EC-Council Certified Security Specialist (ECSS)
- Description
- Reviews
EC-COUNCIL CERTIFIED SECURITY SPECIALIST (ECSS)
COURSE DESCRIPTION
EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
WHO IS IT FOR:
ECSS is designed for anyone who want to enhance their skills and make career in information security, network security, and computer forensics fields.
COURSE OUTLINE
Module 01: Network Security Fundamentals
Module 02: Identification, Authentication and Authorization
Module 03: Network Security Controls – Administrative Controls
Module 04: Network Security Controls – Physical Controls
Module 05: Network Security Controls – Technical Controls
Module 06: Virtualization and Cloud Computing
Module 07: Wireless Network Security
Module 08: Mobile Device Security
Module 09: IoT Device Security
Module 10: Cryptography and PKI
Module 11: Data Security
Module 12: Network Traffic Monitoring
Module 13: Information Security Fundamentals
Module 14: Ethical Hacking Fundamentals
Module 15: Information Security Threats and Vulnerability Assessment
Module 16: Password Cracking Techniques and Countermeasures
Module 17: Social Engineering Techniques and Countermeasures
Module 18: Network Level Attacks and Countermeasures
Module 19: Web Application Attacks and Countermeasures
Module 20: Wireless Attacks and Countermeasures
Module 21: Mobile Attacks and Countermeasures
Module 22: IoT and OT Attacks and Countermeasures
Module 23: Cloud Computing Threats and Countermeasures
Module 24: Penetration Testing Fundamentals
Module 25: Computer Forensics Fundamentals
Module 26: Computer Forensics Investigation Process
Module 27: Understanding Hard Disks and File Systems
Module 28: Data Acquisition and Duplication
Module 29: Defeating Anti-forensics Techniques
Module 30: Windows Forensics
Module 31: Linux and Mac Forensics
Module 32: Network Forensics
Module 33: Investigating Web Attacks
Module 34: Dark Web Forensics
Module 35: Investigating Email Crimes
Module 36: Malware Forensics
Please contact us for the full course outline, schedules and for booking a private class.
Inquire Now
Popular Courses
Archive
Working hours
Monday | 9:00 am - 6.00 pm |
Tuesday | 9:00 am - 6.00 pm |
Wednesday | 9:00 am - 6.00 pm |
Thursday | 9:00 am - 6.00 pm |
Friday | 9:00 am - 6.00 pm |
Saturday | Closed |
Sunday | Closed |