EC-Council Certified Security Specialist

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

Virtual Training nebo e-Learning?

Máme dostatečnou flexibilitu, takže vybírat můžete jak prezenční termíny, tak online kurzy.

Zkuste živý kurz virtuálně

Target Group

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

  • Network security
  • Security specialist
  • Information security
Target Group

You will learn

  • Different stages of hacking cycle
  • Various network security protocols
  • Identification, authentication, and authorization concepts
  • Key issues plaguing the information security, network security, and computer forensics

About ECSS

Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing

In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.

About ECSS

Certification

This certification is an excellent complement to educational offerings in the domain of security and networking.

Examination

Educational institutions can provide greater value to students by providing them not only with one of the most updated courses available today, but also a certification that empowers students in the corporate world.
  • Duration: 2 hours
  • Passing Score: 70%
  • Number of Questions: 50
  • Test Format: Multiple Choice
  • Test Delivery: EC-Council Exam Portal
Examination

Schedule

První den
Skrýt agendu
Otevřít agendu

09:00 – 10:30

Information Security Fundamentals

  • Data Breach Statistics 
  • Data Loss Statistics

10:30 – 10:45

Coffee break

10:45 – 12:15

Networking Fundamentals

  • Introduction 
  • Types of Networks

12:15 – 13:15

Lunch Menu | Oběd

13:15 – 14:45

Secure Network Protocols

  • Introduction 
  • Terminology

Information Security Threats and Attacks

  • The Global State of Information Security Survey 2016

14:45 – 15:00

Coffee break

15:00 – 17:00

Social Engineering

  • What is Social Engineering? 
  • Behaviors Vulnerable to Attacks

Druhý den
Skrýt agendu
Otevřít agendu

09:00 – 10:30

Hacking Cycle

  • What is Hacking?
  •  Who is a Hacker?

Identification, Authentication, and Authorization

  • Identification 
  • Authentication 
  • Authorization

10:30 – 10:45

Coffee break

10:45 – 12:15

Cryptography

  • Terminology 
  • Cryptography

12:15 – 13:15

Lunch Menu | Oběd

13:15 – 14:45

Firewalls

  • Firewall Technologies
  • DMZ
  • Proxy Server

14:45 – 15:00

Coffee break

15:00 – 17:00

Intrusion Detection System

  • Terminologies 
  • Intrusion Detection System (IDS)

Třetí den
Skrýt agendu
Otevřít agendu

09:00 – 10:30

Data Backup

  • Introduction to Data Backup 
  • Identifying Critical Business Data

10:30 – 10:45

Coffee break

10:45 – 12:15

Virtual Private Network

  • What is a VPN?
  •  VPN Deployment
  •   Tunneling

12:15 – 13:15

Lunch Menu | Oběd

13:15 – 14:45

Wirless Network Security

  • Wireless Networks
  • Wireless Terminologies

14:45 – 15:00

Coffee break

15:00 – 17:00

Web Security

  • Introduction to Web Applications 
  • Web Application Components

Ethical Hacking and Pen Testing

  • What is Ethical Hacking?

Čtvrtý den
Skrýt agendu
Otevřít agendu

09:00 – 10:30

Incident Response

  • Common Terminologies
  • Data Classification

10:30 – 10:45

Coffee break

10:45 – 12:15

Computer Forensics Fundamentals

  • Cyber Crime

12:15 – 13:15

Lunch Menu | Oběd

13:15 – 14:45

Digital Evidence

  • Definition of Digital Evidence

14:45 – 15:00

Coffee break

15:00 – 17:00

Understanding File Systems

  • Understanding File Systems 
  • Types of File Systems

Windows Forensics

  • Volatile Information 
  • Non-Volatile Information

Pátý den
Skrýt agendu
Otevřít agendu

09:00 – 10:30

Network Forensics and Investigating Network Traffic

  • Network Forensics
  • Network Forensics Analysis Mechanism

10:30 – 10:45

Coffee break

10:45 – 12:15

Steganography

  • What is Steganography? 
  • Steganography Vs. Cryptography

12:15 – 13:15

Lunch Menu - Oběd

13:15 – 14:45

Analyzing Logs

  • Importance of Logs in Forensics
  • Computer Security Logs
  • Operating System Logs

14:45 – 15:00

Coffee break

15:00 – 17:00

E-mail Crime and Computer Forensics

  • Email Terminology 
  • Email System

Writing Investigation Report

  • Computer Forensics Report

This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.

  • Délka bloku 90 minut
  • Vyučovacích hodin 40 hodin
  • Občerstvení Ano
  • Zkouška Ano

Jak kurz hodnotí absolventi?

V čem jsou naše reference výjimečné? Nejsou to jednorázové akce. K nám se lidé vrací rádi a nezavírají před námi dveře.

Podívejte se na úplný seznam referenčních klientů, kteří na nás nedají dopustit.

Vaše hodnocení
*****

Chcete to připravit na míru? Kontaktujte nás!

Zavolejte nám a my vám poradíme.

Jsme vám k dispozici na telefonním čísle +420 222 553 101 vždy od pondělí do pátku: 9:00 - 17:00.

*položky označené hvězdičkou jsou povinné

Chcete získat dárek k narozeninám?