Computer Forensics and Security Institute

Size: px
Start display at page:

Download "Computer Forensics and Security Institute"

Transcription

1 Computer Forensics and Security Institute Course Brochure #3 De Verteuil Terrace,

2 Endeavour Road, Chaguanas, Trinidad, West Indies. Tel: Find us on Facebook: CFSI is a Registered Company as well as an ATC (Authorised Training Centre) and Authorised Testing Centre for the Ec-Council (www.eccouncil.org). 2

3 Contents: Find us on Facebook: 2 CompTIA Network+ (N10-005)... 3 Cisco Certified Network Associate (CCNA)... 5 Cisco Certified Network Professional (CCNP)... 6 Microsoft Certified Solutions Associate (MCSA 2012)... 8 Information Technology Infrastructure Library (ITIL) CompTIA Security+ (SY0-004) Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) EC-Council Certified Security Specialist (ECSS) EC-Council Certified Encryption Specialist (E CES) Project Management in IT Security (PMITS) EC-Council Network Security Administrator (ENSA) Certified Ethical Hacker (CEH) Version Computer Hacking Forensic Investigator (CHFI) Version Ec-Council Certified Systems Analyst (ECSA) Version HACKING AND PENETRATION TESTING KALI LINUX Find us on Facebook: 29 CompTIA Network+ (N10-005) 3

4 The CompTIA Network+ certification is the sign of a competent networking professional. It is an international, vendor-neutral certification that proves a technician s competency in managing, maintaining, troubleshooting, installing and configuring basic network infrastructure. Microsoft includes CompTIA Network+ in their Microsoft Certified Solutions Associate (MCSA) program, and other corporations such as Novell, Cisco and HP also recognize CompTIA Network+ as part of their certification tracks. Course Outline: Introduction to Networks Common Networking Protocols and Ports TCP/IP Addressing Routing Protocols Cables and Connectors Physical Network Topologies Wiring Distribution Components LAN Technologies WAN Technologies Wireless Technology Network Devices, Configuration and Management Network Monitoring and Optimization Network Troubleshooting Methodologies Common Network Troubleshooting Issues Network Scanners Firewalls IPSec VPN Tunnelling and Encryption Remote Access User Authentication Device Management Security Common Threats and Mitigation Hardware Tools Prerequisites: Working knowledge of Windows and the Internet. Contact Hours: 30 hrs. Who Should Attend: Computer Technicians and persons interested in moving on towards being Network Administrators or heading into IT Security as a career. 4

5 Cisco Certified Network Associate (CCNA) The Cisco Certified Network Associate (CCNA) certification validates your skills and knowledge required to deploy, maintain, secure and operate a medium-sized network using Cisco technologies. CCNA certified professionals can install, configure and operate LAN, WAN and dial access services for small networks. Students will gain the knowledge and skills required to operate, and troubleshoot a small to medium size enterprise branch network, including connecting to a WAN; implementing network security; network types; network media; routing and switching fundamentals; the WAN technologies as well as operating and configuring IOS devices. Course Outline: The OSI Model and TCP/IP Topologies, Transmission Media, Devices, Cables and Protocols. LAN Switches and the Cisco Switch IOS Securing, Optimizing and Troubleshooting Switches Wireless Networking, Security and Implementation Advanced TCP/IP: IP Subnetting, CIDR and VLSM Router and Routing Configurations SDM and DHCP Server Configuration Internet Access with NAT and PAT Telnet, SSH, and CDP Management and Security: File Management Configuring VLANs, Trunks, VTP and STP Distance Vector vs. Link State Protocols: RIP, OSPF, EIGRP Access-Lists: The Rules of the ACL Access-Lists: Configuring ACLs WAN Connectivity: VPN's, Frame Relay, ATM FDDI Prerequisites: Network+ and a thorough understanding of the OSI model. Contact Hours: 42 Who Should Attend: Computer and Network Technicians and Administrators as well as persons interested in moving on towards becoming Network / System Administrators and IT Professionals. 5

6 Cisco Certified Network Professional (CCNP) The Cisco CCNP curriculum is designed for students seeking career oriented, enterprise-level networking skills. CCNP equips students with the knowledge and skills needed to plan, implement, secure, maintain, and troubleshoot converged enterprise networks. The CCNP curriculum was designed to reflect the job skills and responsibilities that are associated with professional-level job roles such as network engineer, systems engineer, network support engineer, network administrator, network consultant, and system integrator. With a CCNP, a network professional can install, configure, and troubleshoot local and wide area networks for enterprise organizations with networks from 100 to more than 500 nodes. Introduction SWITCH :: Campus Network Design SWITCH :: Layer 2 Switching vs. Layer 3 Routing SWITCH :: VLANs SWITCH :: Trunking SWITCH :: DTP, Trunking Allowed Lists & VTP SWITCH :: Spanning Tree Protocol SWITCH :: STP Optimization SWITCH :: Cisco PVST+ Enhancements SWITCH :: Rapid STP & Multiple STP SWITCH :: MST Configuration SWITCH :: STP Features SWITCH :: EtherChannel SWITCH :: Inter-VLAN Routing SWITCH :: High Availability SWITCH :: High Availability Part 2 SWITCH :: Layer 2 Security SWITCH :: Layer 2 Voice & Video Support SWITCH :: Wireless ROUTE :: IP Routing Overview ROUTE :: EIGRP Overview ROUTE :: EIGRP DUAL Calculation ROUTE :: EIGRP Implementation Examples ROUTE :: EIGRP Features ROUTE :: OSPF Overview ROUTE :: OSPF SPF Calculation ROUTE :: OSPF Media Dependencies ROUTE :: Single Area OSPF Implementation Examples ROUTE :: OSPF Areas & LSA Types ROUTE :: Multi Area OSPF Implementation Examples ROUTE :: OSPF Features ROUTE :: BGP Overview ROUTE :: BGP Implementation Examples ROUTE :: BGP Full Mesh, Route Reflectors, Confederation, Security & NLRI Advertisements ROUTE :: BGP NLRI Aggregation & BGP Attributes ROUTE :: BGP Bestpath Selection ROUTE :: Redistribution Part 1 ROUTE :: Redistribution Part 2 ROUTE :: Redistribution Part 3 ROUTE :: Redistribution Part 4 ROUTE :: Policy-Based Routing 6

7 ROUTE :: IPv6 TSHOOT :: Troubleshooting Overview TSHOOT :: Exam Demo TSHOOT :: Troubleshooting Tools TSHOOT :: LAN Troubleshooting TSHOOT :: IPv4 IGP Troubleshooting TSHOOT :: EIGRP Troubleshooting TSHOOT :: OSPF Troubleshooting TSHOOT :: BGP Troubleshooting Part 1 TSHOOT :: BGP Troubleshooting Part 2 TSHOOT :: IPv6 Troubleshooting Part 1 TSHOOT :: IPv6 Troubleshooting Part 2 TSHOOT :: IP Services Troubleshooting Part 1 TSHOOT :: IP Services Troubleshooting Part 2 Prerequisites: CCNA (Certified Cisco Network Associate). Contact Hours: Who Should Attend: Computer and Network Technicians and Administrators as well as persons interested in moving on towards becoming Network / System Administrators and IT Professionals. 7

8 Microsoft Certified Solutions Associate (MCSA 2012) The MCSA course provides a working knowledge and understanding of designing, implementing, configuring and managing a Windows Server infrastructure, desktops and devices for small to enterprise level organizations. Students will implement and configure Windows Server 2012 core services, such as Active Directory and the networking services, administrator tasks necessary to maintain a Windows Server 2012 infrastructure, including user and group management, network access, and data security and perform advanced configuration tasks necessary to deploy, manage, and maintain a Windows Server 2012 infrastructure, including fault tolerance, certificate services, and identity federation. Windows Server 2012 certification involves taking and passing a series of three exams: Exam 410: Installing and Configuring Windows Server 2012 o Installing and Configuring Windows Server 2012 o Introduction to Active Directory Domain Services o Managing Active Directory Domain Services Objects o Automating Active Directory Domain Services Administration o Implementing Networking Services o Implementing Local Storage o Implementing File and Print Services o Implementing Group Policy o Implementing Server Virtualization with Hyper-V o Exam 411: Administering Windows Server 2012 o Implementing a Group Policy Infrastructure o Managing User and Service Accounts o Maintaining Active Directory Domain Services o Configure and Troubleshoot DNS o Configure and Troubleshoot Remote Access o Installing, Configuring, and Troubleshooting the Network Policy Server role o Optimizing File Services o Increasing File System Security o Implementing Update Management 8

9 Exam 412: Configuring Advanced Windows Server 2012 Services o Implementing Advanced Network Services o Implementing Advanced File Services o Implementing Dynamic Access Control o Implementing Network Load Balancing o Implementing Failover Clustering o Implementing Disaster Recovery o Implementing AD CS o Implementing AD FS Prerequisites: Hands-on Windows Client experience with Windows Vista, Windows 7, or Windows8. Network experience and the CompTIA Network+ course would be beneficial to potential candidates. Contact Hours: 24 per module. Who Should Attend: ICT Professionals, systems engineers, network engineers, systems analysts, network analysts, and technical consultants who want to prepare for their MCSA: Windows Server 2012 credential in an accelerated format. 9

10 Information Technology Infrastructure Library (ITIL) The Foundation Level is the entry level qualification which offers candidates a general awareness of the key elements, concepts and terminology used in the ITIL Service Lifecycle, including the linkages between Lifecycle stages, the processes used and their contribution to Service Management practices. This qualification is primarily aimed towards those who require a basic understanding of the ITIL framework as well as those who need understanding of how ITIL can be used to enhance the quality of IT service management within an organization and IT professionals or others working within an organization that has adopted and adapted ITIL who need to be informed about, or contribute to an ongoing service improvement programme. Course Outline: o o o o o o o o o Service management as a practice (comprehension) The ITIL service lifecycle (comprehension) Generic concepts and definitions (awareness) Key principles and models (comprehension) Selected processes (awareness) Selected functions (awareness) Selected roles (awareness) Technology and architecture (awareness) Competence and training (awareness) Prerequisites: None. Contact Hours: 24 Who Should Attend: open to any individuals who may have an interest in the subject. 10

11 CompTIA Security+ (SY0-004) The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Security+ is an international, vendor- neutral certification that proves competency in system security, network infrastructure, access control and organizational security. Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty, according to a 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain or increase their investment in security. Major organizations that employ CompTIA Security+ certified staff include Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh, Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U.S. Navy, Army, Air Force and Marines. Course Outline: Introduction to and the need for Security Evaluating Common Security Threats Operating System Hardening Application Security Implementing Security Applications Network Infrastructure Attacks Network Design Elements and Components Network Security Tools Wireless Network Security Access Control Assessments and Audits (Part 1) General Cryptography Concepts Cryptography Algorithms and Protocols Public Key Infrastructure (PKI) Organizational Security Prerequisites: Basic Networking and an Understanding of the OSI Model. Contact Hours: 24 Who Should Attend: Computer and Network Technicians and persons interested in moving on towards being Network and/or Security Administrators. 11

12 Certified Information Systems Auditor (CISA) The skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for individuals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. Course Outline: The IS Audit Process. Information Security Policies. Computer Assisted Audit Technique (CAAT) and Control Self-Assessment (CSA) Information Technology Governance. Risk Management Processes and Risk Analysis Methods. Project Management Practices, Tools and Control Frameworks. Organizational Change Management, IS Quality and Performance management. Systems and Infrastructure Life Cycle Management. Infrastructure Development Acquisition and IS Maintenance Methods. Application Controls and Auditing. Application developing, acquiring and maintaining business application systems. IT Service Delivery and Support. IS operation and Hardware, Hardware Management and IS architecture Incident and Problem Management Practices Information Security Management Network Infrastructure Security Attack Methods and Techniques Protection of Information Assets. Disaster Recovery and Business Continuity. Prerequisites: Training in Network+, Security+ and CEH or equivalent. Contact Hours: 30 Who Should Attend: Networking Professionals who wish to expand into the lucrative and in-demand field of Network Security and Auditing. 12

13 Certified Information Security Manager (CISM) ISACA Certified Information Security Manager (CISM) training course equips information security professionals with the knowledge and technical skills required for proficiency in building and managing enterprise information security. This exam benchmarks the understanding of essential concepts in many Information Security job practice areas. With the help of prominent industry leaders, subject matter experts and industry practitioners, ISACA has put together this exam to define what security managers do and what they need to know. Course Outline: Information Security Governance Risk Management Information Security Program Management Legal Issues Information Technology Deployment Risks IT Networks and Telecommunications Risks Integrating Information Security into Business Continuity, Disaster Recovery, and Incident Response Prerequisites: Security+, CISA, CEH and /or Security professionals with 3-5 years of frontline experience. Contact Hours: 30 Hours. Who Should Attend: Information security professionals and managers or those with management responsibilities; Information security staff and other information security assurance providers who require and in-depth understanding of information security management. 13

14 Certified Information Systems Security Professional (CISSP) CISSP certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard The CISSP course covers critical topics in security today, including risk management, cloud computing, mobile security, application development security and more. Course Outline: Access Control Telecommunications and Network Security Information Security Governance and Risk Management Software Development Security Cryptography Security Architecture and Design Operations Security Business Continuity and Disaster Recovery Planning Legal, Regulations, Investigations and Compliance Physical (Environmental) Security Prerequisites: Security+, CISA, CEH and /or Security professionals with 3-5 years of frontline experience. Exam Prerequisites: Candidates must have a minimum of five years of experience in two of the ten domains. Contact Hours: 30 Hours. Who Should Attend: Information security professionals and managers or those with management responsibilities; Information security staff and other information security assurance providers who require and in-depth understanding of information security management. 14

15 EC-Council Certified Security Specialist (ECSS) EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Course Outline: Module 01: Information Security Fundamentals Module 02: Addressing Threats Module 03: Backdoors, Virus, and Worms Module 04: Introduction to the Linux Operating System Module 05: Password Cracking Module 06: Cryptography Module 07: Web Servers and Web Applications Module 08: Wireless Networks Module 09: Intrusion Detection System Module 10: Firewalls and Honeypots Module 11: Hacking Cycle Module 12: Introduction to Ethical Hacking Module 13: Networking Revisited Module 14: Secure Network Protocols Module 15: Authentication Module 16: Network Attacks Module 17: Bastion Hosts and DMZ Module 18: Proxy Servers Module 19: Virtual Private Network Module 20: Introduction to Wireless Network Security Module 21: Voice over Internet Protocol Module 22: Computer Forensics Fundamentals Module 23: Trademark, Copyright, and Patents Module 24: Network and Router Forensics Fundamentals Module 25: Incident Response and Forensics Module 26: Digital Evidence 15

16 Module 27: Understanding Windows, DOS, Linux, and Macintosh Module 28: Steganography Module 29: Analyzing Logs Module 30: Crime and Computer Forensics Module 31: Introduction to Writing Investigative Report Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 24 Who Should Attend: This course will benefit the students who are interested in learning fundamentals of information security, network security, and computer forensics. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $ USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 16

17 EC-Council Certified Encryption Specialist (E CES) The EC-Council Certified Encryption Specialist (E CES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced: Course Outline. Overview of other algorithms such as Blowfish, Twofish, and Skipjack Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. Significant concepts such as diffusion, confusion, and Kerkchoff s principle. How to set up a VPN Encrypt a drive Hands-on experience with steganography Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA. Types of Encryption Standards and their differences. How to select the best standard for your organization. How to enhance your pen-testing knowledge in encryption. Correct and incorrect deployment of encryption technologies. Common mistakes made in implementing encryption technologies. Best practices when implementing encryption technologies. 17

18 Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 24 Who Should Attend: This course will benefit the students who are interested in learning fundamentals of information security, network security, and computer forensics. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $ USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 18

19 Project Management in IT Security (PMITS) EC-Council s program on Project Management in IT Security is a highly interactive 2-day class designed to teach Information Technology Security Professionals real time implementation of project management practices in IT security planning. It comprehensively covers corporate security project plan components, costs involved in security, basis for a successful project, limitations of a Project, corporate strategy and IT security and the influence of corporate culture and policies on IT security. Students will learn to identify different issues arising during an organization-wide security planning and how to avoid and eliminate them. Course Outline: Components of Project Management in IT Security Organizing the IT Security Project Developing the IT Security Project Team Planning the IT Security Project Managing the IT PM Building Quality into IT Security Projects Closing Out the IT PM Define a Corporate IT Project Plan General IT Security Plan IT Operational Security Plan Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 24 Who Should Attend: Management people involved with security planning, Network server administrators, System Administrators and Risk Assessment professionals. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $ USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 19

20 EC-Council Network Security Administrator (ENSA) The EC-Council's ENSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. EC-Council was honored at the 12th Colloquium for Information Systems Security Education (CISSE) by the United States Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) when its Network Security Administrator course (ENSA) was certified for meeting the 4011 training standard for information security professionals. Candidates who complete the EC-Council Network Security Administrator (ENSA) program will also have that extra credential meeting the requirements of the CNSS 4011 Federal Security Certification and Training Standards. Course Outline: Fundamentals of Network Network Protocols Protocol Analysis IEEE standards Network Security Security Standards Organizations Security Standards Security Policy 20

21 Hardening Physical Security Network Security Threats Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) Firewalls Packet Filtering and Proxy Servers Bastion Host and Honeypots Securing Modems Troubleshooting Network Hardening Routers Hardening Operating Systems Patch Management Log Analysis Application Security Web Security Security Authentication: Encryption, Cryptography and Digital Signatures Virtual Private Networks Wireless Network Security Creating Fault Tolerance Incident Response Disaster Recovery and Planning Network Vulnerability Assessment Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 30 Who Should Attend: System administrators, Network administrators and anyone who is interested in network security technologies. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $ USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Eccouncil (ATC) Authorised Training Centre 21

22 Certified Ethical Hacker (CEH) Version 8 To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in. This class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. Course Outline: 1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Hacking Mobile Platforms 17. Evading IDS, Firewalls and Honeypots 18. Buffer Overflows 19. Cryptography 20. Penetration Testing Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 30 Who Should Attend: Security Officers, Auditors, Network and Security Administrators and Professionals, Administrators and anyone who is concerned about the integrity of the network infrastructure. 22

23 NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $ USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 23

24 Computer Hacking Forensic Investigator (CHFI) Version 8 Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client s systems, to tracing the originator of defamatory s, to recovering signs of fraud. Students will draw on an array of methods for discovering data that resides in a computer system, recovering deleted, encrypted, or damaged file information in order to comprehend the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Course Outline: Module 01: Computer Forensics in Today s World Module 02: Computer Forensics Investigation Process Module 03: Searching and Seizing of Computers Module 04: Digital Evidence Module 05: First Responder Procedures Module 06: Computer Forensics Lab Module 07: Understanding Hard Disks and File Systems Module 08: Windows Forensics Module 09: Data Acquisition and Duplication Module 10: Recovering Deleted Files and Deleted Partitions Module 11: Forensics Investigation using AccessData FTK Module 12: Forensics Investigations Using Encase Module 13: Steganography and Image File Forensics Module 14: Application Password Crackers Module 15: Log Capturing and Event Correlation Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic Module 17: Investigating Wireless Attacks Module 18: Investigating Web Attacks Module 19: Tracking s and Investigating Crimes Module 20: Mobile Forensics Module 21: Investigative Reports Module 22: Becoming an Expert Witness 24

25 Prerequisites: CEH is an asset but not required. Contact Hours: 30 Who Should Attend: The CHFI program is designed for all IT professionals involved with or interested in information system security, computer forensics, and incident response.. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $ USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 25

26 Ec-Council Certified Systems Analyst (ECSA) Version 8 ECSA works hand in hand with CEH by going into the analytical phase of ethical hacking. ECSA is a logical progression from CEH by giving you the skills to analyze the outcome from these tools and technologies. ECSA will assist you in conducting intensive assessments required to create a robust risk management system through groundbreaking penetration testing methods and techniques. Students will learn how to clarify, isolate and overcome security problems in order to effectively avoid and eliminate them. The class will enable you to provide the best complete coverage of network security- testing topic and analysis. Designing and performing comprehensive tests on your networks will be second nature to you once you leave this advance class. Course Outline: Need for Security Analysis TCP IP Packet Analysis Penetration Testing Methodologies Customers and Legal Agreements Rules of Engagement Penetration Testing Planning and Scheduling Pre - penetration Testing Steps Information Gathering Vulnerability Analysis External Penetration Testing Internal Network Penetration Testing Firewall Penetration Testing IDS Penetration Testing Password Cracking Penetration Testing Social Engineering Penetration Testing Web Application Penetration Testing SQL Penetration Testing Penetration Testing Reports and Post Testing Actions 26

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

Diploma in Network (LAN/WAN) Administration

Diploma in Network (LAN/WAN) Administration Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Cisco Certified Network Professional (CCNP Routing & Switching)

Cisco Certified Network Professional (CCNP Routing & Switching) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Professional (CCNP Routing & Switching) Program Summary This instructor-led

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E) Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

Cisco Certified Network Expert (CCNE)

Cisco Certified Network Expert (CCNE) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Expert (CCNE) Program Summary This instructor- led program with a combination

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

CERTIFICATE COURSE 1 ST YEAR. 2012 13 onwards ADD ON COURSE. Computer Hardware Networking and Ethical Hacking. Semester I

CERTIFICATE COURSE 1 ST YEAR. 2012 13 onwards ADD ON COURSE. Computer Hardware Networking and Ethical Hacking. Semester I CERTIFICATE COURSE 1 ST YEAR 2012 13 onwards ADD ON COURSE Computer Hardware Networking and Ethical Hacking Semester I Paper Code : NEH 1 Paper Name : Basics of computer Course Duration : Total Course

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led

Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732.

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at 410-777-2732. Anne Arundel Community College is an academic partner in the Pathways to Cybersecurity Careers Consortium in the State of Maryland. The Pathways to Cybersecurity Consortium consists of workforce, academic,

More information

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview

More information

Higher National Unit specification: general information

Higher National Unit specification: general information Higher National Unit specification: general information Unit code: H17V 34 Superclass: CB Publication date: March 2012 Source: Scottish Qualifications Authority Version: 01 Unit purpose This Unit is designed

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

(d-5273) CCIE Security v3.0 Written Exam Topics

(d-5273) CCIE Security v3.0 Written Exam Topics (d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

LAIKIPIA UNIVERSITY CISCO ACADEMY BRONCHURE

LAIKIPIA UNIVERSITY CISCO ACADEMY BRONCHURE CISCO COURSES LAIKIPIA UNIVERSITY CISCO ACADEMY BRONCHURE Cisco/CompTIA IT Essentials (PC Hardware and Software) The IT Essentials course provides hand-on training on computer hardware and software skills

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

Cisco Certified Network Professional - Routing & Switching

Cisco Certified Network Professional - Routing & Switching Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:

More information

50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 COURSE SYLLABUS Cisco Certified Network Associate CCNA (Exam 640-802) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 130 Clinton Rd,

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Bachelor of Information Technology (Network Security) Course Structure Year 1: Level 100 Foundation knowledge subjects SEMESTER 1 SEMESTER 2 ITICT101A Fundamentals of Computer Organisation ITICT104A Internetworking

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Cisco 12 CCNA Certification

Cisco 12 CCNA Certification Cisco 12 CCNA Certification Application for Board Authorization of Courses District: Chilliwack School District 33 Developed by: John Murtha Date: May7, 2004 School: Sardis Secondary Principal: Bob Patterson

More information

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY

More information

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 15-1121.00 RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: 5-.00 RAPIDS CODE: 07HY Work Process and Classroom Training Duties and Hours Period General Practices - Foundations On-the- Job Learning Hours

More information

CCNA Cisco Associate- Level Certifications

CCNA Cisco Associate- Level Certifications CCNA Cisco Associate- Level Certifications Routing & Switching Security Voice Wireless Advance your network engineering skills in working on complex Cisco network solutions. WWW.FASTLANEUS.COM Cisco CCNA

More information

Security+ Certification Course

Security+ Certification Course Your Course Information Security+ Certification Course Swaledale 4 Coaley Lane Houghton-le-Spring Tyne & Wear DH4 4SQ The CompTIA Security+ Certification Course covers the Latest CompTIA Certification

More information

CHFI v8(computer Hacking Forensics Investigator)

CHFI v8(computer Hacking Forensics Investigator) CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill CompTIA Security+ Certification Study Guide (Exam SYO-301) Glen E. Clarke McGraw-Hill is an independent entity from CompTIA,This publication and CD may be used in assisting students to prepare for the

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Page: Designed & Executed By: Presents Cyber Security Training

Page: Designed & Executed By: Presents Cyber Security Training Page: 1 Designed & Executed By: TM S I v8 RAINNVESTIGATOR Cyber Security Training Presents T CCE TechBharat Certified Cyber Expert TechBharat Certified Cyber Expert EC-Council Computer Hacking Forensic

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

ICT Infrastructure & Network Management

ICT Infrastructure & Network Management Context ICT Infrastructure & Network Management Postgraduate Degree Programme Hogeschool-Universiteit Brussel 2014-2015 The HUB University College offers a wide range of postgraduate and other courses

More information

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop

More information

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days CCNA The Cisco Certified Network Associate (CCNA) course consists of days 1 to 5 of the Cisco Networking Academy Programme. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included)

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --

More information

Welcome to Todd Lammle s CCNA Bootcamp

Welcome to Todd Lammle s CCNA Bootcamp Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs) Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs) 2-Interconnecting Cisco Networking Devices Part 2 (40 Hs) 1-Interconnecting

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Tim Bovles WILEY. Wiley Publishing, Inc.

Tim Bovles WILEY. Wiley Publishing, Inc. Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5

More information

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk A TOP-RATED UNIVERSITY FOR EMPLOYABILITY MSc Information and Network Security T: 01224 262787 h.ahriz@rgu.ac.uk PROGRAMME OVERVIEW Most modern organisations face security risks that threaten their valuable

More information

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,

More information

Understanding Security Testing

Understanding Security Testing Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many

More information

CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence CCNA Security v1.0 Scope and Sequence Last updated June 18, 2009 Note: The English version of this course is scheduled to be generally available in July 2009. Target Audience The Cisco CCNA Security course

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

13 Courses Quick Guide

13 Courses Quick Guide 13 Courses Quick Guide Microsoft Network Infrastructure 2008 Microsoft Certified Solution Associate (MCSA 2012) MCSE 2012 (Private Cloud) MCSE Server infrastructure 2012 Administering & Configuring Microsoft

More information

Both CCNP ROUTE and CCNP SWITCH. Plan and document the most common maintenance functions in complex enterprise networks

Both CCNP ROUTE and CCNP SWITCH. Plan and document the most common maintenance functions in complex enterprise networks CCNP TSHOOT: Maintaining and Troubleshooting Cisco IP Networks Maximum number of participants 12.Course cost 12000 soms. This course teaches students how to monitor and maintain complex, enterprise routed

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information