Catalogue 225 Courses found
List of sub-fields
Course list
Reference | Course | Duration | Prices | |
---|---|---|---|---|
ECC ECSS-005 | EC council Application Security Engineer (CASE) | 3 days 24 hours |
||
ECC CCISO-001 | EC council Certified Chief Information Security Officer (CCISO) | 5 days 40 hours |
||
ECC CEH-001 | EC Council Certified Ethical Hacker (CEH) | 5 days 40 hours |
||
ECC CND-001 | EC Council Certified Network Defender (CND) | 5 days 40 hours |
||
ECC ECSS-0001 | EC Council Certified Security Specialist (ECSS) | 5 days 40 hours |
||
ECC ECSS-004 | EC council ICS/SCADA Cybersecurity | 4 days 32 hours |
||
ECC ECSS-003 | EC council Security Operations - CSA | 3 days 24 hours |
||
ECC CHFI-001 | EC Council Server & Web Forensic - CHFI | 5 days 40 hours |
||
ECC ECSS-006 | EC council SOC Analyst | 3 days 24 hours |
||
ECC ECSS-002 | EC council Threat Intelligence - CTIA | 3 days 24 hours |
3 days (24 hours)
At the end of this training, the participants will be able to:
- Analyze and understand Application Security.
- Establish a foundational understanding necessary for all application developers and development organizations.
- Demonstrate the ability to produce secure applications with enhanced stability and minimized security risks.
- Demonstrate the application of security activities in all phases of the SDLC: planning, creating, testing, and deploying an application to solve security-related problems.
- Explain the importance of incorporating secure requirement gathering, robust application design, and handling security issues in post development phases of application development in application security.
ECC ECSS-005
5 days (40 hours)
At the end of this training, the participants will be able to:
- Define, implement, manage, and maintain an information security governance program that includes leadership, organizational structures, and processes.
- Understand the framework connections for data analysis.
- Analyze a combination of topics such as audit management, governance, IS controls, human capital management, strategic program development.
- Apply advanced technical knowledge to the day-to-day responsibilities of an information security executive.
- Understand the financial expertise vital to leading a highly successful information security program.
ECC CCISO-001
5 days (40 hours)
At the end of the training, participants should be able to:
- Identify and understand various attack vectors used in cybersecurity breaches.
- Identify live and vulnerable machines in a network.
- Perform OS banner grabbing, service, and user enumeration.
- Analyze systems for potential vulnerabilities.
- Identify techniques for system hacking, steganography, steganalysis attacks, and covering tracks.
- Identify and use viruses, computer worms, and malware to exploit systems.
- Perform packet sniffing.
- Identify social engineering techniques.
- Identify Denial-of-Service attacks.
- Aware of session hijacking.
- Understand how to evade Intrusion Detection Systems (IDS), firewalls, and honeypots.
ECC CEH-001
5 days (40 hours)
At the end of this training, participants should be able to:
- Understand Network Security fundamentals which includes the true construct of data transfer, network technologies, software technologies, and how networks operate.
- Understand network components, traffic, performance and utilization, network topology, location of each system, and security policy.
- Develop the ability to manage equipment effectively and conduct risk assessments.
- Demonstrate proficiency in creating successful incident response plans.
- Analyze and implement various network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configurations.
- Demonstrate proficiency in understanding the intricacies of network traffic signatures, conduct thorough analysis, and perform vulnerability scanning as part of their mastery of network security.
- Design and implement various security policies for organizations, demonstrating their ability to analyze organizational needs.
ECC CND-001
5 days (40 hours)
At the end of the training, participants should be able to:
- Demonstrate the application of information security principles to solve security-related problems.
- Describe the fundamentals of network defense.
- Demonstrate proficiency in ethical hacking, and digital forensics.
- Demonstrate a comprehensive understanding of the cybersecurity.
ECC ECSS-0001
4 days (32 hours)
At the end of this training, the participants will be able to:
- Gain a foundational understanding of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
- Understand the vulnerabilities of ICS/SCADA systems and potential cyber threats.
- Understand control system attack surfaces, methods, and tools using the hands-on lab learning experience.
- Explain the control system approaches to system and network defense architectures and techniques.
- Develop incident-response skills in a control system environment.
- Understand governance models and resources for industrial cybersecurity professionals.
ECC ECSS-004
3 days (24 hours)
At the end of this training, the participants will be able to:
- Gain knowledge of Security Operations Center (SOC) processes, procedures, technologies, and workflows.
- Develop a basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber kill chain, etc.
- Demonstrate the use of standard forensic tools necessary to successfully carry out a computer forensic investigation.
- Explain the methodological approach to computer forensics presented by CSA, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
- Demonstrate proficiency in handling and responding to various security incidents.
ECC ECSS-003
5 days (40 hours)
At the end of this training, participants should be able to:
- Understand the security discipline of digital forensics from a vendor-neutral perspective.
- Acquire necessary hands-on experience with various forensic investigation techniques.
- Use standard forensic tools necessary to successfully carry out a computer forensic investigation.
- Identify methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
- Analyze and study IoT Forensics.
- Master tools and techniques to ensure security across various cloud platforms — Amazon Web Services, Microsoft Azure Cloud, and Google Cloud platform.
ECC CHFI-001
3 days (24 hours)
At the end of this training, the participants will be able to:
- Gain a comprehensive understanding of Security Operations Center (SOC) operations.
- Develop skills to recognize cyber threats.
- Respond effectively to security incidents.
- Use standard forensic tools necessary to successfully carry out a computer forensic investigation.
- Demonstrate proficiency in computer forensics by presenting a methodological approach including analyzing, synthesizing, and applying techniques such as searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
- Equip your team members with the basic knowledge and abilities required for elite performance including SIEM based investigations.
- Explain log analysis.
- Illustrate the proper use of a firewall.
ECC ECSS-006
3 days (24 hours)
At the end of this training, the participants will be able to:
- Describe the security discipline of Threat Intelligence from a vendor-neutral perspective.
- Identify various Cyber Threats, Threat actors, and their objectives for cyberattacks.
- Master the process of Planning and Direction in Threat intelligence.
- Collect and process Data effectively for Threat intelligence.
- Explain the framework connections for Data analysis.
- Identify the Critical Issues plaguing the information security world.
- Recognize the importance of Threat Intelligence in Risk Management, security information and Event Management (SIEM), and Incident response.