Home  |  Login  |  FAQ  |  Advertise  |  Services  |  Recommend  |  FeedBack  |  Contact Us  
Home

 Other Sections
News
ACN Ghana 2008
Sports
Finance
Business Directory
Online Forms
Real Estate
Classifieds
Auto
Jobs
Events
Downloads
World Cup 2010
Travel
About Ghana
Our Services
Christmas
Christmas Events » List Events
« Previous Event Next Event »

Become a Certified IT Security Specialist in 5 Days
Event Information Recommend this Item


Christmas Category : Training Program
Description : EXECUTIVE SUMMARY: CERTIFIED SECURITY SPECIALIST
EC-Council Certified Security Specialist (ECSS) allows participants to enhance their skills in three differ¬ent areas namely information security, network security, and computer forensics.
Information security plays a vital role in most of the organizations. Information security is a state of affairs where information, information processing, and communication are protected against the con¬fidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that cover identification of the parties, verifying, and recording the approval and authorization of the information, non-alteration of the data, and the non-repudiation of the communication or stored data.
Network security plays a vital role in most of the organizations. It is the process of preventing and detecting the unauthorized use of your computer. It protects the networks and their services from the unauthorized modification, destruction, or disclosure. Network security provides assurance that a net¬work performs its critical functions correctly and there are no harmful side effects.
Computer forensics is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases.
This course will benefit the participants who are interested in learning fundamentals of information secu¬rity, network security, and computer forensics.
The EC-Council Certified Security Specialist (ECSS) program is designed primarily for participants of academic institutions. It covers the fundamental basics of information security, computer forensics, and network security.
The program will give a holistic overview of the key components of information security. Participants, who complete the ECSS program, will be equipped with the adequate foundation knowledge and should be able to progress onto the next level.


COURSE OUTLINE
EC- COUNCIL CERTIFIED SECURITY SPECIALIST (ECSS)

FUNDAMENTALS IN INFORMATION SECURITY CERTIFICATION
Information Security Course Outline:
• Information Security Fundamentals
• Addressing Threats
• Backdoors, virus and worms
• Introduction to Linux Operating System
• Password Cracking
• Cryptography
• Web Servers and web applications
• Wireless Networks
• Intrusion Detection System
• Firewalls and Honey Pots.
• Hacking Cycle
• Introduction to Ethical Hacking
FUNDAMENTALS IN NETWORK SECURITY CERTIFICATION
Network Security Course Outline:
• Networking Revisited
• Secure Network Protocols
• Authentication
• Network Attacks
• Introduction to Intrusion Detection System (IDS)
• Firewalls
• Bastion hosts and DMZ
• Proxy servers
• Virtual Private Network
• Introduction to Wireless Network Security
FUNDAMENTALS IN COMPUTER FORENSICS CERTIFICATION

Computer Forensics Course Outline:
• Computer Forensics fundamentals
• Trademark, copyright and patents
• Network and Router Forensics Fundamentals
• Incident Response and Forensics
• Digital Evidence
• Understanding Windows, DOS , Linux and Macintosh
• Steganography
• Analyzing logs
• E-mail crime and computer forensics
• Introduction to writing investigative reports
• Computer Forensics as a Profession
WHO SHOULD ATTEND
This course will significantly benefit individuals who are entering into the world of computer security. ECSS is an entry level security program.
CERTIFICATION
The ECSS exam will be conducted on the last day of training. Participants need to pass the online Pro¬metric exam to receive the ECSS certification.
COURSE FEE
GHC 800 (including international exams Fees)
DURATION
5 days

FACILITATOR
PETER EBO TOBBIN

(BA(Hons) – Business Accounting (University of Humberside & Lincolnshire), (MSc – Information Technology Security (University of Westminster),PhD Telecommunication and ICT ( Aalborg University,Denmark).
• Information Technology Infrastructure Library (ITIL v3) – Manager
• CCNP – Cisco Certified Network Professional
• CISM - Certified Information Security Manager, ISACA
• CEH – Certified Ethical Hacker
• CISSP - Certified Information Systems Security Professional, ISC2
• MCSE – Microsoft Certified System Engineer
• CNA - Certified Novell Administrator (4.11)
• CCSP – Cisco Certified Security Professional
• CLAS – CESG Listed Advisory Scheme
• CCSE – Checkpoint Certified Security Engineer
• CCNA – Cisco Certified Network Administrator
• CCIE – Cisco Certified Internetworking Expert – Security (Written)
• BS7799 Lead Auditor
• Comdisco Certified Training: Disaster Recovery and Business Continuity Planning and Implementation
Date : 2011-12-05
Time : 09:00 AM
Venue : GIMPA Campus
Price : ’ 0.00


Contact Information

Organiser : CIPD - GIMPA
Contact Name : Alexandra or Regina
Contact Phone : 0244865815 or 0246015233
Contact Email : alexandra@cipdgimpa.edu.gh or regina@cipdgimpa.edu.gh
Recommend this event


« Previous Event Next Event »

 Search Christmas
 
 Advanced Search

ADVERTISEMENT

Copyright © BusinessGhana. All Rights Reserved.

Legal