1 Courses Offered under the IMPACT EC

advertisement
Courses Offered under the IMPACT EC-Council Training Sponsorship Programme
Network Security Administrator (E|NSA)
Course Description
This course looks at the network security in defensive view. The ENSA program is
designed to provide fundamental skills needed to analyze the internal and external
security threats against a network, and to develop security policies that will protect an
organization’s information. Students will learn how to evaluate network and Internet
security issues and design, and how to implement successful security policies and
firewall strategies. In addition, they will learn how to expose system and network
vulnerabilities and defend against them.
Who Should Attend
System administrators, Network administrators and anyone who is interested in network
security technologies.
Prerequisites
This course is a prerequisite for the CEH program.
Certified Ethical Hacker (C|EH)
Course Description
This course will immerse the students into an environment where they will learn how to
scan, test, hack and secure their own systems. Students will begin by understanding
how perimeter defenses work and then be lead into scanning and attacking their own
networks, no real network is harmed. Students then learn how intruders escalate
privileges and what steps can be taken to secure a system. Students will also learn
about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer
Overflows and Virus Creation. This course prepares you for EC-Council Certified Ethical
Hacker exam 312-50
Who Should Attend
This course will significantly benefit security officers, auditors, security professionals, site
administrators, and anyone who is concerned about the integrity of the network
infrastructure.
1
Computer Hacking Forensic Investigator (C|HFI)
Course Description
The CHFI course will give participants the necessary skills to identify an intruder's
footprints and to properly gather the necessary evidence to prosecute. Many of today's
top tools of the forensic trade will be taught during this course, including software,
hardware and specialized techniques. The need for businesses to become more efficient
and integrated with one another, as well as the home user, has given way to a new type
of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be
comprised (hacked)?" but, rather, "when?" Today's battles between corporations,
governments, and countries are no longer fought only in the typical arenas of
boardrooms or battlefields using physical force. Now the battlefield starts in the technical
realm, which ties into most every facet of modern day life. If you or your organization
requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then
this is the course for you.
Who Should Attend
Police and other law enforcement personnel, Defense and Military personnel, e-Business
Security professionals, Systems administrators, Legal professionals, Banking, Insurance
and other professionals, Government agencies, IT managers
Prerequisites
It is strongly recommended that you attend the CEH class before enrolling into CHFI
program.
Certified Security Analyst (E|CSA) / Licensed Penetration Tester (L|PT)
Course Description
ECSA/LPT is a security course like no other! Providing real world hands on experience,
it is the only in-depth Advanced Hacking and Penetration Testing class available that
covers testing in all modern infrastructures, operating systems and application
environments.
EC-Council’s Certified Security Analyst/LPT program is designed to teach Security
Professionals the advanced uses of the LPT methodologies, tools and techniques
required to perform comprehensive information security tests. Students will learn how to
design, secure and test networks to protect your organization from the threats hackers
and crackers pose. By teaching the tools and ground breaking techniques for security
and penetration testing, this class will help you perform the intensive assessments
required to effectively identify and mitigate risks to the security of your infrastructure. As
students learn to identify security problems, they also learn how to avoid and eliminate
them.
Who Should Attend
Network server administrators, Firewall Administrators, Security Testers, System
Administrators and Risk Assessment professionals.
Note: Upon Completion of (E|CSA), you can apply for (L|PT)
2
Certified Disaster Recovery Professional (E|DRP)
Course Description
This course teaches you the methods in identifying vulnerabilities and takes appropriate
countermeasures to prevent and mitigate failure risks for an organization. It also provides
the networking professional with a foundation in disaster recovery principles, including
preparation of a disaster recovery plan, assessment of risks in the enterprise,
development of policies, and procedures, and understanding of the roles and
relationships of various members of an organization, implementation of the plan, and
recovering from a disaster. This course takes an enterprise-wide approach to developing
a disaster recovery plan. Students will learn how to create a secure network by putting
policies and procedures in place, and how to restore a network in the event of a disaster.
Who Should Attend
Network server administrators, firewall administrators, systems administrators,
application developers, and IT security officers.
Modes of Delivery/Learning
What is iLearn?
•
•
•
iLearn is a EC-Council Academia platform where students can download learning
content such as PDF coursewares, lab exercises, teaching slides, ISO DVDs.
It contains everything a student needs to get through EC-Council certification
exams.
Unlimited access to digital contents on a 24x7 basis on iLearn system for the
particular subject matter.
Benefits
iLearn consist of comprehensive content covering the Information Security and
eBusiness domains presented in convenient digitized format.
All the content developed by EC-Council covering the field of Ethical Hacking and
Countermeasures, Computer Forensics and Incidence Handling, Disaster Recovery,
Penetration Testing, Network Security, Wireless Security, and many more are available
for students to download and access immediately.
3
Download