Courses Offered under the IMPACT EC-Council Training Sponsorship Programme Network Security Administrator (E|NSA) Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. Who Should Attend System administrators, Network administrators and anyone who is interested in network security technologies. Prerequisites This course is a prerequisite for the CEH program. Certified Ethical Hacker (C|EH) Course Description This course will immerse the students into an environment where they will learn how to scan, test, hack and secure their own systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. 1 Computer Hacking Forensic Investigator (C|HFI) Course Description The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you. Who Should Attend Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers Prerequisites It is strongly recommended that you attend the CEH class before enrolling into CHFI program. Certified Security Analyst (E|CSA) / Licensed Penetration Tester (L|PT) Course Description ECSA/LPT is a security course like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments. EC-Council’s Certified Security Analyst/LPT program is designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them. Who Should Attend Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. Note: Upon Completion of (E|CSA), you can apply for (L|PT) 2 Certified Disaster Recovery Professional (E|DRP) Course Description This course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Who Should Attend Network server administrators, firewall administrators, systems administrators, application developers, and IT security officers. Modes of Delivery/Learning What is iLearn? • • • iLearn is a EC-Council Academia platform where students can download learning content such as PDF coursewares, lab exercises, teaching slides, ISO DVDs. It contains everything a student needs to get through EC-Council certification exams. Unlimited access to digital contents on a 24x7 basis on iLearn system for the particular subject matter. Benefits iLearn consist of comprehensive content covering the Information Security and eBusiness domains presented in convenient digitized format. All the content developed by EC-Council covering the field of Ethical Hacking and Countermeasures, Computer Forensics and Incidence Handling, Disaster Recovery, Penetration Testing, Network Security, Wireless Security, and many more are available for students to download and access immediately. 3