Course Provider
What will you learn in this course?
- This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
- Facilitates your entry into the world of Information Security
- Provides professional understanding about the concepts of Information Security, Network Security, and Computer Forensics
- Provides best practices to improve organizational security posture.
- Enhances your skills as a Security Specialist and increases your employability.
EC-Council Certified Security Specialist (ECSS)
-
Skill Type
Emerging Tech
- Domain
Cybersecurity
- Course Category
Deepskilling Course
- Certificate Earned Joint Co-Branded Participation Certificate & Partner Completion certificate
- Nasscom Assessment Coming Soon
- Course Covered under GoI Incentive
Yes
-
- Course Price
40,000
- Course Duration
40 Hours
- Course Price
Why should take this this course?
- To Learn:
- Key issues plaguing the information security, network security, and computer forensic
- Fundamentals of networks and various components of the OSI and TCP/IP model
- Various network security protocols
- Various types of information security threats and attacks, and their countermeasures
- Social engineering techniques, identify theft, and social engineering countermeasures
- Different stages of hacking cycle
- Identification, authentication, and authorization concepts
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot.
- Fundamentals of IDS and IDS evasion techniques
- Data backup techniques and VPN security
- Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi Security
- Different types of web servers, and web application attacks, and countermeasures.
- Fundamentals of ethical hacking and pen testing
- Incident Handling and response process
- Cyber-crime and computer forensic investigation methodology
- Different types of digital evidence and digital evidence examination process.
- Different types of file systems and their comparison (based on limit and features)
- Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism
- Steganography and its techniques
- Different types of log capturing, time synchronization, and log capturing tools.
- E-mail tracking and e-mail crimes investigation
- Writing investigation report.
Who should you take this course?
Anyone who want to enhance their skills and make career in information security, network security, and computer forensic fields.
Curriculum
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls - Administrative Controls
- Network Security Controls - Physical Controls
- Network Security Controls - Technical Controls
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- IoT Device Security
- Cryptography and PKI
- Data Security
- Network Traffic Monitoring
- Information Security Fundamentals
- Ethical Hacking Fundamentals
- Information Security Threats and Vulnerability Assessment
- Password Cracking Techniques and Countermeasures
- Social Engineering Techniques and Countermeasures
- Network Level Attacks and Countermeasures
- Web Application Attacks and Countermeasures
- Wireless Attacks and Countermeasures
- Mobile Attacks and Countermeasures
- IoT and OT Attacks and Countermeasures
- Cloud Computing Threats and Countermeasures
- Penetration Testing Fundamentals
- Computer Forensics Fundamentals
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Investigating Email Crimes
- Malware Forensics
Tools you will learn in this course:
- Docker Bench for security
- AWS
- Miradore MDM
- HashCalc, MD5 calculator
- HashMyFiles
- VeraCrypt, Data
- Recovery Wizarda
- L0phtCrack
- Netcraft
- SQL Injection Detection Tool
- Web Application Security Scanner
- ARP Spoofing Detection Tools Linux
- Windows
- Sleuth Kit
- Wireshak
- Splunk
- TOR browser
- ESEDatabaseView