ECSS v3 Training

EC-Council Certified Security Specialist (ECSS)

Description
Course Structure
Entery Requirements

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.

List of Modules

  • Module 01: Information Security Fundamentals
  • Module 02: Addressing Threats
  • Module 03: Backdoors, Virus, and Worms
  • Module 04: Introduction to the Linux Operating Sysem
  • Module 05: Password Cracking
  • Module 06: Cryptography
  • Module 07: Web Servers and Web Applications
  • Module 08: Wireless Networks
  • Module 09: Intrusion Detection System
  • Module 10: Firewalls and Honeypots
  • Module 11: Hacking Cycle
  • Module 12: Introduction to Ethical Hacking
  • Module 13: Networking Revisited
  • Module 14: Secure Network Protocols
  • Module 15: Authentication
  • Module 16: Network Attacks
  • Module 17: Bastion Hosts and DMZ
  • Module 18: Proxy Servers
  • Module 19: Virtual Private Network
  • Module 20: Introduction to Wireless Network Security
  • Module 21: Voice over Internet Protocol
  • Module 22: Computer Forensics Fundamentals
  • Module 23: Trademark, Copyright, and Patents
  • Module 24: Network and Router Forensics Fundamentals
  • Module 25: Incident Response and Forensics
  • Module 26: Digital Evidence
  • Module 27: Understanding Windows, DOS, Linux, and Macintosh
  • Module 28: Steganography
  • Module 29: Analyzing Logs
  • Module 30: E-mail Crime and Computer Forensics
  • Module 31: Introduction to Writing Investigative Report
  • Module 32: Computer Forensics as a Profession

Prerequisite

  • Security Officers
  • Auditors
  • Network Administrators
  • Firewall Administrators
  • Security Professionals
  • Penetration Testers
  • Anyone who is concerned about the integrity of the network infrastructure

Theory Exam Info

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM

Study Material

  • EC-Council Offical Course Ware

Duration

  • 24 Hours

Course reviews
  1. 4.00 out of 5

    Milan Sen

    The instructor is well versed in the attack/scanning techniques and mitigation steps.