Become a Certified IT Security Specialist in 5 Days
|Christmas Category :
| Description :
||EXECUTIVE SUMMARY: CERTIFIED SECURITY SPECIALIST
EC-Council Certified Security Specialist (ECSS) allows participants to enhance their skills in three differ¬ent areas namely information security, network security, and computer forensics.
Information security plays a vital role in most of the organizations. Information security is a state of affairs where information, information processing, and communication are protected against the con¬fidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.
Network security plays a vital role in most of the organizations. It is the process of preventing and detecting the unauthorized use of your computer. It protects the networks and their services from the unauthorized modification, destruction, or disclosure. Network security provides assurance that a net¬work performs its critical functions correctly and there are no harmful side effects.
Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases.
This course will benefit the participants who are interested in learning fundamentals of information secu¬rity, network security, and computer forensics.
The EC-Council Certified Security Specialist (ECSS) program is designed primarily for participants of academic institutions. It covers the fundamental basics of information security, computer forensics, and network security.
The program will give a holistic overview of the key components of information security. Participants, who complete the ECSS program, will be equipped with the adequate foundation knowledge and should be able to progress onto the next level.
EC- COUNCIL CERTIFIED SECURITY SPECIALIST (ECSS)
FUNDAMENTALS IN INFORMATION SECURITY CERTIFICATION
Information Security Course Outline:
Information Security Fundamentals
Backdoors, virus and worms
Introduction to Linux Operating System
Web Servers and web applications
Intrusion Detection System
Firewalls and Honey Pots.
Introduction to Ethical Hacking
FUNDAMENTALS IN NETWORK SECURITY CERTIFICATION
Network Security Course Outline:
Secure Network Protocols
Introduction to Intrusion Detection System (IDS)
Bastion hosts and DMZ
Virtual Private Network
Introduction to Wireless Network Security
FUNDAMENTALS IN COMPUTER FORENSICS CERTIFICATION
Computer Forensics Course Outline:
Computer Forensics fundamentals
Trademark, copyright and patents
Network and Router Forensics Fundamentals
Incident Response and Forensics
Understanding Windows, DOS , Linux and Macintosh
E-mail crime and computer forensics
Introduction to writing investigative reports
Computer Forensics as a Profession
WHO SHOULD ATTEND
This course will significantly benefit individuals who are entering into the world of computer security. ECSS is an entry level security program.
The ECSS exam will be conducted on the last day of training. Participants need to pass the online Pro¬metric exam to receive the ECSS certification.
GHC 800 (including international exams Fees)
PETER EBO TOBBIN
(BA(Hons) Business Accounting (University of Humberside & Lincolnshire), (MSc Information Technology Security (University of Westminster),PhD Telecommunication and ICT ( Aalborg University,Denmark).
Information Technology Infrastructure Library (ITIL v3) Manager
CCNP Cisco Certified Network Professional
CISM - Certified Information Security Manager, ISACA
CEH Certified Ethical Hacker
CISSP - Certified Information Systems Security Professional, ISC2
MCSE Microsoft Certified System Engineer
CNA - Certified Novell Administrator (4.11)
CCSP Cisco Certified Security Professional
CLAS CESG Listed Advisory Scheme
CCSE Checkpoint Certified Security Engineer
CCNA Cisco Certified Network Administrator
CCIE Cisco Certified Internetworking Expert Security (Written)
BS7799 Lead Auditor
Comdisco Certified Training: Disaster Recovery and Business Continuity Planning and Implementation
| Date :
| Time :
| Venue :
||CIPD - GIMPA
|Contact Name :
||Alexandra or Regina
|Contact Phone :
||0244865815 or 0246015233
|Contact Email :
||email@example.com or firstname.lastname@example.org
Copyright © BusinessGhana. All Rights Reserved.