Header Background
 
 
 
Seminar mit gesichertem Termin
seminar logo

Certified Security Specialist (ECSS)

Seminardauer: 5 Tage

Ziele

In dieser 5-tägigen Schulung "Certified Security Specialist (ECSS)" erwerben Sie fundierte Kenntnisse im Bereich Informationssicherheit und Netzwerksicherheit. Sie lernen die Grundlagen der Informationssicherheit, Netzwerke, sichere Netzwerkprotokolle, Sicherheitsherausforderungen, soziale Manipulation (Social Engineering), Hacking-Zyklus, Identifikation, Authentifizierung und Autorisierung, Kryptografie, Firewalls, Intrusion Detection Systeme (IDS), Datensicherung, Virtual Private Networks (VPN), Wireless Network Security, Web Security, Ethical Hacking, Incident Response, Computer-Forensik, Analyse von Logs und vieles mehr. Ziel ist es, Sie darauf vorzubereiten, Sicherheitslücken zu erkennen, Angriffe abzuwehren und Incident-Response-Verfahren zu implementieren. Sie lernen auch, digitale Beweise zu sammeln und forensische Berichte zu verfassen. Nach Abschluss der Schulung sind Sie in der Lage, effektive Sicherheitsmaßnahmen für IT-Infrastrukturen zu implementieren und auf Sicherheitsvorfälle angemessen zu reagieren.

Der EC-Council Certified Security Specialist (ECSS) wird von einem zertifizierten und erfahrenen EC-Council Trainer durchgeführt. Die Prüfungsgebühr ist im Preis enthalten.

Zielgruppe

Diese Schulung richtet sich an Personen, die ihre Kompetenzen vertiefen und ausbauen möchten, um in den Bereichen der Informationssicherheit, Netzwerksicherheit und Computerforensik erfolgreich eine Karriere zu verfolgen.

Voraussetzungen

Für diesen Kurs müssen Sie keine speziellen Erfahrungen mitbringen.

Lernmethodik

Die Schulung bietet Ihnen eine ausgewogene Mischung aus Theorie und Praxis in einer erstklassigen Lernumgebung. Profitieren Sie vom direkten Austausch mit unseren projekterfahrenen Trainern und anderen Teilnehmern, um Ihren Lernerfolg zu maximieren.

Agenda

Network Security Fundamentals

  • Understand Fundamentals of Network Security
  • Discuss Essential Network Security Protocols

Identification, Authentication and Authorization

  • Discuss Access Control Principles, Terminologies, and Models
  • Discuss Identity and Access Management (IAM) Concepts

Network Security Controls -Administrative Controls

  • Discuss Various Regulatory Frameworks, Laws, and Acts
  • Learn to Design and Develop Security Policies
  • Learn to Conduct Different Type of Security and Awareness Training

Network Security Controls - Physical Controls

  • Understand the Importance of Physical Security
  • Discuss Various Physical Security Controls
  • Describe Workplace Security
  • Describe Various Environmental Controls

Network Security Controls -Technical Controls

  • Understand Different Types of Network
  • Understand Different Types of Firewalls and their Role
  • Understand Different Types of IDS/IPS and their Role
  • Understand Different Types of Honeypot
  • Understand Different Types of Proxy Servers and their Benefits
  • Discuss Fundamentals of VPN and its importance in Network Security
  • Discuss Security Incident and Event Management (SIEM)
  • Discuss User Behavior Analytics (UBA)
  • Understand Various Antivirus/Anti-malware Software

Virtualization and Cloud Computing

  • Understand Virtualization Essential Concepts and OS Virtualization Security
  • Understand Cloud Computing Fundamentals
  • Discuss the Insights of Cloud Security and Best Practices

Wireless Network Security

  • Understand Wireless Network Fundamentals
  • Understand Wireless Network Encryption Mechanisms
  • Discuss Different Types of Wireless Network Authentication Methods

Mobile Device Security

  • Understand Various Mobile Device Connection Methods
  • Discuss Mobile Device Management Concepts
  • Discuss Common Mobile Usage Policies in Enterprises
  • Discuss Security Risk and Guidelines Associated with Enterprises Mobile Usage Policies
  • Discuss and Implement Enterprise-level Mobile Security Management Solutions
  • Discuss and Implement General Security Guidelines and Best Practices on Mobile Platforms

IoT Device Security

  • Understand IoT Devices, Application Areas, and Communication Models
  • Discuss the Security in IoT-enabled Environments

Cryptography and PKI

  • Discuss Cryptographic Techniques
  • Discuss Various Cryptographic Algorithms
  • Discuss Various Cryptography Tools
  • Discuss Public Key Infrastructure (PKI)

Data Security

  • Understand Data Security and its Importance
  • Discuss Various Security Controls for Data Encryption
  • Discuss Data Backup and Retention
  • Discuss Data Loss Prevention Concepts

Network Traffic Monitoring

  • Understand the Need and Advantages of Network Traffic Monitoring
  • Determine Baseline Traffic Signatures for Normal and Suspicious Network Traffic
  • Perform Network Monitoring for Suspicious Traffic

Information Security Fundamentals

  • Discuss Information Security Fundamentals
  • Discuss Various Information Security Laws and Regulations

Ethical Hacking Fundamentals

  • Understand Cyber Kill Chain Methodology
  • Discuss Hacking Concepts and Hacker Classes
  • Understand Different Phases of Hacking Cycle
  • Discuss Ethical Hacking Concepts, Scope, and Limitations
  • Ethical Hacking Tools

Information Security Threats and Vulnerability Assessment

  • Define Threat and Threat Sources
  • Define Malware and its Types
  • Define Vulnerabilities
  • Define Vulnerability Assessment

Password Cracking Techniques and Countermeasures

  • Discuss Password Cracking Techniques
  • Discuss Password Cracking Tools
  • Discuss Password Cracking Countermeasures

Social Engineering Techniques and Countermeasures

  • Discuss Social Engineering Concepts and its Phases
  • Discuss Social Engineering Techniques
  • Discuss Insider Threats and Identity Theft
  • Discuss Various Social Engineering Countermeasures

Network Level Attacks and Countermeasures

  • Understand Packet Sniffing Concepts
  • Discuss Sniffing Techniques
  • Discuss Sniffing Countermeasures
  • Discuss Types of DoS and DDoS Attacks
  • Discuss DoS and DDoS Attack Countermeasures
  • Discuss Types Session Hijacking Attacks
  • Discuss Session Hijacking Attack Countermeasures

Web Application Attacks and Countermeasures

  • Discuss Various Web Server Attacks
  • Discuss Web Server Attack Countermeasures
  • Understand Web Application Architecture and Vulnerability Stack
  • Discuss Web Application Threats and Attacks
  • Discuss Web Application Attack Countermeasures
  • Discuss Types of SQL Injection Attacks
  • Discuss SQL Injection Attack Countermeasures

Wireless Attacks and Countermeasures

  • Understand Wireless Terminology
  • Discuss Different Types of Wireless Encryption
  • Describe Wireless Network-specific Attack Techniques
  • Understand Bluetooth Attacks
  • Discuss Wireless Attack Countermeasures

Mobile Attacks and Countermeasures

  • Understand Mobile Attack Anatomy
  • Discuss Mobile Platform Attack Vectors and Vulnerabilities
  • Understand Mobile Device Management (MDM) Concept
  • Discuss Mobile Attack Countermeasures

IoT and OT Attacks and Countermeasures

  • Understand IoT Concepts

  • Discuss IoT Threats and Attacks

  • Discuss IoT Attack Countermeasures

  • Understand OT Concepts

  • Discuss OT Threats and Attacks

  • Discuss OT Attack Countermeasures

Cloud Computing Threats and Countermeasures

  • Understand Cloud Computing Concepts
  • Understand Container Technology
  • Discuss Cloud Computing Threats
  • Discuss Cloud Attack Countermeasures

Penetration Testing Fundamentals

  • Understand Fundamentals of Penetration Testing and its Benefits
  • Discuss Strategies and Phases of Penetration Testing
  • Guidelines and Recommendations for Penetration Testing

Computer Forensics Fundamentals

  • Understand the Fundamentals of Computer Forensics
  • Understand Digital Evidence
  • Understand Forensic Readiness
  • Identify the Roles and Responsibilities of a Forensic Investigator
  • Understand Legal Compliance in Computer Forensics

Computer Forensics Investigation Process

  • Understand the Forensic Investigation Process and its Importance
  • Forensic Investigation Process - Preinvestigation Phase
  • Forensic Investigation Process - Investigation Phase
  • Forensic Investigation Process - Postinvestigation Phase

Understanding Hard Disks and File Systems

  • Describe Different Types of Disk Drives and their Characteristics
  • Explain the Logical Structure of a Disk
  • Understand Booting Process of Windows, Linux, and Mac Operating Systems
  • Understand Various File Systems of Windows, Linux, and Mac Operating Systems
  • Examine the File System

Data Acquisition and Duplication

  • Understand Data Acquisition Fundamentals
  • Discuss Different Types of Data Acquisition
  • Determine the Data Acquisition Format
  • Understand Data Acquisition Methodology

Defeating Anti-forensics Techniques

  • Understand Anti-forensics and its Techniques
  • Discuss Anti-forensics Countermeasures

Windows Forensics

  • Collect Volatile and Non-Volatile Information
  • Perform Windows Memory and Registry Analysis
  • Examine Cache, Cookie, and History Recorded in Web Browsers
  • Examine Windows Files and Metadata

Linux and Mac Forensics

  • Understand Volatile and Non-Volatile Data in Linux
  • Analyze Filesystem Images Using The Sleuth Kit
  • Demonstrate Memory Forensics
  • Understand Mac Forensics

Network Forensics

  • Understand Network Forensics Fundamentals
  • Understand Event Correlation Concepts and Types
  • Identify Indicators of Compromise (IoCs) from Network Logs
  • Investigate Network Traffic

Investigating Web Attacks

  • Understand Web Application Forensics
  • Understand IIS and Apache Web Server Logs
  • Investigating Web Attacks on Windowsbased Servers
  • Detect and Investigate Various Attacks on Web Applications

Dark Web Forensics

  • Understand the Dark Web
  • Understand Dark Web Forensics
  • Perform Tor Browser Forensics

Investigating Email Crimes

  • Understand Email Basics
  • Understand Email Crime Investigation and its Steps

Malware Forensics

  • Understand Malware, its Components and Distribution Methods
  • Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysi
  • Perform Static Malware Analysis
  • Analyze Suspicious Word Documents
  • Perform Dynamic Malware Analysis
  • Perform System Behavior Analysis
  • Perform Network Behavior Analysis

Hinweise

Prüfung und Zertifizierung

  • Test Format: Multiple Choice
  • Anzahl Fragen: 50
  • Dauer: 2 Stunden
  • Passing Score: 70%

Partner

Prüfungsdetails

  • Test Format: Multiple Choice
  • Anzahl Fragen: 50
  • Dauer: 2 Stunden
  • Passing Score: 70%

Open Badge - Ihr digitaler Kompetenznachweis

IT-Schulungen Badge: Certified Security Specialist (ECSS)

Durch die erfolgreiche Teilnahme an einem Kurs bei IT-Schulungen.com erlangen Sie nicht nur Fachkenntnisse und Fähigkeiten, sondern bekommen zusätzlich zu Ihrem Teilnahmezertifikat ein Open Badge als digitalen Nachweis Ihrer Kompetenz.

Sie können diesen in Ihrem persönlichen und kostenfreien Mein IT-Schulungen.com Konto abrufen. Ihre verdienten Badges lassen sich problemlos in sozialen Netzwerken integrieren und weitergeben.

Mehr zu den Vorteilen von Badges

Kundenbewertungen

4,24

54 Teilnehmende
 
87%
 
9%
 
0%
 
4%
 
0%

Gesicherte Termine

TerminStandortAktion
24.02. - 28.02.2025 Nürnberg Seminar jetzt anfragen
24.02. - 28.02.2025 Virtual Classroom (online) Seminar jetzt anfragen

Kurz vor Durchführung

TerminStandortAktion
16.12. - 20.12.2024 Hamburg Seminar jetzt anfragen
13.01. - 17.01.2025 Köln Seminar jetzt anfragen
10.02. - 14.02.2025 München Seminar jetzt anfragen
10.03. - 14.03.2025 Hamburg Seminar jetzt anfragen
 
2 Gesicherte Termine
24.02. - 28.02.2025 in Nürnberg
24.02. - 28.02.2025 in Virtual Classroom (online)

1.) Wählen Sie den Seminartyp:




2.) Wählen Sie Ort und Datum:

4.450,00 € Preis pro Person

spacing line5.295,50 € inkl. 19% MwSt
Seminarunterlagen inkl.
Verpflegung zzgl.

Seminar jetzt anfragen Auf den Merkzettel
PDF IconPDF Icon

IT-Schulungen.com wird mit dem renommierten EC-Council ATC Circle of Excellence Award 2023 ausgezeichnet und erhält 2024 die höchste Ehrung: den EC-Council ATC of the Year Award!

IT-Schulungen.com erhält den renommierten EC-Council ATC Circle of Excellence Award 2023 Europa - CEH

 

Diese Seite weiterempfehlen:

0
Merkzettel öffnen
0
Besuchsverlauf ansehen
IT-Schulungen.com Control Panel
Warnung Icon Sie haben in Ihrem Browser Javascript deaktiviert! Bitte aktivieren Sie Javascript um eine korrekte Darstellung und Funktionsweise von IT-Schulungen zu gewährleisten. Warnung Icon