EC-Council Security Analyst v9
DESCRIPTION
This course is Intensively Hands-on and only candidates that successfully complete the penetration test in the Cyber Range iLabs environment are allowed to challenge the ECSA exam.
Prequisites:
Previous attendance of a CEH v9 training or mastering an equivalent level of knowledge is recommended.
AUDIENCE
Ethical Hackers, Penetration Testers Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.
AGENDA
CONTENT
Course Outline:
Core Modules
· Module 1: Security Analysis and Penetration Testing Methodologies
· Module 2: TCP IP Packet Analysis
· Module 3: Pre-penetration Testing Steps
· Module 4: Information Gathering Methodology
· Module 5: Vulnerability Analysis
· Module 6: External Network Penetration Testing Methodology
· Module 7: Internal Network Penetration Testing Methodology
· Module 8: Firewall Penetration Testing Methodology
· Module 9: IDS Penetration Testing Methodology
· Module 10: Web Application Penetration Testing Methodology
· Module 11: SQL Penetration Testing Methodology
· Module 12: Database Penetration Testing Methodology
· Module 13: Wireless Network Penetration Testing Methodology
· Module 14: Mobile Devices Penetration Testing Methodology
· Module 15: Cloud Penetration Testing Methodology
· Module 16: Report Writing and Post Test Actions
Self-Study Modules:
· Module 17: Password Cracking Penetration Testing
· Module 18: Router and Switches Penetration Testing
· Module 19: Denial-of-Service Penetration Testing
· Module 20: Stolen Laptop, PDAs and Cell Phones Penetration Testing
· Module 21: Source Code Penetration Testing
· Module 22: Physical Security Penetration Testing
· Module 23: Surveillance Camera Penetration Testing
· Module 24: VoIP Penetration Testing
· Module 25: VPN Penetration Testing
· Module 26: Virtual Machine Penetration Testing
· Module 27: War Dialing
· Module 28: Virus and Trojan Detection
· Module 29: Log Management Penetration Testing
· Module 30: File Integrity Checking
· Module 31: Telecommunication and Broadband Communication Penetration Testing
· Module 32: Email Security Penetration Testing
· Module 33: Security Patches Penetration Testing
· Module 34: Data Leakage Penetration Testing
· Module 35: SAP Penetration Testing
· Module 36: Standards and Compliance
· Module 37: Information System Security Principles
· Module 38: Information System Incident Handling and Response
· Module 39: Information System Auditing and Certificatio
EC-Council - Certified Ethical Hacker
DESCRIPTION
The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.
The purpose of the CEH credential is to:
•Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
•Inform the public that credentialed individuals meet or exceed the minimum standards.
•Reinforce ethical hacking as a unique and self-regulating profession.
AUDIENCE
Security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.
AGENDA
CONTENT
Content:
-
Introduction to Ethical Hacking
-
Footprinting and Reconnaissance
-
Scanning Networks
-
Enumeration
-
System Hacking
-
Trojans and Backdoors
-
Viruses and Worms
-
Sniffing
-
Social Engineering
-
Denial of Service
-
Session Hijacking
-
Hacking Webservers
-
Hacking Web Applications
-
SQL Injection
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
Evading IDS, Firewalls and Honeypots
-
Buffer Overflows
-
Cryptography
- Penetration Testing
GDPR Introduction
DESCRIPTION
Why should you attend?
GDPR Introduction training course enables you to comprehend the basic concepts and requirements of the General Data Protection Regulation (GDPR). By attending the GDPR Introduction course, you will understand the importance of the GDPR and the benefits that business, society and governments can obtain.
Learning objectives
- Understand the fundamental principles of privacy and the history of personal data protection in Europe
- Understand the basic concepts and requirements of the General Data Protection Regulation (GDPR)
AUDIENCE
Who should attend?
- Individuals interested in the fundamental principles of privacy
- Individuals seeking to gain knowledge about the main requirements of the General Data Protection Regulation (GDPR)
AGENDA
CONTENT
Topics covered include:
Section 01: Course objectives and structure
Section 02: General data protection regulation
Section 03: Data protection principles, challenges and issues
Section 04: Rights of the data subject
Section 05: Data controllers, processor and the DPO
Section 06: Data protection impact assessment and privacy impact assessment
Section 07: Personal data transfer to third parties
Section 08: Closing the training
GDPR Foundation
DESCRIPTION
After completing this course, you can sit for the exam and apply for a “PECB Certified GDPR Foundation” credential. A PECB Foundation Certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.
Learning objectives
• Understand the General Data Protection Regulation requirements and the fundamental principles of privacy
• Understand the obligations, roles and responsibilities of the Data Protection Officer
• Understand the concepts, approaches, methods and techniques to effectively align a compliance framework with regard to the protection of personal data
Prerequisites:
• None
Certification
• Upon the successful completion of the exam, you can apply for the credential “PECB Certified GDPR Foundation”
General information
• Certification fees are included on the exam price.
• Training material containing over 200 pages of information and practical examples will be distributed
• A participation certificate of 14 CPD (Continuing Professional Development) credits will be issued
• In case of exam failure, you can retake the exam within 12 months for free
AUDIENCE
• Individuals involved in Personal Data Protection and Information Security
• Individuals seeking to gain knowledge about the main privacy principles
• Individuals interested to pursue a career in Data Protectio
AGENDA
CONTENT
Topics covered include:
Day 1: Introduction to the General Data Protection Regulation
Section 01: Course objectives and structure
Section 02: General data protection regulation
Section 03: Data protection principles, challenges and issues
Section 04: Rights of the data subject
Section 05: Data controllers, processors and the data protection officer
Section 06: Data protection authorities
Day 2: Preparing for GDPR and Certification Exam
Section 07: Data mapping plan
Section 08: Risk assessment under GDPR
Section 09: Data protection impact assessment
Section 10: Privacy impact assessment (PIA)
Section 11: Personal data transfers to third parties
Section 12: Remedies, liabilities and penalties
Section 13: Certification process and closing the training
GDPR Data Protection Officer
DESCRIPTION
Learning objectives
• Understand the history of personal data protection in Europe
• Gain a comprehensive understanding of the concepts and approaches required for the effective alignment with the General Data Protection Regulation
• Understand the new requirements that the General Data Protection Regulation brings for EU organizations and non-EU organizations and when it is necessary to implement them
• Acquire the necessary expertise to support an organization in assessing the implementation of these new requirements
• Learn how to manage a team implementing the GDPR
• Gain the knowledge and skills required to advise organizations how to manage personal data
• Acquire the expertise for analysis and decision making in the context of personal data protection
Prerequisites
• None
Certification
After successfully completing the exam, you can apply for the credentials shown on the table below. You will receive a certificate once you comply with all the requirements related to the selected credential.
• PECB Provisional Data Protection Officer:
o Exam: PECB Certified Data Protection Officer exam or equivalent
o Professional experience: None
o Cybersecurity experience: None
o Other requirements: Signing the PECB Code of Ethics
• PECB Certified Data Protection Officer:
o Exam: PECB Certified Data Protection Officer exam or equivalent
o Professional experience: Five years, Two years of work experience in Data Protection
o Cybersecurity experience: Data Protection activities: a total of 300 hours
o Other requirements: Signing the PECB Code of Ethics
AUDIENCE
• Project managers or consultants wanting to prepare and to support an organization in the implementation of the new procedures and adoption of the new requisites presented in the GDPR, which will come into force and effect by the 25th May 2018
• DPO and Senior Managers responsible for the personal data protection of an enterprise and the management of its risks
• Members of an information security, incident management and business continuity team
• Expert advisors in security of personal data
• Technical experts and compliance experts wanting to prepare for a Data Protection Officer job
AGENDA
CONTENT
Topics covered include:
Service Management concepts
- Service & Product
- Outputs & Outcomes
- Value,Cost,Risk
4 Dimensions
- Organizations & People
- Valuestreams & Processes
- Technology & Information
- Partnersand & Suppliers
Service Value System
- 7 guiding principles
- Governance
– Evaluate
– Direct
– Monitor
- Continual Improvement
Service Value Chain
- Plan
- Improve
- Engage
- Design/ Transition
- Obtain/ Build
- Deliver/ Support
Management Practices
- General
- Service
- Technical
Training Calendar
You are interested in ITIL Training?
Contact us for more information