EC-Council: EC-Council Certified Security Specialist
This course prepares individuals to take the E|CSS exam, a valuable certification that complements academic programs in security and networking.
- Training Duration:
- 5 Days
- Delivery:
- Online & Face to Face
E|CSS is a valuable resource for professionals looking to develop their skills and expertise in network defense, ethical hacking, or digital forensics.
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Regulatory frameworks, laws, and acts
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- IoT Device Security
- Cryptography and PKI
- Data Security
- Network Traffic Monitoring
- Information security fundamentals
- Ethical Hacking Fundamentals
- Information Security Threats and Vulnerabilities
- Password Cracking Techniques and Countermeasures
- Social Engineering Techniques and Countermeasures
- Network-Level Attacks and Countermeasures
- Web Application Attacks and Countermeasures
- Wireless Attacks and Countermeasures
- Mobile Attacks and Countermeasures
- IoT and OT Attacks and Countermeasures
- Cloud Computing Threats and Countermeasures
- Penetration Testing Fundamentals
- Computer Forensics Fundamentals
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Investigating Email Crime
- Malware Forensics
Network Defense Essentials
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- IoT Device Security
- Cryptography and the Public Key Infrastructure
- Data Security
- Network Traffic Monitoring
Ethical Hacking Essentials
- Information Security Fundamentals
- Ethical Hacking Fundamentals
- Information Security Threats and Vulnerability Assessment
- Password Cracking Techniques and Countermeasures
- Social Engineering Techniques and Countermeasures
- Network Level Attacks and Countermeasures
- Web Application Attacks and Countermeasures
- Wireless Attacks and Countermeasures
- Mobile Attacks and Countermeasures
- IoT & OT Attacks and Countermeasures
- Cloud Computing Threats and Countermeasures
- Penetration Testing Fundamentals
Digital Forensics Essentials
- Computer Forensics Fundamentals
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Investigating Email Crimes
- Malware Forensics
Understanding of IT
Share this course to someone
Facebook
Twitter
LinkedIn
WhatsApp
Email
Print