CAST Center for Advanced Security Training
Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced Security Training for information security professionals. CAST programs stand out from others thorough their extreme hands-on approach. These highly technical, lab intensive courses will allow a participant to combat real life scenarios.
Cast Programs CAST programs are designed and developed by EC-Council in collaboration with wellrespected subject-matter experts and Industry Practitioners. All of these Advanced Security Training courses will only conducted by appointed EC-Council Master Trainers, some of whom are authors of the respective courses. Theories are limited to the bare essentials, and the bulk of the training session will be focused on a participant s individualized involvement in getting their hands dirty. CAST will offer programs that will cover important domains such as advanced penetration testing training, malware analysis, advanced social engineering, cryptography, digital forensics deep dive, web application security, among others.
EC-Council EC-Council (International Council of Electronic Commerce Consultants) is the world leader in IT Security Courses - Information Security, Network Security, Computer Security and Internet Security Certification and Training. EC-Council s flagship course Certified Ethical Hacker, CEH set the standard for what the world has come to expect from ethical hacking IT Security courses.
EC-Council Career Path EC-Council offers a range of Information Security courses, starting from the bare essentials for fundamental preparation till they reach the most advanced and highly technical training. CAST courses lie within the top layer of InfoSec training where professionals challenge their own knowledge and become subject matter experts.
How CAST addresses the needs of the Market? Targets the major and attack-prone fields of data mining and external party invasions. Cultivates innovative problem-solving mindset by using reverse engineering approach. Offers a set of independent, highly specialized and diversified training modules!!
Why CAST The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies Organizational Training: Ongoing Information Security Knowledge; In-House Development & Research Strengthen the Administrative structure; Cultivate Advanced Information Security Professionals to address shortages in all IT positions Upgrade & Modernize Information Security Operations; Introduce the new and innovative CAST techniques in the public and private sector Improve efficiency; Ease Information Security Management system, resources, and programs, at all executive and C-levels levels. Ensure Organizational Economic Development; Information Secure transactions within all public and private sectors Compliance with National Regulations; Data protection Legislation and Personal Data Protection Act (PDPA)
Why CAST Features Highly Technical Lab-intense Hands-on Up-to-date Specialized in Network Windows Infrastructure Website & Applications Mobile Cloud Professional Training CAST is a highly Technical and Advanced Security Training Program developed exclusively for the top Information Security Professionals. CAST consists a set of independent Security Training Specializations, all of them dynamic features, up-to-date and subjects to constant evolution and optimization. CAST content is designed to be aligned with the most effective and perplexing threat prevention strategies and remediation policies. CAST offers a hands-on training experience with tools and fighting techniques derived from real-life scenarios of combating IT security incidents.
CAST Eligibility Ideal Candidates for CAST are: Those who already have fundamental credentials in Information Security and need to enhance and upgrade their current level to the maximum InfoSec Certification Degree EC- Council offers. Those who want to acquire proven Advanced Security Training and enjoy the most exclusive privileges and monetary rewards in their professional career.
CAST Suite of Training CAST aims to provide specialized globally oriented training programs that will cover key information security domains, at an advanced level.
CAST MASTER AUTHORS CAST courses are advanced and highly technical training programs co-developed by EC-Council and Master Authors which are well respected industry practitioners and subject matter experts.
CAST Certified Instructor (CCI) MASTER TRAINER PREREQUISITES 1. Strong CV - 5-10 years of experience in information security training 2. Passing the EC-Council CAST Exam for the course applied for. (to be purchased directly from ECC) 3. Attending the train the trainer format. 4. Interview with CAST instructor http://www.eccouncil.org/cast/cci-requirements.html
CAST 611 Advanced Penetration Testing CAST 611 will teach you how to do a professional security test and produce the most important thing from a test... the findings and the report! The ranges progresses in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is not your typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques. The format you will use has been used to train 1000s penetration testers globally, it is proven and effective!
CAST 612 Advanced Mobile Hacking & Forensics Elevating Mobile Forensics & Investigation To an Art Form Mobile Forensics is defined as the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. (NIST) This Three-day instructor-led course provides students with the knowledge and real world hands-on practical skills for performing Mobile Forensic Investigations. The course is based on vendor neutral Digital Forensic principals, with a great deal of focus on Apple, Google Android, RIM Blackberry and an array of other mobile devices. In order to successfully complete a Mobile Forensics investigation it is imperative that you learn both the hardware and software design intricacies of these platforms as well as the common investigation protocols currently recognized and accepted for court trials.
CAST 613 Hacking and Hardening your own Corporate Web App/Web Site A completely unique approach to making internally developed code safe. Sure we all know the basics but have we ever walked a mile in the hacker s shoes. How would they go about Hacking our Corporate Developed Web Site/Web App? Our Developers are schooled in what they would try? Aren t they? How can you possibly know how to protect your home if you don t know how the burglar breaks into it? It s impossible! We are taking the unusual approach of hacking our own code using very simple tools that the developer uses every day.
CAST 614 Advanced Network Defense This is a comprehensive fast paced technical security training program that will take the perspective of the hacker, and use that for the foundation of defending against the latest attacks. It is fun to be on offense and do the hacking and penetration testing, but for most us the reality is we have to play defense. This program provides an offensive mindset to provide a robust and solid defense. While there is no such thing as perfect security, there are best practices and methodologies you can follow to secure most environments and provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. The technical security training program starts with an introduction to advanced hacks and how you can fortify your defenses.
CAST 616 Securing Windows Infrastructure Attack Based Defense from the Ground Up This 3 day technical course focuses on the key aspects of Windows Infrastructure Security, applying best practices to secure interconnected information systems within your organization providing a holistically reliable framework to support an entire enterprise structure.
CAST 618 Designing and Implementing Cloud Security The Designing and Implementing Cloud Security course provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. The course will help professionals understand the risks and threats associated with cloud service adoption and migrating business-critical data to third party systems. The program covers planning, designing, and implementing cloud security controls. It delves in to various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, fail-over policy, and how cloud security strengthens the business case for cloud adoption.
Cast Philosophy Proactive Strategy Damage Prevention Ruined Reputation Theft, Vandalism Revenue Loss Intellectual property leakages Direct ROI: Risk Reduction, Integrity protection, Organizational Smooth operation, Increased revenues through uninterrupted, procedures Reactive Strategy On-Time Damage Control Advanced Damage Treatment In-doors Damage Management Direct ROI Cost reduction; Outsource Vs In-source
CAST TESTIMONIALS
CAST Global Footprint
THANK YOU for more information PLEASE VISIT : CAST Official Website or CONTACT US: Danish Arshad- CAST EGS Executive Director Irene Dima CAST Product Manager Merieme Boumedyane CAST Country Manager