ASK PC Certified Information Systems Security Expert - CISSE



Similar documents
Certified Ethical Hacker (CEH)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CEH Version8 Course Outline

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Ethical Hacking Course Layout

EC Council Certified Ethical Hacker V8

EC-Council. Certified Ethical Hacker. Program Brochure

Certified Ethical Hacker Exam Version Comparison. Version Comparison

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Build Your Own Security Lab

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Detailed Description about course module wise:

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Course Content: Session 1. Ethics & Hacking

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Building the Next Generation of Computer Security Professionals. Chris Simpson

CYBERTRON NETWORK SOLUTIONS

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Security Testing in Critical Systems

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

[CEH]: Ethical Hacking and Countermeasures

Hosts HARDENING WINDOWS NETWORKS TRAINING

Description: Objective: Attending students will learn:

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

SONDRA SCHNEIDER JOHN NUNES

EC-Council. Program Brochure. EC-Council. Page 1

Chapter 15: Computer and Network Security

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Course Title: Course Description: Course Key Objective: Fee & Duration:

Information Security. Training

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

Information Security Services

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

ETHICAL HACKING CYBER SECURITY

Networks and Security Lab. Network Forensics

Ethical Hacking & Cyber Security Workshop

INFORMATION SECURITY TRAINING CATALOG (2015)

Access FedVTE online at: fedvte.usalearning.gov

Loophole+ with Ethical Hacking and Penetration Testing

Certified Cyber Security Expert V Web Application Development

Vinny Hoxha Vinny Hoxha 12/08/2009

Inspection of Encrypted HTTPS Traffic

CompTIA Security+ (Exam SY0-410)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

GlobalSign Malware Monitoring

FORBIDDEN - Ethical Hacking Workshop Duration

CIS 4204 Ethical Hacking Fall, 2014

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

WCA WEBINAR SERIES: The Case for Cyber Security Training

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)

Marble & MobileIron Mobile App Risk Mitigation

Ed Ferrara, MSIA, CISSP Fox School of Business

Hackers are here. Where are you?

Section 12 MUST BE COMPLETED BY: 4/22

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

IT and Cyber Security Training Courses

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

ITU-IMPACT Training and Skills Development Course Catalogue

Penetration testing & Ethical Hacking. Security Week 2014

Glasnost or Tyranny? You Can Have Secure and Open Networks!

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Malware & Botnets. Botnets

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Penetration Testing Workshop

Network Attacks and Defenses

Networking: EC Council Network Security Administrator NSA


Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

NETWORK PENETRATION TESTING

McAfee Certified Assessment Specialist Network

(WAPT) Web Application Penetration Testing

Introduction: 1. Daily 360 Website Scanning for Malware

Transcription:

Course Description As part of our mission to spread the awareness of IT security in the Middle East, we understand that an Arabic course will be valuable for native speakers. This is a comprehensive course in information security in Arabic language with study guide in over 450 pages includes important topics in information security from intermediate level up to advanced level. Type of Delivery Self-paced E-Learning Duration Recommended: 15 Weeks (But you will have 1 year access to the elearning portal) Training Benefits - Arabic study guide (over 450 pages) - Professional training materials in English - Video Tutorials and presentations - FREE access to our CISSP preparation course in English - Assignments, projects and activities - CISSE certificate from ASKPC - CEUs Certificate from IEEE - CPE credits for CISSP certificate - Opportunity to get additional information security certificates at discounted fees (Network Security - Web Security)

Course Contents This is the only comprehensive information security course in Arabic with lots of video tutorials and demos. It also includes advanced training materials in English which cover ASKPC Certified Network Security Professional-CNSP and ASKPC Certified Web Application Security Professional CWASP. You will also get FREE access to our preparation course for ISC2 CISSP certificate. Our Information Security Course is sponsored by N-Stalker, the web vulnerability scanner: http://www.nstalker.com/ Important Note: It s important to understand the nature of this course contents before you register. This Information Security course is an advanced course with Main Study Guide in Arabic in over 450 pages includes important information on various information security topics. You can depend on this Arabic study guide and the video tutorials alone if you are an Arabic native speaker. If Arabic is not your first language, you can still study this course using variety of English materials available inside your study area. It s worth mentioning that the final exams and technical reports should be presented in English. For Arabic native speakers, you can set for the Exam in Arabic if you wish and also present your final projects in Arabic. This course depends on your creativity in the field. Your final project and assessment are designed to measure your competences in information security domains presented in your study guides.

A few of the covered topics are - Computer Security and ethical hacking - How Hacker Accesses the System - Reconnaissance Footprinting - Whois Information - Nslookup - Network range - Scanning - Port Scanning - War Dialers - Scanning utilities - Ping Sweep - Hacking with proxy - Hacking Windows - Understanding Windows Encryption - SAM file - LM and NTLM - Password sniffing - Man in the Middle Attack - Hacking with Rootkits - Steganography - NTFS data stream - IIS security - Securing Windows OS - Hacking Linux - Apache server - Server security -.htaccess files - Web Application security introduction - Web 2.0 technologies - Common web application attacks - OWASP top 10 - Vulnerability management - Exploiting vulnerable targets - Malware - Spyware - Botnets, Spam etc - Tricking antivirus software - Automated hacking tools

- Understanding infrastructure security - DoS and DDoS Attacks - Hacker techniques - Wireless network security - Digital Forensic overview - Cybercrime overview - Intro to Open Source Intelligence (OSINT) - And much more! Prerequisites Basic understanding of Information Technology and Windows operating systems is required. It is preferable to be familiar with computer networking, wireless and mobile technologies. You can study one of our technical support and networking courses to advance your knowledge. Recommended references - CISSE study guide, Mohamed N. EL-Guindy, Lulu publishing - Hacking Exposed 6 th Edition - Hands-on Ethical Hacking and Network Defense - Hacking Exposed Web Application 2 - ISSA Journal, Selected Articles - Additional resources will be available inside your student area. Added Benefits Through a collaboration between the Institute of Electrical and Electronics Engineers (IEEE) and ASKPC, you can now further your education without compromising quality for convenience. Once you successfully complete the training with required assessments you will receive CEUs certificate from IEEE. If you are an IEEE member, you will be entitled for 10% discount. Members of Information Systems Security Association ISSA will be also entitled for 10% discount on this program and other courses provided by ASKPC.

Additional certificates When you study and complete your CISSE track, you will have the opportunity to earn additional ASKPC security certificates To earn the Certified Network Security Professional or Certified Web Application Security certificate, you will need to do the following: Hold CISSE certificate Pass specialized exam Complete a technical report or project in any of Network Security or web security related domains mentioned below. Pay the discounted certification fees which is $100 You can still get both certifications if you pass the required assessments and pay the fees. Technical Report or Project Domains (CNSP) Hacking Methodologies Network Vulnerabilities OSI Model security Malware Writing Virus codes Network Traffic Analysis Server and client-side attacks Encryption Wireless security and defense Automated attack platforms Other topics related to network security

Technical Report or Project Domains (CWASP) Server vulnerabilities Hacking web servers Automated vulnerability scanners OWASP Top 10 Exploitation Frame Works Internet Browser Security Hosting Security (Shared and Dedicated Servers) Google Hacking Techniques Security Web 2.0 applications Other topics related to web security About the author Mohamed N. El-Guindy is the author and developer of ASKPC information security courses. He is also the founder and president of both ASKPC and ISSA chapter in Egypt. He has broad experience in the field of Information Technology and also speaker in many security events. For more information, kindly check his blog: http://www.netsafe.me Publications Now you can order ASKPC printed books and study guides from one of the largest publishers online. You can use the printed book as a reference guide and also will help you easily study for your certification. If order any of ASKPC books, you will be entitled for 10% discount on ASKPC training and certificates. To order please check our publications page: http://askpc.net/vac/index.php?option=com_content&view=article&id=157&itemid=178

On-Site training If you are looking for professional instructor-led training in Information Systems Security, we will be able to provide customized training according to your needs and at your own site. Our on-site training depends on the same contents and materials offered in our E-learning programs. Short courses depending on the topics covered in our security training are also available. If you need special training to be designed for your employees, please contact us for more information. ASKPC UK: Dalton House, 60 Windsor Avenue, London SW19 2 RR Email: support@askpc.net Phone: +44-2033181972 ASKPC USA: Atlanta, Georgia USA Email: support@askpc.net Phone: +1-678-919-2315 ASKPC Middle East Representation Office: Nasr City, Cairo Egypt Tel: +20 124473366 Email: info@ask-pc.com