Certified Security Specialist | ECSS

Basic concepts of forensic technology and network security

Requirements:
  • English language

The EC-Council Certified Security Specialist (E|CSS) is a core security program covering the fundamentals of information security, computer forensics, and network security.

Enables students to identify information security threats that reflect an organization's security posture and implement general security controls.

Target audience:

  • Network security

  • Security specialist

  • Information security

What will you learn

More information
  • Various network security protocols
  • Different stages of the hacking cycle
  • Concepts of identification, authentication and authorization
  • Key issues plaguing information security, network security and computer forensics

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 10:30 Information Security Fundamentals
  • Data Breach Statistics 
  • Data Loss Statistics
10:30 – 10:45 Coffee break
10:45 – 12:15 Networking Fundamentals
  • Introduction 
  • Types of Networks
12:15 – 13:15 Lunch break
13:15 – 14:45 Secure Network Protocols
  • Introduction 
  • Terminology
Information Security Threats and Attacks
  • The Global State of Information Security Survey 2016
14:45 – 15:00 Coffee break
15:00 – 17:00 Social Engineering
  • What is Social Engineering? 
  • Behaviors Vulnerable to Attacks

2nd Day

09:00 – 10:30 Hacking Cycle
  • What is Hacking?
  •  Who is a Hacker?
Identification, Authentication, and Authorization
  • Identification 
  • Authentication 
  • Authorization
10:30 – 10:40 Coffee break
10:40 – 12:15 Cryptography
  • Terminology 
  • Cryptography
12:15 – 13:15 Lunch break
13:15 – 14:45 Firewalls
  • Firewall Technologies
  • DMZ
  • Proxy Server
14:45 – 15:00 Coffee break
15:00 – 17:00 Intrusion Detection System
  • Terminologies 
  • Intrusion Detection System (IDS)

3rd Day

09:00 – 10:30 Data Backup
  • Introduction to Data Backup 
  • Identifying Critical Business Data
10:30 – 10:45 Coffee break
10:45 – 12:15 Virtual Private Network
  • What is a VPN?
  •  VPN Deployment
  •   Tunneling
12:15 – 13:15 Lunch break
13:15 – 14:45 Wirless Network Security
  • Wireless Networks
  • Wireless Terminologies
14:45 – 15:00 Coffee break
15:00 – 17:00 Web Security
  • Introduction to Web Applications 
  • Web Application Components
Ethical Hacking and Pen Testing
  • What is Ethical Hacking?

4th Day

09:00 – 10:30 Incident Response
  • Common Terminologies
  • Data Classification
10:30 – 10:45 Coffee break
10:45 – 12:15 Computer Forensics Fundamentals
  • Cyber Crime
12:15 – 13:15 Lunch break
13:15 – 14:45 Digital Evidence
  • Definition of Digital Evidence
14:45 – 15:00 Coffee break
15:00 – 17:00 Understanding File Systems
  • Understanding File Systems 
  • Types of File Systems
Windows Forensics
  • Volatile Information 
  • Non-Volatile Information

5th Day

09:00 – 10:30 Network Forensics and Investigating Network Traffic
  • Network Forensics
  • Network Forensics Analysis Mechanism
10:30 – 10:45 Coffee break
10:45 – 12:15 Steganography
  • What is Steganography? 
  • Steganography Vs. Cryptography
12:15 – 13:15 Lunch break
13:15 – 14:45 Analyzing Logs
  • Importance of Logs in Forensics
  • Computer Security Logs
  • Operating System Logs
14:45 – 15:00 Coffee break
15:00 – 17:00 E-mail Crime and Computer Forensics
  • Email Terminology 
  • Email System
Writing Investigation Report
  • Computer Forensics Report
  • Block length 90
  • Teaching hours 40
  • Refreshments Yes
  • Exam Yes

This program will provide a comprehensive overview of the key components of information security, computer forensics and network security. The program provides a solid foundational knowledge needed for a career in information security.

Classes are taught in a virtual environment accessed by your own laptop. In the event you do not have access, we will provide one upon request.

Prestigious certification included

Certified Security Specialist | E|CSS

Educational institutions can provide greater value to students by providing not only one of the most up-to-date courses available today, but also a certification that empowers students in the corporate world.

Part of the training is the final EC-Council exam. Successful graduates will receive the prestigious Certified Security Specialist certification E|CSS.

Certification instructions

Exam format

Duration: 3 hours

Min. success rate: 70%

Format: Multiple Choice

Number of questions: 100

Online at the EC-Council Exam Portal

Frequently asked questions

All questions

What is EC-Council?

The International Council of E-Commerce Consultants is an international organization specializing in cybersecurity and information technology (IT) certification.

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.

How does the EC-Council final exam and certification work?

As part of the training, you will get access to virtual laboratories and you will receive an exam voucher. The exam can be taken in three ways:

• computer-based at TAYLLORCOX Campus

• computer-based at the Pearson VUE test center

• computer-based with an online proctor

You will get the results right after completing the exam. If you pass your exam, you will receive your EC-Council certificate within 2-3 working days.