Have a question?
Name
Email
Preferred Mode of Training
Notes
Delete file
Are you sure you want to delete this file?
Message sent Close

EC-Council Certified Security Specialist (ECSS)

0
0 reviews
  • Description
  • Reviews
Groovy Programming

EC-COUNCIL CERTIFIED SECURITY SPECIALIST (ECSS)

COURSE DESCRIPTION

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.

WHO IS IT FOR:

ECSS is designed for anyone who want to enhance their skills and make career in information security, network security, and computer forensics fields.

COURSE OUTLINE

Module 01: Network Security Fundamentals

Module 02: Identification, Authentication and Authorization

Module 03: Network Security Controls – Administrative Controls

Module 04: Network Security Controls – Physical Controls

Module 05: Network Security Controls – Technical Controls

Module 06: Virtualization and Cloud Computing

Module 07: Wireless Network Security

Module 08: Mobile Device Security

Module 09: IoT Device Security

Module 10: Cryptography and PKI

Module 11: Data Security

Module 12: Network Traffic Monitoring

Module 13: Information Security Fundamentals

Module 14: Ethical Hacking Fundamentals

Module 15: Information Security Threats and Vulnerability Assessment

Module 16: Password Cracking Techniques and Countermeasures

Module 17: Social Engineering Techniques and Countermeasures

Module 18: Network Level Attacks and Countermeasures

Module 19: Web Application Attacks and Countermeasures

Module 20: Wireless Attacks and Countermeasures

Module 21: Mobile Attacks and Countermeasures

Module 22: IoT and OT Attacks and Countermeasures

Module 23: Cloud Computing Threats and Countermeasures

Module 24: Penetration Testing Fundamentals

Module 25: Computer Forensics Fundamentals

Module 26: Computer Forensics Investigation Process

Module 27: Understanding Hard Disks and File Systems

Module 28: Data Acquisition and Duplication

Module 29: Defeating Anti-forensics Techniques

Module 30: Windows Forensics

Module 31: Linux and Mac Forensics

Module 32: Network Forensics

Module 33: Investigating Web Attacks

Module 34: Dark Web Forensics

Module 35: Investigating Email Crimes

Module 36: Malware Forensics

Please contact us for the full course outline, schedules and for booking a private class.

Inquire Now

Share

Archive

Working hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday Closed
Sunday Closed