CAST Center for Advanced Security Training



Similar documents
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

EC-Council. Certified Ethical Hacker. Program Brochure

Cyber Learning Solutions

Hackers are here. Where are you?

CYBER SECURITY TRAINING SAFE AND SECURE

EC Council Certified Ethical Hacker V8

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

[CEH]: Ethical Hacking and Countermeasures

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

CSIS Academy Be Better

Analyze. Secure. Defend. Do you hold ECSA credential?

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Hackers are here. Where are you?

InfoSec Academy Application & Secure Code Track

Certification Programs

Testing the Security of your Applications

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

InfoSec Academy Forensics Track

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

KEY TRENDS AND DRIVERS OF SECURITY

The Next Generation of Security Leaders

OVERVIEW DEGREES & CERTIFICATES

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Certification Programs

Cisco Data Center Optimization Services

RETHINKING CYBER SECURITY

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Information Security Services

Microsoft Services Premier Support. Security Services Catalogue

Brandman University. School of CCNA

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

How To Get A Computer Hacking Program

EC-Council Certified Security Analyst (ECSA)

PENETRATION TESTING GUIDE. 1

Continuous Network Monitoring

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

CYBER SECURITY Audit, Test & Compliance

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Security Risk Management Strategy in a Mobile and Consumerised World

Cyber Defense Operations Graduate Certificate

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

InfoSec Academy Pen Testing & Hacking Track

Managed Security Services. Leverage our experienced security operations team to improve your cyber security posture

Are you prepared to be next? Invensys Cyber Security

New-Age Master s Programme

Information Systems Security Certificate Program

MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

RETHINKING CYBER SECURITY

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

e-discovery Forensics Incident Response

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

New-Age Undergraduate Programme

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

How To Protect Your Network From Attack From A Network Security Threat

Bellevue University Cybersecurity Programs & Courses

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 614 Advanced Network Defense. Make The Difference CAST. EC-Council

Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

IT and Cyber Security Training Courses

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Introduction to Cybersecurity Overview. October 2014

Application Security in the Software Development Lifecycle

Cyber Security and Privacy - Program 183

October 24, Mitigating Legal and Business Risks of Cyber Breaches

WHITE PAPER. 10 Things Every Law Firm Should Know About Improving IT Performance: A Practice Director s Guide

IT courses For Senior Managers

Cisco Cloud Enablement Services for Education

e-discovery Forensics Incident Response

CyberNEXS Global Services

Networking: EC Council Network Security Administrator NSA

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Transform Your Business. Transformation Data Center

Course Descriptions November 2014

The Protection Mission a constant endeavor

Career Paths in Information Security v6.0

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Learning Course Curriculum

Hybrid IT A Low-Risk Path from On-Premise to ITaaS

SHRM CERTIFIED PROFESSIONAL (SHRM-CP ) AND SHRM SENIOR CERTIFIED PROFESSIONAL (SHRM- SCP ) INFORMATION SHEET EVOLUTION OF HR

Cisco Cloud Enablement Services for Adopting Clouds

Cybersecurity and internal audit. August 15, 2014

(BDT) BDT/POL/CYB/Circular

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Practitioner Certificate in Information Assurance Architecture (PCiIAA)

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Security Solutions Secure your network and minimize the risks

Industrial Defender, Inc.: Recipient of the 2008 Global Risk Management Process Control & SCADA Company of the Year Award

Ness Cyber Security Services

future data and infrastructure

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 612 Advanced Mobile Hacking & Forensics. Make The Difference CAST.

Transcription:

CAST Center for Advanced Security Training

Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced Security Training for information security professionals. CAST programs stand out from others thorough their extreme hands-on approach. These highly technical, lab intensive courses will allow a participant to combat real life scenarios.

Cast Programs CAST programs are designed and developed by EC-Council in collaboration with wellrespected subject-matter experts and Industry Practitioners. All of these Advanced Security Training courses will only conducted by appointed EC-Council Master Trainers, some of whom are authors of the respective courses. Theories are limited to the bare essentials, and the bulk of the training session will be focused on a participant s individualized involvement in getting their hands dirty. CAST will offer programs that will cover important domains such as advanced penetration testing training, malware analysis, advanced social engineering, cryptography, digital forensics deep dive, web application security, among others.

EC-Council EC-Council (International Council of Electronic Commerce Consultants) is the world leader in IT Security Courses - Information Security, Network Security, Computer Security and Internet Security Certification and Training. EC-Council s flagship course Certified Ethical Hacker, CEH set the standard for what the world has come to expect from ethical hacking IT Security courses.

EC-Council Career Path EC-Council offers a range of Information Security courses, starting from the bare essentials for fundamental preparation till they reach the most advanced and highly technical training. CAST courses lie within the top layer of InfoSec training where professionals challenge their own knowledge and become subject matter experts.

How CAST addresses the needs of the Market? Targets the major and attack-prone fields of data mining and external party invasions. Cultivates innovative problem-solving mindset by using reverse engineering approach. Offers a set of independent, highly specialized and diversified training modules!!

Why CAST The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies Organizational Training: Ongoing Information Security Knowledge; In-House Development & Research Strengthen the Administrative structure; Cultivate Advanced Information Security Professionals to address shortages in all IT positions Upgrade & Modernize Information Security Operations; Introduce the new and innovative CAST techniques in the public and private sector Improve efficiency; Ease Information Security Management system, resources, and programs, at all executive and C-levels levels. Ensure Organizational Economic Development; Information Secure transactions within all public and private sectors Compliance with National Regulations; Data protection Legislation and Personal Data Protection Act (PDPA)

Why CAST Features Highly Technical Lab-intense Hands-on Up-to-date Specialized in Network Windows Infrastructure Website & Applications Mobile Cloud Professional Training CAST is a highly Technical and Advanced Security Training Program developed exclusively for the top Information Security Professionals. CAST consists a set of independent Security Training Specializations, all of them dynamic features, up-to-date and subjects to constant evolution and optimization. CAST content is designed to be aligned with the most effective and perplexing threat prevention strategies and remediation policies. CAST offers a hands-on training experience with tools and fighting techniques derived from real-life scenarios of combating IT security incidents.

CAST Eligibility Ideal Candidates for CAST are: Those who already have fundamental credentials in Information Security and need to enhance and upgrade their current level to the maximum InfoSec Certification Degree EC- Council offers. Those who want to acquire proven Advanced Security Training and enjoy the most exclusive privileges and monetary rewards in their professional career.

CAST Suite of Training CAST aims to provide specialized globally oriented training programs that will cover key information security domains, at an advanced level.

CAST MASTER AUTHORS CAST courses are advanced and highly technical training programs co-developed by EC-Council and Master Authors which are well respected industry practitioners and subject matter experts.

CAST Certified Instructor (CCI) MASTER TRAINER PREREQUISITES 1. Strong CV - 5-10 years of experience in information security training 2. Passing the EC-Council CAST Exam for the course applied for. (to be purchased directly from ECC) 3. Attending the train the trainer format. 4. Interview with CAST instructor http://www.eccouncil.org/cast/cci-requirements.html

CAST 611 Advanced Penetration Testing CAST 611 will teach you how to do a professional security test and produce the most important thing from a test... the findings and the report! The ranges progresses in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is not your typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques. The format you will use has been used to train 1000s penetration testers globally, it is proven and effective!

CAST 612 Advanced Mobile Hacking & Forensics Elevating Mobile Forensics & Investigation To an Art Form Mobile Forensics is defined as the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. (NIST) This Three-day instructor-led course provides students with the knowledge and real world hands-on practical skills for performing Mobile Forensic Investigations. The course is based on vendor neutral Digital Forensic principals, with a great deal of focus on Apple, Google Android, RIM Blackberry and an array of other mobile devices. In order to successfully complete a Mobile Forensics investigation it is imperative that you learn both the hardware and software design intricacies of these platforms as well as the common investigation protocols currently recognized and accepted for court trials.

CAST 613 Hacking and Hardening your own Corporate Web App/Web Site A completely unique approach to making internally developed code safe. Sure we all know the basics but have we ever walked a mile in the hacker s shoes. How would they go about Hacking our Corporate Developed Web Site/Web App? Our Developers are schooled in what they would try? Aren t they? How can you possibly know how to protect your home if you don t know how the burglar breaks into it? It s impossible! We are taking the unusual approach of hacking our own code using very simple tools that the developer uses every day.

CAST 614 Advanced Network Defense This is a comprehensive fast paced technical security training program that will take the perspective of the hacker, and use that for the foundation of defending against the latest attacks. It is fun to be on offense and do the hacking and penetration testing, but for most us the reality is we have to play defense. This program provides an offensive mindset to provide a robust and solid defense. While there is no such thing as perfect security, there are best practices and methodologies you can follow to secure most environments and provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. The technical security training program starts with an introduction to advanced hacks and how you can fortify your defenses.

CAST 616 Securing Windows Infrastructure Attack Based Defense from the Ground Up This 3 day technical course focuses on the key aspects of Windows Infrastructure Security, applying best practices to secure interconnected information systems within your organization providing a holistically reliable framework to support an entire enterprise structure.

CAST 618 Designing and Implementing Cloud Security The Designing and Implementing Cloud Security course provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. The course will help professionals understand the risks and threats associated with cloud service adoption and migrating business-critical data to third party systems. The program covers planning, designing, and implementing cloud security controls. It delves in to various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, fail-over policy, and how cloud security strengthens the business case for cloud adoption.

Cast Philosophy Proactive Strategy Damage Prevention Ruined Reputation Theft, Vandalism Revenue Loss Intellectual property leakages Direct ROI: Risk Reduction, Integrity protection, Organizational Smooth operation, Increased revenues through uninterrupted, procedures Reactive Strategy On-Time Damage Control Advanced Damage Treatment In-doors Damage Management Direct ROI Cost reduction; Outsource Vs In-source

CAST TESTIMONIALS

CAST Global Footprint

THANK YOU for more information PLEASE VISIT : CAST Official Website or CONTACT US: Danish Arshad- CAST EGS Executive Director Irene Dima CAST Product Manager Merieme Boumedyane CAST Country Manager