EC-Council Security Analyst v9
AUDIENCE
Ethical Hackers, Penetration Testers Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.
DESCRIPTION
This course is Intensively Hands-on and only candidates that successfully complete the penetration test in the Cyber Range iLabs environment are allowed to challenge the ECSA exam.
Prequisites:
Previous attendance of a CEH v9 training or mastering an equivalent level of knowledge is recommended.
AGENDA
CONTENT
Course Outline:
Core Modules
· Module 1: Security Analysis and Penetration Testing Methodologies
· Module 2: TCP IP Packet Analysis
· Module 3: Pre-penetration Testing Steps
· Module 4: Information Gathering Methodology
· Module 5: Vulnerability Analysis
· Module 6: External Network Penetration Testing Methodology
· Module 7: Internal Network Penetration Testing Methodology
· Module 8: Firewall Penetration Testing Methodology
· Module 9: IDS Penetration Testing Methodology
· Module 10: Web Application Penetration Testing Methodology
· Module 11: SQL Penetration Testing Methodology
· Module 12: Database Penetration Testing Methodology
· Module 13: Wireless Network Penetration Testing Methodology
· Module 14: Mobile Devices Penetration Testing Methodology
· Module 15: Cloud Penetration Testing Methodology
· Module 16: Report Writing and Post Test Actions
Self-Study Modules:
· Module 17: Password Cracking Penetration Testing
· Module 18: Router and Switches Penetration Testing
· Module 19: Denial-of-Service Penetration Testing
· Module 20: Stolen Laptop, PDAs and Cell Phones Penetration Testing
· Module 21: Source Code Penetration Testing
· Module 22: Physical Security Penetration Testing
· Module 23: Surveillance Camera Penetration Testing
· Module 24: VoIP Penetration Testing
· Module 25: VPN Penetration Testing
· Module 26: Virtual Machine Penetration Testing
· Module 27: War Dialing
· Module 28: Virus and Trojan Detection
· Module 29: Log Management Penetration Testing
· Module 30: File Integrity Checking
· Module 31: Telecommunication and Broadband Communication Penetration Testing
· Module 32: Email Security Penetration Testing
· Module 33: Security Patches Penetration Testing
· Module 34: Data Leakage Penetration Testing
· Module 35: SAP Penetration Testing
· Module 36: Standards and Compliance
· Module 37: Information System Security Principles
· Module 38: Information System Incident Handling and Response
· Module 39: Information System Auditing and Certificatio
EC-Council - Certified Ethical Hacker
DESCRIPTION
The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!This course was designed to provide you with the tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. It puts you in the driver’s seat of a hands-on environment with a systematic ethical hacking process.
The purpose of the CEH credential is to:
•Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
•Inform the public that credentialed individuals meet or exceed the minimum standards.
•Reinforce ethical hacking as a unique and self-regulating profession.
AUDIENCE
Security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.
AGENDA
CONTENT
Content:
-
Introduction to Ethical Hacking
-
Footprinting and Reconnaissance
-
Scanning Networks
-
Enumeration
-
System Hacking
-
Trojans and Backdoors
-
Viruses and Worms
-
Sniffing
-
Social Engineering
-
Denial of Service
-
Session Hijacking
-
Hacking Webservers
-
Hacking Web Applications
-
SQL Injection
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
Evading IDS, Firewalls and Honeypots
-
Buffer Overflows
-
Cryptography
- Penetration Testing
GDPR Introduction
DESCRIPTION
Why should you attend?
GDPR Introduction training course enables you to comprehend the basic concepts and requirements of the General Data Protection Regulation (GDPR). By attending the GDPR Introduction course, you will understand the importance of the GDPR and the benefits that business, society and governments can obtain.
Learning objectives
- Understand the fundamental principles of privacy and the history of personal data protection in Europe
- Understand the basic concepts and requirements of the General Data Protection Regulation (GDPR)
AUDIENCE
Who should attend?
- Individuals interested in the fundamental principles of privacy
- Individuals seeking to gain knowledge about the main requirements of the General Data Protection Regulation (GDPR)
AGENDA
CONTENT
Topics covered include:
Section 01: Course objectives and structure
Section 02: General data protection regulation
Section 03: Data protection principles, challenges and issues
Section 04: Rights of the data subject
Section 05: Data controllers, processor and the DPO
Section 06: Data protection impact assessment and privacy impact assessment
Section 07: Personal data transfer to third parties
Section 08: Closing the training
GDPR Foundation
AUDIENCE
• Individuals involved in Personal Data Protection and Information Security
• Individuals seeking to gain knowledge about the main privacy principles
• Individuals interested to pursue a career in Data Protectio
AGENDA
CONTENT
Topics covered include:
Day 1: Introduction to the General Data Protection Regulation
Section 01: Course objectives and structure
Section 02: General data protection regulation
Section 03: Data protection principles, challenges and issues
Section 04: Rights of the data subject
Section 05: Data controllers, processors and the data protection officer
Section 06: Data protection authorities
Day 2: Preparing for GDPR and Certification Exam
Section 07: Data mapping plan
Section 08: Risk assessment under GDPR
Section 09: Data protection impact assessment
Section 10: Privacy impact assessment (PIA)
Section 11: Personal data transfers to third parties
Section 12: Remedies, liabilities and penalties
Section 13: Certification process and closing the training
GDPR Data Protection Officer
AUDIENCE
• Project managers or consultants wanting to prepare and to support an organization in the implementation of the new procedures and adoption of the new requisites presented in the GDPR, which will come into force and effect by the 25th May 2018
• DPO and Senior Managers responsible for the personal data protection of an enterprise and the management of its risks
• Members of an information security, incident management and business continuity team
• Expert advisors in security of personal data
• Technical experts and compliance experts wanting to prepare for a Data Protection Officer job
AGENDA
CONTENT
Topics covered include:
Service Management concepts
- Service & Product
- Outputs & Outcomes
- Value,Cost,Risk
4 Dimensions
- Organizations & People
- Valuestreams & Processes
- Technology & Information
- Partnersand & Suppliers
Service Value System
- 7 guiding principles
- Governance
– Evaluate
– Direct
– Monitor
- Continual Improvement
Service Value Chain
- Plan
- Improve
- Engage
- Design/ Transition
- Obtain/ Build
- Deliver/ Support
Management Practices
- General
- Service
- Technical
Training Calendar
You are interested in ITIL Training?
Contact us for more information


