EC-Council Certified Security Specialist (ECSS)
Duration : 5 Days (40 Hours)
EC-Council Certified Security Specialist (ECSS) Course Overview:
The EC-Council Certified Security Specialist (ECSS) is a foundational security program designed to cover the fundamental concepts of information security, computer forensics, and network security. This entry-level course empowers students to identify potential information security threats that may impact an organization’s security posture and implement essential security controls.
By enrolling in this program, participants gain a holistic overview of the critical components within the realms of information security, computer forensics, and network security. The ECSS course lays a solid foundation and imparts vital knowledge required for pursuing a successful career in the field of information security.
Intended Audience:
- Penetration Tester
- Vulnerability Analyst
- Security Information Assurance Analyst
- Technical Security Analyst
- Information Security Manager
- Risk and Remediation Manager
- Systems Administrator
- Cybersecurity Network Analyst
- Cyber Security Vulnerability Analyst
- Security Consultant
- Insider Threat Analyst
- Security Architect, Manager
- Application Security Analyst
- Cyber Security System Engineer
- Software Security Analyst
- Network Analyst
- Information System Security Officer
- SOC Security Analyst
- Cyber Security Incident Response Engineer
- Technical Operations Network Engineer
- IT Security Administrator
Learning Objectives of EC-Council Certified Security Specialist (ECSS):
- Key issues plaguing the information security, network security, and computer forensics
- Fundamentals of networks and various components of the OSI and TCP/IP model
- Various types of information security threats and attacks, and their countermeasures
- Identification, authentication, and authorization concepts
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Fundamentals of IDS and IDS evasion techniques
- Data backup techniques and VPN security
- Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies
- such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private
- Network, and Honeypot
- Social engineering techniques, identify theft, and social engineering countermeasures
- Different stages of hacking cycle
- Various network security protocols
- Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security
- Different types of web server and web application attacks, and countermeasures
- Fundamentals of ethical hacking and pen testing
- Incident handling and response process
- Cyber-crime and computer forensics investigation methodology
- Different types of digital evidence and digital evidence examination process
- Different type of file systems and their comparison (based on limit and features)
- Steganography and its techniques
- Different types of log capturing, time synchronization, and log capturing tools
- E-mails tracking and e-mail crimes investigation
- Writing investigation report
- Gathering volatile and non-volatile information from Windows and network
- forensics analysis mechanism
Module 1: Information Security Fundamentals
Module 2: Networking Fundamentals
Module 3: Secure Network Protocols
Module 4: Information Security Threats andAttacks
Module 5: Social Engineering
Module 6: Hacking Cycle
Module 7: Identification, Authentication, and Authorization
Module 8: Cryptography
Module 9: Firewalls
Module 10: Intrusion Detection System
Module 11: Data Backup
Module 12: Virtual Private Network
Module 13: Wireless Network Security
Module 14: Web Security
Module 15: Ethical Hacking and Pen Testing
Module 16: Incident Response
Module 17: Computer Forensics Fundamentals
Module 18: Digital Evidence
Module 19: Understanding File Systems
Module 20: Windows Forensics
Module 21: Network Forensics and Investigating Network Traffic
Module 22: Steganography
Module 23: Analyzing Logs
Module 24: E-mail Crime and Computer Forensics
Module 25: Writing Investigative Report
EC-Council Certified Security Specialist (ECSS) Course Prerequisites:
Basic Computer Knowledge.
Discover the perfect fit for your learning journey
Choose Learning Modality
Live Online
- Convenience
- Cost-effective
- Self-paced learning
- Scalability
Classroom
- Interaction and collaboration
- Networking opportunities
- Real-time feedback
- Personal attention
Onsite
- Familiar environment
- Confidentiality
- Team building
- Immediate application
Training Exclusives
This course comes with following benefits:
- Practice Labs.
- Get Trained by Certified Trainers.
- Access to the recordings of your class sessions for 90 days.
- Digital courseware
- Experience 24*7 learner support.
Got more questions? We’re all ears and ready to assist!