6 Media Top 5 Security Certifications CISSP 2. CEH 3. CISM 4. GIAC 5. Vendor Certifications Bron:
7 Expertise General (IT) Security Ethical Hacking / Pentesting Forensics
8 General Security Breed onderwerp Weinig diepgang Niet technisch
9 General Security Security+ Comptia NSA: Network Security Administrator ECCouncil SSCP: Systems Security Certified Practitioner ISC2 CISSP: Certified Information Systems Security Professional ISC2 CISM: Certified Information Security Manager ISACA CISA: Certified Information Systems Auditor ISACA
10 Hacking / Pentesting Specifiek onderwerp Veel diepgang (Zeer) Technisch
11 Hacking / Pentesting CEH: Certified Ethical Hacker ECCouncil ECSA: Certified Security Analyst ECCouncil LPT: Licensed Penetration Tester ECCouncil OSCP: Offensive Security Certified Professional OffSec OSCE: Offensive Security Certified Expert OffSec ECPPT: Certified Professional Penetration Testing elearnsecurity GSEC: SANS Security Essentials SANS GCIH: Hacker Techniques, Exploits, Incident Handling SANS GPEN: Network Penetration Testing/Ethical Hacking SANS
12 Forensics Zeer specifiek Veel diepgang Zowel technisch als niet technisch Techniek Wet en regelgeving
15 Type certificaat (theoretisch/hands-on) Eisen (ervaring vakgebied, voorkennis) Stof (diepgaand of oppervlakkig) Examen (multiple choice/open)
16 ISC2 The International Information Systems Security Certification Consortium, Inc., (ISC)², is the global leader in educating and certifying information security professionals throughout their careers.
17 ISC2 - SSCP SSCP - Systems Security Certified Practitioner Type Eisen Stof Examen Pre-CISSP
18 ISC2 - SSCP Access Controls Cryptography Malicious Code and Activity Monitoring and Analysis Networks and Communications Risk, Response and Recovery Security Operations and Administration
19 ISC2 - CISSP CISSP - Certified Information Systems Security Professional Type Eisen Stof Examen MVP
20 ISC2 - CISSP Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal, Regulations, Investigations and Compliance Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security
21 The International Council of E-Commerce Consultants (EC-Council) is a memberbased organization that certifies individuals in various e-business and information security skills.
22 ECcouncil - CEH CEH: Certified Ethical Hacker Type Eisen Stof Examen Must Have
23 ECcouncil - CEH Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Trojans and Backdoors Viruses and Worms Sniffers Social Engineering Denial of Service Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls and Honeypots Buffer Overflows Cryptography Penetration Testing
25 Experience the industry's most realistic training on penetration testing as taught by the Offensive Security Training team.
26 OffSec - OSCP OSCP: Offensive Security Certified Professional Type Eisen Stof Examen Become the Hacker
27 OffSec - OSCE OSCE: Offensive Security Certified Expert Type Eisen Stof Examen Best of the Best
28 The Global Information Assurance Certification (GIAC) was founded in 1999 to validate the real-world skills of IT security professionals.
29 GIAC - GWAPT GIAC Web Application Penetration Tester (GWAPT) Type Eisen Stof Examen 100% web apps
32 GIAC - GPEN Advanced Hash Manipulation Command Shell vs. Terminal Access Enumerating Users Exploitation Fundamentals Injection Attacks Legal Issues Metasploit Moving Files with Exploits Obtaining and Passing Password Representations Overview of Passwords Pen-testing Foundations Pen-testing Process Pen-Testing via the Command Line Profiling the Target Reconnaissance Scanning for Targets Using a Proxy to Attack a Web Application Vulnerability Scanning Wireless Crypto and Client Attacks Wireless Fundamentals
33 To impact our students career through the most advanced IT Security courses and the best elearning methodologies
34 ecppt elearnsecurity Certified Professional Penetration Tester Type Eisen Stof Examen Rookie cert (but good)
35 ecppt System Security Topics Introduction to system security and environment installation Understanding Polymorphism, Metamorphism and latest malware techniques Writing trojans and keyloggers (3 source code examples) Cryptographic attacks and password cracking Finding buffer overflows Exploiting buffer overflows (3 source code examples) Writing remote code execution for a real world Windows application Writing shellcodes (3 source code examples) How rootkits work Writing rootkits for windows (3 source code examples) Basics of Windows drivers development
36 ecppt Network Security Topics Information gathering on target organization Using DNS, Whois, Maltego to collect information Fingerprinting remote OS, services and devices Advanced port scanning with nmap and unicornscan Passive and Active Sniffing techniques and tools Man in the middle attacks Enumerating resources and hosts through NetBIOS and SNMP Vulnerability assessment with Nessus Exploiting with Metasploit Using covert techniques for 100% blackbox testing: proxies, socks, Tor Social Engineering - SET
37 ecppt Web Application Security Topics Introduction to Pentesting web applications Gathering information on target Enumerating resources: dirs, files, usernames Vulnerability Assessment through Nikto and Nessus Building XSS advanced attacks (real world examples) Attacking remote users through BeeF Dumping remote data through advanced SQL Injection (real world examples) Getting root through remote SQL injection Building a real world CSRF exploits against Joomla Exploiting RFI/LFI and server misconfigurations Attacking Web 2.0 and Ajax frameworks (real world examples) Google hacking
Computer Forensics and Security Institute Course Brochure 2015 www.cfsi.co #3 De Verteuil Terrace, Endeavour Road, Chaguanas, Trinidad, West Indies. Email: email@example.com Tel: 1-868-684-0029 Find us on Facebook:
Ethical Hacking CEHv7 Course Outline Course Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
Information Technology Networking Specialist Network Security Professional INDIVIDUAL PROGRAM INFORMATION 2015 2016 866.Macomb1 (866.622.6621) www.macomb.edu Information Technology Networking Specialist
Accessing the WAN Chapter 4 Objectives 2 Security has moved to the forefront of network management and implementation. The overall security challenge is to find a balance between two important requirements:
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Executive summary Cyber security has become a vital part of conducting business in today s world. The threats to organisations and individuals are real. Industrial Control Systems (ICSs) were originally
HACKING RELOADED Hacken IS simple! Christian H. Gresser firstname.lastname@example.org Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security
Computer Information Science Degrees: A.S. Computer Science A.S. Information Processing A.S. Information Systems Security A.S. Management Information Science A.S. Network Administration A.S. Network Design
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
Penetration Testing with BackBox Stefan Umit Uygur Chapter No. 1 "Starting Out with BackBox Linux" In this package, you will find: A Biography of the author of the book A preview chapter from the book,
Splunk and the SANS Top 20 Critical Security Controls Mapping Splunk Software to the SANS Top 20 CSC Version 4.1 Copyright 2014 by Splunk Inc. All rights reserved. Splunk, Splunk>, Listen to Your Data,
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
EC-Council Press The Experts: EC-Council EC-Council s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies October 2009 DISCLAIMER This report was prepared as an account of work sponsored by an agency of
Payment Card Industry (PCI) Data Security Standard (DSS) and Payment Application Data Security Standard (PA-DSS) Glossary of Terms, Abbreviations, and Acronyms Version 3.0 January 2014 AAA Access Control
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
WHITE PAPER Informatica Cloud Architecture and Security Overview Independent Analysis of the Architecture and Security Features of Informatica Cloud Prepared by Mercury Consulting, a leader in Ground to
INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES Transforming Your Research and Analytic Skills Spring 2015 Contents A 21st Century Skillset 3 Course Dates 5 Course Fees 6 Open Source Intelligence 7 Advanced