Traincrest-logo
Traincrest-logo

EC-Council Certified Security Specialist (ECSS) Course Overview

The EC-Council Certified Security Specialist (ECSS) is a foundational security program designed to cover the fundamental concepts of information security, computer forensics, and network security. This entry-level course empowers students to identify potential information security threats that may impact an organization’s security posture and implement essential security controls. By enrolling in this program, participants gain a holistic overview of the critical components within the realms of information security, computer forensics, and network security. The ECSS course lays a solid foundation and imparts vital knowledge required for pursuing a successful career in the field of information security.

Course Introduction

Price:

USD 1500

Duration:

40 Hrs.

Penetration Tester Vulnerability Analyst Security Information Assurance Analyst Technical Security Analyst Information Security Manager Risk and Remediation Manager Systems Administrator Cybersecurity Network Analyst Cyber Security Vulnerability Analyst Security Consultant Insider Threat Analyst Security Architect, Manager Application Security Analyst Cyber Security System Engineer Software Security Analyst Network Analyst Information System Security Officer SOC Security Analyst Cyber Security Incident Response Engineer Technical Operations Network Engineer IT Security Administrator Key issues plaguing the information security, network security, and computer forensics Fundamentals of networks and various components of the OSI and TCP/IP model Various types of information security threats and attacks, and their countermeasures Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools Fundamentals of IDS and IDS evasion techniques Data backup techniques and VPN security Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot Social engineering techniques, identify theft, and social engineering countermeasures Different stages of hacking cycle Various network security protocols Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security Different types of web server and web application attacks, and countermeasures Fundamentals of ethical hacking and pen testing Incident handling and response process Cyber-crime and computer forensics investigation methodology Different types of digital evidence and digital evidence examination process Different type of file systems and their comparison (based on limit and features) Steganography and its techniques Different types of log capturing, time synchronization, and log capturing tools E-mails tracking and e-mail crimes investigation Writing investigation report Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism
Basic Computer Knowledge.

Suggested Courses

Request More Information

Email:   Whatsapp:

Testimonials

What our Students Saysddd