EC-Council Certified Security Specialist (ECSS)

hacking cycle

Intrusion Detection System

Digital Evidence

Digital Evidence

E-mail Crime and Computer Forensics

Writing Investigate Report

Request more information

We'll connect you at the earliest
EC-Council Certified Security Specialist (ECSS)
EC-Council Certified Security Specialist (ECSS)

Tools Covered in this Course

Course Details

Course Overview

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Information security plays a vital role in most organizations.

Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.

After completion of this course, you will accomplish the following:-

  • Key issues plaguing the information security, network security, and computer forensics
  • Fundamentals of networks and various components of the OSI and TCP/IP model
  • Various types of information security threats and attacks, and their countermeasures
  • Identification, authentication, and authorization concepts
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Fundamentals of IDS and IDS evasion techniques
  • Data backup techniques and VPN security
  • Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies
  • such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private
  • Network, and Honeypot
  • Social engineering techniques, identify theft, and social engineering countermeasures
  • Different stages of the hacking cycle
  • Various network security protocols
  • Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security
  • Different types of web server and web application attacks, and countermeasures
  • Fundamentals of ethical hacking and pen testing
  • Incident handling and response process
  • Cyber-crime and computer forensics investigation methodology
  • Different types of digital evidence and digital evidence examination process
  • Different type of file systems and their comparison (based on limit and features)
  • Steganography and its techniques
  • Different types of log capturing, time synchronization, and log capturing tools
  • E-mails tracking and e-mail crimes investigation
  • Writing investigation report
  • Gathering volatile and non-volatile information from Windows and network
  • forensics analysis mechanism

Who Should Join:

Anyone who is keen to learn practical knowledge in Computer Science, Information Security, Network Security or even Computer Forensics.

Duration: 5 Days (40 Hours)

Course Outline

  • Module 1: Information Security Fundamentals
  • Module 2: Information Security Fundamentals
  • Module 3: Secure Network Protocols
  • Module 4: Information Security Threats and Attacks
  • Module 5: Social Engineering
  • Module 6: Hacking Cycle
  • Module 7: Identification, Authentication and Authorization
  • Module 8: Cryptography
  • Module 9: Firewalls
  • Module 10: Intrusion Detection System
  • Module 11: Data Backup
  • Module 12: Virtual Private Network
  • Module 13: Wireless Network Security
  • Module 14: Web Security
  • Module 15: Ethical Hacking and Pen Testing
  • Module 16: Incident Response
  • Module 17: Computer Forensics Fundamentals
  • Module 18: Digital Evidence
  • Module 19: Understanding File Systems
  • Module 20: Windows Forensics
  • Module 21: Network Forensics and Investigating Network Traffic
  • Module 22: Steganography
  • Module 23: Analyzing Logs
  • Module 24: E-mail Crime and Computer Forensics
  • Module 25: Writing Investigate Report

FAQ