Crime and Computer Forensics
Writing Investigative Report
Comentarios recientes