Computer Forensics and Security Institute



Similar documents
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Networking: EC Council Network Security Administrator NSA

Network Security Administrator

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Brandman University. School of CCNA

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Diploma in Network (LAN/WAN) Administration

Cisco Certified Network Professional (CCNP Routing & Switching)

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Course Contents CCNP (CISco certified network professional)

Information Technology Cluster

EC-Council. Certified Ethical Hacker. Program Brochure

Cisco Networking Professional-6Months Project Based Training

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

LINUX / INFORMATION SECURITY

Security + Certification (ITSY 1076) Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC Council Certified Ethical Hacker V8

Chapter 1 The Principles of Auditing 1

EC-Council Certified Security Analyst (ECSA)

Cisco Certified Network Expert (CCNE)

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Securing Cisco Network Devices (SND)

Implementing Cisco IOS Network Security v2.0 (IINS)

CompTIA Network+ (Exam N10-005)

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

IT Networking and Security

EC-Council Ethical Hacking and Countermeasures

CompTIA Security+ (Exam SY0-410)

Computer Network Engineering

Hackers are here. Where are you?

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

[CEH]: Ethical Hacking and Countermeasures

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Certified Ethical Hacker (CEH)

Interconnecting Cisco Networking Devices Part 2

How To Learn Cisco Cisco Ios And Cisco Vlan

CYBERTRON NETWORK SOLUTIONS

Course Title: Penetration Testing: Security Analysis

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

50 Cragwood Rd, Suite 350 South Plainfield, NJ Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

How To Pass A Credit Course At Florida State College At Jacksonville

CCNA Security v1.0 Scope and Sequence

NETWORK SECURITY (W/LAB) Course Syllabus

(d-5273) CCIE Security v3.0 Written Exam Topics

CEH Version8 Course Outline

information security and its Describe what drives the need for information security.

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Cisco Certified Network Professional - Routing & Switching

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

"Charting the Course...

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Associate in Science Degree in Computer Network Systems Engineering

Bachelor of Information Technology (Network Security)

IINS Implementing Cisco Network Security 3.0 (IINS)

Cisco 12 CCNA Certification

CCNA Cisco Associate- Level Certifications

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Security+ Certification Course

Hackers are here. Where are you?

How To Get A Computer Hacking Program

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Network System Design Lesson Objectives

ISOM3380 Advanced Network Management. Spring Course Description

ICT Infrastructure & Network Management

Description: Objective: Attending students will learn:

Implementing Cisco IOS Network Security

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days

Welcome to Todd Lammle s CCNA Bootcamp

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Cisco Certified Security Professional (CCSP)

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Tim Bovles WILEY. Wiley Publishing, Inc.

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Understanding Security Testing

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

CCNA Security v1.0 Scope and Sequence

13 Courses Quick Guide

CCNP: Implementing Secure Converged Wide-area Networks

CRYPTUS DIPLOMA IN IT SECURITY

Both CCNP ROUTE and CCNP SWITCH. Plan and document the most common maintenance functions in complex enterprise networks

Transcription:

Computer Forensics and Security Institute Course Brochure 2015 www.cfsi.co #3 De Verteuil Terrace,

Endeavour Road, Chaguanas, Trinidad, West Indies. Email: info@cfsi.co Tel: 1-868-684-0029 Find us on Facebook: www.facebook.com/cfsitrinidad CFSI is a Registered Company as well as an ATC (Authorised Training Centre) and Authorised Testing Centre for the Ec-Council (www.eccouncil.org). 2

Contents: Find us on Facebook: www.facebook.com/cfsitrinidad... 2 CompTIA Network+ (N10-005)... 3 Cisco Certified Network Associate (CCNA)... 5 Cisco Certified Network Professional (CCNP)... 6 Microsoft Certified Solutions Associate (MCSA 2012)... 8 Information Technology Infrastructure Library (ITIL)... 10 CompTIA Security+ (SY0-004)... 11 Certified Information Systems Auditor (CISA)... 12 Certified Information Security Manager (CISM)... 13 Certified Information Systems Security Professional (CISSP)... 14 EC-Council Certified Security Specialist (ECSS)... 15 EC-Council Certified Encryption Specialist (E CES)... 17 Project Management in IT Security (PMITS)... 19 EC-Council Network Security Administrator (ENSA)... 20 Certified Ethical Hacker (CEH) Version 8... 22 Computer Hacking Forensic Investigator (CHFI) Version 8... 24 Ec-Council Certified Systems Analyst (ECSA) Version 8... 26 HACKING AND PENETRATION TESTING KALI LINUX.... 28 Find us on Facebook: www.facebook.com/cfsitrinidad... 29 CompTIA Network+ (N10-005) 3

The CompTIA Network+ certification is the sign of a competent networking professional. It is an international, vendor-neutral certification that proves a technician s competency in managing, maintaining, troubleshooting, installing and configuring basic network infrastructure. Microsoft includes CompTIA Network+ in their Microsoft Certified Solutions Associate (MCSA) program, and other corporations such as Novell, Cisco and HP also recognize CompTIA Network+ as part of their certification tracks. Course Outline: Introduction to Networks Common Networking Protocols and Ports TCP/IP Addressing Routing Protocols Cables and Connectors Physical Network Topologies Wiring Distribution Components LAN Technologies WAN Technologies Wireless Technology Network Devices, Configuration and Management Network Monitoring and Optimization Network Troubleshooting Methodologies Common Network Troubleshooting Issues Network Scanners Firewalls IPSec VPN Tunnelling and Encryption Remote Access User Authentication Device Management Security Common Threats and Mitigation Hardware Tools Prerequisites: Working knowledge of Windows and the Internet. Contact Hours: 30 hrs. Who Should Attend: Computer Technicians and persons interested in moving on towards being Network Administrators or heading into IT Security as a career. 4

Cisco Certified Network Associate (CCNA) The Cisco Certified Network Associate (CCNA) certification validates your skills and knowledge required to deploy, maintain, secure and operate a medium-sized network using Cisco technologies. CCNA certified professionals can install, configure and operate LAN, WAN and dial access services for small networks. Students will gain the knowledge and skills required to operate, and troubleshoot a small to medium size enterprise branch network, including connecting to a WAN; implementing network security; network types; network media; routing and switching fundamentals; the WAN technologies as well as operating and configuring IOS devices. Course Outline: The OSI Model and TCP/IP Topologies, Transmission Media, Devices, Cables and Protocols. LAN Switches and the Cisco Switch IOS Securing, Optimizing and Troubleshooting Switches Wireless Networking, Security and Implementation Advanced TCP/IP: IP Subnetting, CIDR and VLSM Router and Routing Configurations SDM and DHCP Server Configuration Internet Access with NAT and PAT Telnet, SSH, and CDP Management and Security: File Management Configuring VLANs, Trunks, VTP and STP Distance Vector vs. Link State Protocols: RIP, OSPF, EIGRP Access-Lists: The Rules of the ACL Access-Lists: Configuring ACLs WAN Connectivity: VPN's, Frame Relay, ATM FDDI Prerequisites: Network+ and a thorough understanding of the OSI model. Contact Hours: 42 Who Should Attend: Computer and Network Technicians and Administrators as well as persons interested in moving on towards becoming Network / System Administrators and IT Professionals. 5

Cisco Certified Network Professional (CCNP) The Cisco CCNP curriculum is designed for students seeking career oriented, enterprise-level networking skills. CCNP equips students with the knowledge and skills needed to plan, implement, secure, maintain, and troubleshoot converged enterprise networks. The CCNP curriculum was designed to reflect the job skills and responsibilities that are associated with professional-level job roles such as network engineer, systems engineer, network support engineer, network administrator, network consultant, and system integrator. With a CCNP, a network professional can install, configure, and troubleshoot local and wide area networks for enterprise organizations with networks from 100 to more than 500 nodes. Introduction SWITCH :: Campus Network Design SWITCH :: Layer 2 Switching vs. Layer 3 Routing SWITCH :: VLANs SWITCH :: Trunking SWITCH :: DTP, Trunking Allowed Lists & VTP SWITCH :: Spanning Tree Protocol SWITCH :: STP Optimization SWITCH :: Cisco PVST+ Enhancements SWITCH :: Rapid STP & Multiple STP SWITCH :: MST Configuration SWITCH :: STP Features SWITCH :: EtherChannel SWITCH :: Inter-VLAN Routing SWITCH :: High Availability SWITCH :: High Availability Part 2 SWITCH :: Layer 2 Security SWITCH :: Layer 2 Voice & Video Support SWITCH :: Wireless ROUTE :: IP Routing Overview ROUTE :: EIGRP Overview ROUTE :: EIGRP DUAL Calculation ROUTE :: EIGRP Implementation Examples ROUTE :: EIGRP Features ROUTE :: OSPF Overview ROUTE :: OSPF SPF Calculation ROUTE :: OSPF Media Dependencies ROUTE :: Single Area OSPF Implementation Examples ROUTE :: OSPF Areas & LSA Types ROUTE :: Multi Area OSPF Implementation Examples ROUTE :: OSPF Features ROUTE :: BGP Overview ROUTE :: BGP Implementation Examples ROUTE :: BGP Full Mesh, Route Reflectors, Confederation, Security & NLRI Advertisements ROUTE :: BGP NLRI Aggregation & BGP Attributes ROUTE :: BGP Bestpath Selection ROUTE :: Redistribution Part 1 ROUTE :: Redistribution Part 2 ROUTE :: Redistribution Part 3 ROUTE :: Redistribution Part 4 ROUTE :: Policy-Based Routing 6

ROUTE :: IPv6 TSHOOT :: Troubleshooting Overview TSHOOT :: Exam Demo TSHOOT :: Troubleshooting Tools TSHOOT :: LAN Troubleshooting TSHOOT :: IPv4 IGP Troubleshooting TSHOOT :: EIGRP Troubleshooting TSHOOT :: OSPF Troubleshooting TSHOOT :: BGP Troubleshooting Part 1 TSHOOT :: BGP Troubleshooting Part 2 TSHOOT :: IPv6 Troubleshooting Part 1 TSHOOT :: IPv6 Troubleshooting Part 2 TSHOOT :: IP Services Troubleshooting Part 1 TSHOOT :: IP Services Troubleshooting Part 2 Prerequisites: CCNA (Certified Cisco Network Associate). Contact Hours: 42-50 Who Should Attend: Computer and Network Technicians and Administrators as well as persons interested in moving on towards becoming Network / System Administrators and IT Professionals. 7

Microsoft Certified Solutions Associate (MCSA 2012) The MCSA course provides a working knowledge and understanding of designing, implementing, configuring and managing a Windows Server infrastructure, desktops and devices for small to enterprise level organizations. Students will implement and configure Windows Server 2012 core services, such as Active Directory and the networking services, administrator tasks necessary to maintain a Windows Server 2012 infrastructure, including user and group management, network access, and data security and perform advanced configuration tasks necessary to deploy, manage, and maintain a Windows Server 2012 infrastructure, including fault tolerance, certificate services, and identity federation. Windows Server 2012 certification involves taking and passing a series of three exams: Exam 410: Installing and Configuring Windows Server 2012 o Installing and Configuring Windows Server 2012 o Introduction to Active Directory Domain Services o Managing Active Directory Domain Services Objects o Automating Active Directory Domain Services Administration o Implementing Networking Services o Implementing Local Storage o Implementing File and Print Services o Implementing Group Policy o Implementing Server Virtualization with Hyper-V o Exam 411: Administering Windows Server 2012 o Implementing a Group Policy Infrastructure o Managing User and Service Accounts o Maintaining Active Directory Domain Services o Configure and Troubleshoot DNS o Configure and Troubleshoot Remote Access o Installing, Configuring, and Troubleshooting the Network Policy Server role o Optimizing File Services o Increasing File System Security o Implementing Update Management 8

Exam 412: Configuring Advanced Windows Server 2012 Services o Implementing Advanced Network Services o Implementing Advanced File Services o Implementing Dynamic Access Control o Implementing Network Load Balancing o Implementing Failover Clustering o Implementing Disaster Recovery o Implementing AD CS o Implementing AD FS Prerequisites: Hands-on Windows Client experience with Windows Vista, Windows 7, or Windows8. Network experience and the CompTIA Network+ course would be beneficial to potential candidates. Contact Hours: 24 per module. Who Should Attend: ICT Professionals, systems engineers, network engineers, systems analysts, network analysts, and technical consultants who want to prepare for their MCSA: Windows Server 2012 credential in an accelerated format. 9

Information Technology Infrastructure Library (ITIL) The Foundation Level is the entry level qualification which offers candidates a general awareness of the key elements, concepts and terminology used in the ITIL Service Lifecycle, including the linkages between Lifecycle stages, the processes used and their contribution to Service Management practices. This qualification is primarily aimed towards those who require a basic understanding of the ITIL framework as well as those who need understanding of how ITIL can be used to enhance the quality of IT service management within an organization and IT professionals or others working within an organization that has adopted and adapted ITIL who need to be informed about, or contribute to an ongoing service improvement programme. Course Outline: o o o o o o o o o Service management as a practice (comprehension) The ITIL service lifecycle (comprehension) Generic concepts and definitions (awareness) Key principles and models (comprehension) Selected processes (awareness) Selected functions (awareness) Selected roles (awareness) Technology and architecture (awareness) Competence and training (awareness) Prerequisites: None. Contact Hours: 24 Who Should Attend: open to any individuals who may have an interest in the subject. 10

CompTIA Security+ (SY0-004) The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Security+ is an international, vendor- neutral certification that proves competency in system security, network infrastructure, access control and organizational security. Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty, according to a 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain or increase their investment in security. Major organizations that employ CompTIA Security+ certified staff include Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh, Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U.S. Navy, Army, Air Force and Marines. Course Outline: Introduction to and the need for Security Evaluating Common Security Threats Operating System Hardening Application Security Implementing Security Applications Network Infrastructure Attacks Network Design Elements and Components Network Security Tools Wireless Network Security Access Control Assessments and Audits (Part 1) General Cryptography Concepts Cryptography Algorithms and Protocols Public Key Infrastructure (PKI) Organizational Security Prerequisites: Basic Networking and an Understanding of the OSI Model. Contact Hours: 24 Who Should Attend: Computer and Network Technicians and persons interested in moving on towards being Network and/or Security Administrators. 11

Certified Information Systems Auditor (CISA) The skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for individuals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. Course Outline: The IS Audit Process. Information Security Policies. Computer Assisted Audit Technique (CAAT) and Control Self-Assessment (CSA) Information Technology Governance. Risk Management Processes and Risk Analysis Methods. Project Management Practices, Tools and Control Frameworks. Organizational Change Management, IS Quality and Performance management. Systems and Infrastructure Life Cycle Management. Infrastructure Development Acquisition and IS Maintenance Methods. Application Controls and Auditing. Application developing, acquiring and maintaining business application systems. IT Service Delivery and Support. IS operation and Hardware, Hardware Management and IS architecture Incident and Problem Management Practices Information Security Management Network Infrastructure Security Attack Methods and Techniques Protection of Information Assets. Disaster Recovery and Business Continuity. Prerequisites: Training in Network+, Security+ and CEH or equivalent. Contact Hours: 30 Who Should Attend: Networking Professionals who wish to expand into the lucrative and in-demand field of Network Security and Auditing. 12

Certified Information Security Manager (CISM) ISACA Certified Information Security Manager (CISM) training course equips information security professionals with the knowledge and technical skills required for proficiency in building and managing enterprise information security. This exam benchmarks the understanding of essential concepts in many Information Security job practice areas. With the help of prominent industry leaders, subject matter experts and industry practitioners, ISACA has put together this exam to define what security managers do and what they need to know. Course Outline: Information Security Governance Risk Management Information Security Program Management Legal Issues Information Technology Deployment Risks IT Networks and Telecommunications Risks Integrating Information Security into Business Continuity, Disaster Recovery, and Incident Response Prerequisites: Security+, CISA, CEH and /or Security professionals with 3-5 years of frontline experience. Contact Hours: 30 Hours. Who Should Attend: Information security professionals and managers or those with management responsibilities; Information security staff and other information security assurance providers who require and in-depth understanding of information security management. 13

Certified Information Systems Security Professional (CISSP) CISSP certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security. CISSPs are information assurance professionals who define the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. The CISSP course covers critical topics in security today, including risk management, cloud computing, mobile security, application development security and more. Course Outline: Access Control Telecommunications and Network Security Information Security Governance and Risk Management Software Development Security Cryptography Security Architecture and Design Operations Security Business Continuity and Disaster Recovery Planning Legal, Regulations, Investigations and Compliance Physical (Environmental) Security Prerequisites: Security+, CISA, CEH and /or Security professionals with 3-5 years of frontline experience. Exam Prerequisites: Candidates must have a minimum of five years of experience in two of the ten domains. Contact Hours: 30 Hours. Who Should Attend: Information security professionals and managers or those with management responsibilities; Information security staff and other information security assurance providers who require and in-depth understanding of information security management. 14

EC-Council Certified Security Specialist (ECSS) EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Course Outline: Module 01: Information Security Fundamentals Module 02: Addressing Threats Module 03: Backdoors, Virus, and Worms Module 04: Introduction to the Linux Operating System Module 05: Password Cracking Module 06: Cryptography Module 07: Web Servers and Web Applications Module 08: Wireless Networks Module 09: Intrusion Detection System Module 10: Firewalls and Honeypots Module 11: Hacking Cycle Module 12: Introduction to Ethical Hacking Module 13: Networking Revisited Module 14: Secure Network Protocols Module 15: Authentication Module 16: Network Attacks Module 17: Bastion Hosts and DMZ Module 18: Proxy Servers Module 19: Virtual Private Network Module 20: Introduction to Wireless Network Security Module 21: Voice over Internet Protocol Module 22: Computer Forensics Fundamentals Module 23: Trademark, Copyright, and Patents Module 24: Network and Router Forensics Fundamentals Module 25: Incident Response and Forensics Module 26: Digital Evidence 15

Module 27: Understanding Windows, DOS, Linux, and Macintosh Module 28: Steganography Module 29: Analyzing Logs Module 30: E-mail Crime and Computer Forensics Module 31: Introduction to Writing Investigative Report Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 24 Who Should Attend: This course will benefit the students who are interested in learning fundamentals of information security, network security, and computer forensics. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $8500.00 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 16

EC-Council Certified Encryption Specialist (E CES) The EC-Council Certified Encryption Specialist (E CES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced: Course Outline. Overview of other algorithms such as Blowfish, Twofish, and Skipjack Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. Significant concepts such as diffusion, confusion, and Kerkchoff s principle. How to set up a VPN Encrypt a drive Hands-on experience with steganography Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA. Types of Encryption Standards and their differences. How to select the best standard for your organization. How to enhance your pen-testing knowledge in encryption. Correct and incorrect deployment of encryption technologies. Common mistakes made in implementing encryption technologies. Best practices when implementing encryption technologies. 17

Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 24 Who Should Attend: This course will benefit the students who are interested in learning fundamentals of information security, network security, and computer forensics. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $8500.00 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 18

Project Management in IT Security (PMITS) EC-Council s program on Project Management in IT Security is a highly interactive 2-day class designed to teach Information Technology Security Professionals real time implementation of project management practices in IT security planning. It comprehensively covers corporate security project plan components, costs involved in security, basis for a successful project, limitations of a Project, corporate strategy and IT security and the influence of corporate culture and policies on IT security. Students will learn to identify different issues arising during an organization-wide security planning and how to avoid and eliminate them. Course Outline: Components of Project Management in IT Security Organizing the IT Security Project Developing the IT Security Project Team Planning the IT Security Project Managing the IT PM Building Quality into IT Security Projects Closing Out the IT PM Define a Corporate IT Project Plan General IT Security Plan IT Operational Security Plan Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 24 Who Should Attend: Management people involved with security planning, Network server administrators, System Administrators and Risk Assessment professionals. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $8500.00 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 19

EC-Council Network Security Administrator (ENSA) The EC-Council's ENSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. EC-Council was honored at the 12th Colloquium for Information Systems Security Education (CISSE) by the United States Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) when its Network Security Administrator course (ENSA) was certified for meeting the 4011 training standard for information security professionals. Candidates who complete the EC-Council Network Security Administrator (ENSA) program will also have that extra credential meeting the requirements of the CNSS 4011 Federal Security Certification and Training Standards. Course Outline: Fundamentals of Network Network Protocols Protocol Analysis IEEE standards Network Security Security Standards Organizations Security Standards Security Policy 20

Hardening Physical Security Network Security Threats Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) Firewalls Packet Filtering and Proxy Servers Bastion Host and Honeypots Securing Modems Troubleshooting Network Hardening Routers Hardening Operating Systems Patch Management Log Analysis Application Security Web Security E-mail Security Authentication: Encryption, Cryptography and Digital Signatures Virtual Private Networks Wireless Network Security Creating Fault Tolerance Incident Response Disaster Recovery and Planning Network Vulnerability Assessment Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 30 Who Should Attend: System administrators, Network administrators and anyone who is interested in network security technologies. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $900.00 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Eccouncil (ATC) Authorised Training Centre 21

Certified Ethical Hacker (CEH) Version 8 To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in. This class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. Course Outline: 1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Hacking Mobile Platforms 17. Evading IDS, Firewalls and Honeypots 18. Buffer Overflows 19. Cryptography 20. Penetration Testing Prerequisites: Knowledge of TCP/IP, the OSI model and networking hardware. Contact Hours: 30 Who Should Attend: Security Officers, Auditors, Network and Security Administrators and Professionals, Administrators and anyone who is concerned about the integrity of the network infrastructure. 22

NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $900.00 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 23

Computer Hacking Forensic Investigator (CHFI) Version 8 Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. Students will draw on an array of methods for discovering data that resides in a computer system, recovering deleted, encrypted, or damaged file information in order to comprehend the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Course Outline: Module 01: Computer Forensics in Today s World Module 02: Computer Forensics Investigation Process Module 03: Searching and Seizing of Computers Module 04: Digital Evidence Module 05: First Responder Procedures Module 06: Computer Forensics Lab Module 07: Understanding Hard Disks and File Systems Module 08: Windows Forensics Module 09: Data Acquisition and Duplication Module 10: Recovering Deleted Files and Deleted Partitions Module 11: Forensics Investigation using AccessData FTK Module 12: Forensics Investigations Using Encase Module 13: Steganography and Image File Forensics Module 14: Application Password Crackers Module 15: Log Capturing and Event Correlation Module 16: Network Forensics, Investigating Logs and Investigating Network Traffic Module 17: Investigating Wireless Attacks Module 18: Investigating Web Attacks Module 19: Tracking Emails and Investigating Email Crimes Module 20: Mobile Forensics Module 21: Investigative Reports Module 22: Becoming an Expert Witness 24

Prerequisites: CEH is an asset but not required. Contact Hours: 30 Who Should Attend: The CHFI program is designed for all IT professionals involved with or interested in information system security, computer forensics, and incident response.. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $900.00 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 25

Ec-Council Certified Systems Analyst (ECSA) Version 8 ECSA works hand in hand with CEH by going into the analytical phase of ethical hacking. ECSA is a logical progression from CEH by giving you the skills to analyze the outcome from these tools and technologies. ECSA will assist you in conducting intensive assessments required to create a robust risk management system through groundbreaking penetration testing methods and techniques. Students will learn how to clarify, isolate and overcome security problems in order to effectively avoid and eliminate them. The class will enable you to provide the best complete coverage of network security- testing topic and analysis. Designing and performing comprehensive tests on your networks will be second nature to you once you leave this advance class. Course Outline: Need for Security Analysis TCP IP Packet Analysis Penetration Testing Methodologies Customers and Legal Agreements Rules of Engagement Penetration Testing Planning and Scheduling Pre - penetration Testing Steps Information Gathering Vulnerability Analysis External Penetration Testing Internal Network Penetration Testing Firewall Penetration Testing IDS Penetration Testing Password Cracking Penetration Testing Social Engineering Penetration Testing Web Application Penetration Testing SQL Penetration Testing Penetration Testing Reports and Post Testing Actions 26

Prerequisites: CEH (Certified Ethical Hacker). Contact Hours: 30 Who Should Attend: Network and Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals. NB: Students will be responsible for obtaining the kits (study materials and exam voucher) at an added expense of $890 USD (not included in the tuition fee) which is mandatory, as stated by the EC-council, in order to sit the exam and obtain certification. The study materials (with exam voucher) can be paid for separately as part of a payment plan. The kits can be purchased directly from CFSI which is an Ec-council (ATC) Authorised Training Centre. 27

HACKING AND PENETRATION TESTING KALI LINUX. BackTrack (BT) and Kali Linux are the "Swiss Army Knife" of penetration testing, information gathering and vulnerability assessment tools (all conveniently packaged in a free Linux distribution). From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system. Course Objectives: Installing Backtrack and Kali on Virtual Machines Uncovering hidden SSID's and creating Rouge Access Points Breaking wireless encryption (WEP, WPA and WPA2) Using NMAP scanner Pwning systems with the Metasploit Framework Exploitation System and Network Hacking Working with/ and Creating Backdoors, Trojans, Rootkits and Viruses Social Engineer Toolkit (SET) Maltego Web-based Attacks Working with/ and Creating Backdoors, Trojans, Rootkits and Viruses Password Sniffing and Cracking Wireshark Securing Systems and Networks. Forensic Tools Prerequisites: Network+ and CEH (Certified Ethical Hacker) are assets but not necessary. Contact Hours: 24 Who Should Attend: Ethical Hackers, Penetration Testers. Network and Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals and IT Security Enthusiasts. 28

CFSI. If we don't teach it, you don't need it. www.cfsi.co #3 De Verteuil Terrace, Endeavour Road, Chaguanas, Trinidad, West Indies. Email: info@cfsi.co Tel: 1-868-684-0029 Find us on Facebook: www.facebook.com/cfsitrinidad 29