The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in.
The document outlines various cybersecurity certification programs and courses offered by EC-Council. It describes EC-Council's entities that help create a safer cyber world through awareness and education. It provides details on the certification tracks offered, including foundation, vulnerability assessment and penetration testing, cyber forensics, network defense and operations, software security, and governance. It also lists the associated job roles and certifications for each track. Finally, it discusses the various learning options available, including instructor-led training, online training, mobile learning, and hands-on experience through the EC-Council cyber range.
The document provides an overview and summary of a two-day cyber security summit held in Riyadh, Saudi Arabia. Over 200 attendees from government agencies, critical infrastructure organizations, financial institutions, and enterprises participated in discussions on proactive, reactive, and collective cyber security strategies. Speakers from security vendors and organizations addressed topics like advanced threats, securing emerging technologies, risk management, and capacity building. The event included presentations, panel discussions, and a technology showcase from cyber security solution providers.
This document discusses Computer Emergency Response Teams (CERTs) and the process of CERT certification. It describes what a CERT is and the types of services they provide, including reactive services like incident handling, and proactive services like security audits. The document outlines some of the challenges with certification, noting that certification alone does not guarantee performance and that poor performers can damage the reputation of certificate holders. It emphasizes that accreditation is also necessary to verify factors like a team's competence and procedures. The document provides information on the Trusted Introducer program which facilitates accreditation and information sharing between European CERTs.
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
The document provides an overview of internet security topics including what the internet is, common security issues like hacking and malware, and the importance of organizations like Computer Emergency Response Teams (CERTs). CERTs handle computer security incidents and aim to prevent and respond to issues. The document discusses the role of national and local CERTs in coordinating incident response and sharing security best practices within a country. Africa-CERT was formed to enhance cooperation among African countries on cybersecurity issues and help them establish their own CERT teams.
1. MyCERT was established in 1997 as Malaysia's national computer emergency response team to handle cybersecurity incidents and coordinate responses.
2. It launched the Cyber999 service in 2008 to provide a central reporting point for all cyber incidents.
3. MyCERT operates the Malware Research Centre, set up in 2009, to analyze malware samples and issue advisories to improve the country's cyber defenses.
Cyber Services provides cyber security services including ethical hacking, threat analysis, cyber exercises, security awareness training, and course development. Led by CEO Ferenc Frész, the company was founded in 2015 and employs over 30 security experts and technical staff. Services are delivered to clients including NATO, UAE, EU Council, and private sector organizations.
The document outlines various cybersecurity certification programs and courses offered by EC-Council. It describes EC-Council's entities that help create a safer cyber world through awareness and education. It provides details on the certification tracks offered, including foundation, vulnerability assessment and penetration testing, cyber forensics, network defense and operations, software security, and governance. It also lists the associated job roles and certifications for each track. Finally, it discusses the various learning options available, including instructor-led training, online training, mobile learning, and hands-on experience through the EC-Council cyber range.
The document provides an overview and summary of a two-day cyber security summit held in Riyadh, Saudi Arabia. Over 200 attendees from government agencies, critical infrastructure organizations, financial institutions, and enterprises participated in discussions on proactive, reactive, and collective cyber security strategies. Speakers from security vendors and organizations addressed topics like advanced threats, securing emerging technologies, risk management, and capacity building. The event included presentations, panel discussions, and a technology showcase from cyber security solution providers.
This document discusses Computer Emergency Response Teams (CERTs) and the process of CERT certification. It describes what a CERT is and the types of services they provide, including reactive services like incident handling, and proactive services like security audits. The document outlines some of the challenges with certification, noting that certification alone does not guarantee performance and that poor performers can damage the reputation of certificate holders. It emphasizes that accreditation is also necessary to verify factors like a team's competence and procedures. The document provides information on the Trusted Introducer program which facilitates accreditation and information sharing between European CERTs.
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
The document provides an overview of internet security topics including what the internet is, common security issues like hacking and malware, and the importance of organizations like Computer Emergency Response Teams (CERTs). CERTs handle computer security incidents and aim to prevent and respond to issues. The document discusses the role of national and local CERTs in coordinating incident response and sharing security best practices within a country. Africa-CERT was formed to enhance cooperation among African countries on cybersecurity issues and help them establish their own CERT teams.
1. MyCERT was established in 1997 as Malaysia's national computer emergency response team to handle cybersecurity incidents and coordinate responses.
2. It launched the Cyber999 service in 2008 to provide a central reporting point for all cyber incidents.
3. MyCERT operates the Malware Research Centre, set up in 2009, to analyze malware samples and issue advisories to improve the country's cyber defenses.
Cyber Services provides cyber security services including ethical hacking, threat analysis, cyber exercises, security awareness training, and course development. Led by CEO Ferenc Frész, the company was founded in 2015 and employs over 30 security experts and technical staff. Services are delivered to clients including NATO, UAE, EU Council, and private sector organizations.
Cyber Security Professionals Viewed via Supply Chainaletarw
This research examines the issue of supply and demand for cybersecurity professionals to determine how to optimize the output of cybersecurity professionals through a supply chain. It was found that progress is impeded by the lack of a clearly defined and standardized definition of a cybersecurity worker and their associated knowledge, skills, and abilities. There is a known shortage of cybersecurity professionals that is affecting the ability of the United States to fulfil the mandate of President Obama who declared that the protection of our digital infrastructure is a national security priority. The problem with this declaration is that a literature review confirms there is no standard definition of a cybersecurity worker, associated skills, or educational requirements. The cybersecurity workforce to which we speak in this report consists of those who self-identify as cyber or security specialists as well as those who build and maintain the nation’s critical infrastructure. Considering the criticality of the national infrastructure, it is time for the US to take immediate steps to coordinate the development of the cybersecurity field and its associated workforce supply chain.
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
This webinar gives an idea of what is the relation of ISO 27032 with ISO 55001, and how these two standards cover one another. Get more information on Cybersecurity as the importance is given more to the security industry nowadays.
Main points covered:
• Protection assets in Cyberspace
• Covering ISO 27032 in ISO 55001 and ISO 55001 in ISO 27032
• Sample of Cybersecurity Risks in Assets
• Highlights of the Implementation of the Cyber Security program Framework
Presenter:
This webinar was presented by PECB Partner and Trainer Mr. Claude Essomba, who is a Managing Director at GETSEC SARL, and has more than 9 years of experience in IT and Information Security.
Link of the recorded session published on YouTube: https://youtu.be/_280jG77iKY
Government Technology & Services Coalition & InfraGard NCR's Program: Cyber Security: Securing the Federal Cyber Domain by Strengthening Public-Private Partnership
Presentation: How do we Protect our Systems and Meet Compliance in a Rapidly Changing Environment
Presenter: Sean McCloskey, Program Manager, Cyber Security Evaluations Program, DHS
Description: With all the constant innovation in cyber, what is “cutting edge”? What constraints hinder innovation? How is technology being used to address the Executive Orders, comply to standards, and other meet other mandates? What areas still need resources, ideas and innovation? Join us to hear advances in cyber security technology and ways to protect and monitor systems that will provide for resilient infrastructures and incorporate new solutions.
Talk that Prof. Mustaque Ahamad from GaTech gave at Global Cybersecurity Leaders Program http://www.cisoacademy.com/gclp2-prof-mustaque-ahamad-april-2015/
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
This document is a magazine highlighting outstanding cybersecurity professionals from around the world. It contains short profiles and articles on various topics in cybersecurity.
The opening includes an introduction from the editor highlighting remarkable cybersecurity talents from 19 countries working to build a safer digital future. There are then several articles on topics like the growing skills shortage in cybersecurity and the importance of training "cyber warriors" to work on the front lines of security. Other pieces discuss the ongoing challenges in cybersecurity and hope that more cross-disciplinary approaches can be brought to improve the field. The magazine serves to both recognize top professionals and discuss important issues in cybersecurity.
The document provides an overview of the Department of Homeland Security's Science and Technology Directorate (S&T). Key points include:
- S&T is one of 10 DHS components that provides technical and analytical support to DHS and the homeland security enterprise. It has around 1,200 personnel and accounts for about 1.2% of the DHS budget.
- S&T focuses on six primary areas: first responders, borders and maritime, cyber, chemical/biological defense, explosives, and resilience. It operates five internal laboratories and works with DOE laboratories and federally funded research centers.
- S&T supports the DHS mission through operationally focused research and development,
UN-Singapore Cyber Programme Training course on behalf of the: UN Office for Disarmament Affairs c/o gohg@un.org By: Abdul-Hakeem Ajijola info@consultancyss.com Singapore 15-16 July 2019 #UN #Singapore #Cyber Program #Norms Awareness Workshop for #ASEAN member States #UNODA #UNGGE 2015 #cybersecurity #AskAjijola #GCSC #GFCE @benjaminang @fitbintim @elinanoor #cyberdiplomacy
The document discusses cybersecurity threats and advanced persistent threats (APTs). It provides an overview of the evolution of cyber threats from early computer viruses and malware in the 1970s-1980s to increasingly sophisticated nation-state sponsored APTs. It describes APTs as targeted attacks aimed at data exfiltration that are advanced, persistent, and use complex techniques to maintain access and avoid detection. The document outlines the typical multi-stage exploitation cycle of APTs, from initial reconnaissance and intrusion to establishing backdoors, escalating privileges, and maintaining long-term persistence within the target network to exfiltrate data.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
Cybersecurity isn’t a one-person job—it’s dependent on several different factors within an organization. This webinar will show you how to build a strong cyber defense by focusing on:
• The characteristics of winning cybersecurity teams
• The Crown – Organizational map and career progression
• The Castle – The eight functional specializations
• Architecture and data policy
• Data loss prevention
• Governance, risk and compliance
• Identity and access management
• Incident response and forensic analysis
• Penetration testing
• Secure DevOps
• Secure software development
• Building a winning cybersecurity organization
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
First presented at Cybersecurity for Maritime Summit 2017 in Oct 2017. Subsequently presented at Temasek Polytechnic ISACA Day in Nov 2017. Audience comprises of cybersecurity professionals in the maritime sector and also cybersecurity students who are keen to learn more about cybersecurity considerations in a shipping port environment.
This document outlines Ireland's National Cyber Security Strategy for 2019-2024. It discusses the increasing reliance on digital technologies and the associated cyber security risks. The strategy aims to:
1. Further develop Ireland's National Cyber Security Centre and critical infrastructure protection systems to monitor and respond to cyber threats.
2. Support skills development, research, and the cyber security industry to capitalize on economic opportunities and ensure network resilience.
3. Deepen international engagement on cyber policy to help shape governance of the digital environment.
A range of specific measures are proposed across areas like threat information sharing, baseline security standards, skills and research programs, and diplomatic coordination, to achieve these strategic objectives over the coming years.
Brochure of International College For Security Studies , Learn and Get Trained by Professional Experts and Discover the Cyber Security Industry ,
For More Visit us at https://icssindia.org
https://cyber.icssindia.org
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
1) Future cyber-physical threats to supply chains are becoming more sophisticated and impactful, and all organizations with a cyber footprint can potentially be breached.
2) To future-proof supply chains, organizations must understand emerging threats, adopt frameworks like NIST and ISO for cybersecurity best practices, and focus on governance, risk management, and continual assessment of security controls.
3) Partnerships across industries and information sharing on threats and mitigations will be important to strengthening global cybersecurity defenses against the evolving threat landscape.
This document provides an overview of fileless and living-off-the-land (LotL) attacks. It discusses how LotL attacks use legitimate system tools and functions rather than dropping files. Examples mentioned include using PowerShell scripts, macros, and registry entries to execute code. The document then describes a real-world ransomware attack attributed to the REvil group that impacted Kaseya software. The attack exploited a Kaseya server vulnerability to spread ransomware to Kaseya customers. It used living-off-the-land techniques like certutil.exe to download and execute a malicious payload without dropping files. The challenges with detecting and preventing fileless attacks are also summarized.
Adel Zayed is an Egyptian national with over 14 years of experience in network and security fields. He currently works as a Network and Security Advisor for the Public Pension Agency in Riyadh, where he manages security systems and ensures IT systems are running efficiently. Prior to this, he held roles as a Network and Security Specialist and Project Manager at the Ministry of Islamic Affairs and worked as a CCNA and CCNP Technical Instructor. He has extensive technical skills and experience with various networking and security technologies.
Securing your web apps before they hurt the organizationAntonio Fontes
This document summarizes a presentation on securing web projects. It discusses how vulnerabilities commonly occur during design, implementation, and deployment phases due to issues like incomplete specifications, lack of security requirements analysis, coding mistakes, and insecure default configurations. The presentation covers common web attacks, secure development principles, and steps organizations can take to move from a reactive to proactive security posture.
Think Cyber Think Resilience | William Barker | March 2016Anna Fenston
Cyber resilience is the capacity of an organization to prevent, identify, and mitigate impacts from cyber incidents that could affect its operations and ability to deliver services. Cyber threats are increasingly serious, as attacks can come from foreign intelligence, criminals, journalists, hackers, and even insiders. Given that complete risk mitigation is impossible, the goal is to make systems resilient enough to withstand attacks and recover quickly. Local governments are encouraged to take leadership in partnering for cyber resilience.
This document provides information on the Lucideus Certified Cyber Security Analyst (LCCSA) training course. The 5-day, 40-hour course provides both practical and theoretical training to help students understand hacking techniques and how to defend against cyber attacks. Students who pass the final exam will receive the LCCSA certification. The training aims to give students skills in areas like information gathering, email/network security, web application testing, exploitation techniques, and more.
The Emergency Operations Center (EOC) is the nerve center for a community's response to a disaster. This paper discusses the technology infrastructure that we recommend for EOCs to support rapidly emerging crisis situations and respond to communities in a more effective, agile way.
Some basic overview about cyber crime @ health industry and 10 cyber security technology controls advises from IT Security system integrator's point of view.
This document provides an overview of EC-Council, a cybersecurity training and certification organization. It details EC-Council's various entities that develop content and deliver certifications. It also outlines EC-Council's numerous cybersecurity certification programs and tracks, as well as information on accreditations from organizations like ANSI and the DoD. Finally, it summarizes the different learning options available from EC-Council, including instructor-led training, online courses, and customized training solutions.
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
The International Council of E-Commerce Consultants (EC-Council) is the largest certifying body for information security experts globally. The EC-Council is a membership-based organization that certifies people in various information security and e-business skills.
https://www.infosectrain.com/courses/computer-hacking-forensics-investigator-chfi-training-certification/
Cyber Security Professionals Viewed via Supply Chainaletarw
This research examines the issue of supply and demand for cybersecurity professionals to determine how to optimize the output of cybersecurity professionals through a supply chain. It was found that progress is impeded by the lack of a clearly defined and standardized definition of a cybersecurity worker and their associated knowledge, skills, and abilities. There is a known shortage of cybersecurity professionals that is affecting the ability of the United States to fulfil the mandate of President Obama who declared that the protection of our digital infrastructure is a national security priority. The problem with this declaration is that a literature review confirms there is no standard definition of a cybersecurity worker, associated skills, or educational requirements. The cybersecurity workforce to which we speak in this report consists of those who self-identify as cyber or security specialists as well as those who build and maintain the nation’s critical infrastructure. Considering the criticality of the national infrastructure, it is time for the US to take immediate steps to coordinate the development of the cybersecurity field and its associated workforce supply chain.
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
This webinar gives an idea of what is the relation of ISO 27032 with ISO 55001, and how these two standards cover one another. Get more information on Cybersecurity as the importance is given more to the security industry nowadays.
Main points covered:
• Protection assets in Cyberspace
• Covering ISO 27032 in ISO 55001 and ISO 55001 in ISO 27032
• Sample of Cybersecurity Risks in Assets
• Highlights of the Implementation of the Cyber Security program Framework
Presenter:
This webinar was presented by PECB Partner and Trainer Mr. Claude Essomba, who is a Managing Director at GETSEC SARL, and has more than 9 years of experience in IT and Information Security.
Link of the recorded session published on YouTube: https://youtu.be/_280jG77iKY
Government Technology & Services Coalition & InfraGard NCR's Program: Cyber Security: Securing the Federal Cyber Domain by Strengthening Public-Private Partnership
Presentation: How do we Protect our Systems and Meet Compliance in a Rapidly Changing Environment
Presenter: Sean McCloskey, Program Manager, Cyber Security Evaluations Program, DHS
Description: With all the constant innovation in cyber, what is “cutting edge”? What constraints hinder innovation? How is technology being used to address the Executive Orders, comply to standards, and other meet other mandates? What areas still need resources, ideas and innovation? Join us to hear advances in cyber security technology and ways to protect and monitor systems that will provide for resilient infrastructures and incorporate new solutions.
Talk that Prof. Mustaque Ahamad from GaTech gave at Global Cybersecurity Leaders Program http://www.cisoacademy.com/gclp2-prof-mustaque-ahamad-april-2015/
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
This document is a magazine highlighting outstanding cybersecurity professionals from around the world. It contains short profiles and articles on various topics in cybersecurity.
The opening includes an introduction from the editor highlighting remarkable cybersecurity talents from 19 countries working to build a safer digital future. There are then several articles on topics like the growing skills shortage in cybersecurity and the importance of training "cyber warriors" to work on the front lines of security. Other pieces discuss the ongoing challenges in cybersecurity and hope that more cross-disciplinary approaches can be brought to improve the field. The magazine serves to both recognize top professionals and discuss important issues in cybersecurity.
The document provides an overview of the Department of Homeland Security's Science and Technology Directorate (S&T). Key points include:
- S&T is one of 10 DHS components that provides technical and analytical support to DHS and the homeland security enterprise. It has around 1,200 personnel and accounts for about 1.2% of the DHS budget.
- S&T focuses on six primary areas: first responders, borders and maritime, cyber, chemical/biological defense, explosives, and resilience. It operates five internal laboratories and works with DOE laboratories and federally funded research centers.
- S&T supports the DHS mission through operationally focused research and development,
UN-Singapore Cyber Programme Training course on behalf of the: UN Office for Disarmament Affairs c/o gohg@un.org By: Abdul-Hakeem Ajijola info@consultancyss.com Singapore 15-16 July 2019 #UN #Singapore #Cyber Program #Norms Awareness Workshop for #ASEAN member States #UNODA #UNGGE 2015 #cybersecurity #AskAjijola #GCSC #GFCE @benjaminang @fitbintim @elinanoor #cyberdiplomacy
The document discusses cybersecurity threats and advanced persistent threats (APTs). It provides an overview of the evolution of cyber threats from early computer viruses and malware in the 1970s-1980s to increasingly sophisticated nation-state sponsored APTs. It describes APTs as targeted attacks aimed at data exfiltration that are advanced, persistent, and use complex techniques to maintain access and avoid detection. The document outlines the typical multi-stage exploitation cycle of APTs, from initial reconnaissance and intrusion to establishing backdoors, escalating privileges, and maintaining long-term persistence within the target network to exfiltrate data.
For every organization, effective cybersecurity is reliant on a careful deployment of technology, processes and people. The Global Knowledge cybersecurity perspective features a three-tiered organizational matrix, ranging from foundational to expert skills, coupled with eight functional specializations that encompass the features of a successful cybersecurity organization.
Cybersecurity isn’t a one-person job—it’s dependent on several different factors within an organization. This webinar will show you how to build a strong cyber defense by focusing on:
• The characteristics of winning cybersecurity teams
• The Crown – Organizational map and career progression
• The Castle – The eight functional specializations
• Architecture and data policy
• Data loss prevention
• Governance, risk and compliance
• Identity and access management
• Incident response and forensic analysis
• Penetration testing
• Secure DevOps
• Secure software development
• Building a winning cybersecurity organization
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
First presented at Cybersecurity for Maritime Summit 2017 in Oct 2017. Subsequently presented at Temasek Polytechnic ISACA Day in Nov 2017. Audience comprises of cybersecurity professionals in the maritime sector and also cybersecurity students who are keen to learn more about cybersecurity considerations in a shipping port environment.
This document outlines Ireland's National Cyber Security Strategy for 2019-2024. It discusses the increasing reliance on digital technologies and the associated cyber security risks. The strategy aims to:
1. Further develop Ireland's National Cyber Security Centre and critical infrastructure protection systems to monitor and respond to cyber threats.
2. Support skills development, research, and the cyber security industry to capitalize on economic opportunities and ensure network resilience.
3. Deepen international engagement on cyber policy to help shape governance of the digital environment.
A range of specific measures are proposed across areas like threat information sharing, baseline security standards, skills and research programs, and diplomatic coordination, to achieve these strategic objectives over the coming years.
Brochure of International College For Security Studies , Learn and Get Trained by Professional Experts and Discover the Cyber Security Industry ,
For More Visit us at https://icssindia.org
https://cyber.icssindia.org
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
1) Future cyber-physical threats to supply chains are becoming more sophisticated and impactful, and all organizations with a cyber footprint can potentially be breached.
2) To future-proof supply chains, organizations must understand emerging threats, adopt frameworks like NIST and ISO for cybersecurity best practices, and focus on governance, risk management, and continual assessment of security controls.
3) Partnerships across industries and information sharing on threats and mitigations will be important to strengthening global cybersecurity defenses against the evolving threat landscape.
This document provides an overview of fileless and living-off-the-land (LotL) attacks. It discusses how LotL attacks use legitimate system tools and functions rather than dropping files. Examples mentioned include using PowerShell scripts, macros, and registry entries to execute code. The document then describes a real-world ransomware attack attributed to the REvil group that impacted Kaseya software. The attack exploited a Kaseya server vulnerability to spread ransomware to Kaseya customers. It used living-off-the-land techniques like certutil.exe to download and execute a malicious payload without dropping files. The challenges with detecting and preventing fileless attacks are also summarized.
Adel Zayed is an Egyptian national with over 14 years of experience in network and security fields. He currently works as a Network and Security Advisor for the Public Pension Agency in Riyadh, where he manages security systems and ensures IT systems are running efficiently. Prior to this, he held roles as a Network and Security Specialist and Project Manager at the Ministry of Islamic Affairs and worked as a CCNA and CCNP Technical Instructor. He has extensive technical skills and experience with various networking and security technologies.
Securing your web apps before they hurt the organizationAntonio Fontes
This document summarizes a presentation on securing web projects. It discusses how vulnerabilities commonly occur during design, implementation, and deployment phases due to issues like incomplete specifications, lack of security requirements analysis, coding mistakes, and insecure default configurations. The presentation covers common web attacks, secure development principles, and steps organizations can take to move from a reactive to proactive security posture.
Think Cyber Think Resilience | William Barker | March 2016Anna Fenston
Cyber resilience is the capacity of an organization to prevent, identify, and mitigate impacts from cyber incidents that could affect its operations and ability to deliver services. Cyber threats are increasingly serious, as attacks can come from foreign intelligence, criminals, journalists, hackers, and even insiders. Given that complete risk mitigation is impossible, the goal is to make systems resilient enough to withstand attacks and recover quickly. Local governments are encouraged to take leadership in partnering for cyber resilience.
This document provides information on the Lucideus Certified Cyber Security Analyst (LCCSA) training course. The 5-day, 40-hour course provides both practical and theoretical training to help students understand hacking techniques and how to defend against cyber attacks. Students who pass the final exam will receive the LCCSA certification. The training aims to give students skills in areas like information gathering, email/network security, web application testing, exploitation techniques, and more.
The Emergency Operations Center (EOC) is the nerve center for a community's response to a disaster. This paper discusses the technology infrastructure that we recommend for EOCs to support rapidly emerging crisis situations and respond to communities in a more effective, agile way.
Some basic overview about cyber crime @ health industry and 10 cyber security technology controls advises from IT Security system integrator's point of view.
This document provides an overview of EC-Council, a cybersecurity training and certification organization. It details EC-Council's various entities that develop content and deliver certifications. It also outlines EC-Council's numerous cybersecurity certification programs and tracks, as well as information on accreditations from organizations like ANSI and the DoD. Finally, it summarizes the different learning options available from EC-Council, including instructor-led training, online courses, and customized training solutions.
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
The International Council of E-Commerce Consultants (EC-Council) is the largest certifying body for information security experts globally. The EC-Council is a membership-based organization that certifies people in various information security and e-business skills.
https://www.infosectrain.com/courses/computer-hacking-forensics-investigator-chfi-training-certification/
The Ultimate EC Council Certification HandbookCalvin Sam
Cybersecurity is emerging as a booming industry nowadays owing to the staggering increase in cybercrimes. Organizations have realized the importance of an appropriate cybersecurity plan as a precautionary measure to curb their monetary and reputational risks. Regardless of its size, every organization should have a cybersecurity governance and risk management team in place. EC-Council holds its position as a world leader for its cybersecurity training and certifications in the cybersecurity domain. It is the creator of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, to name a few. This approach has made them the undisputed world leader in Information Security, Network
Security, Computer Security, and Internet Security training and courses.
EC-Council Cyber Security Training and CertificationsITpreneurs
The document summarizes a partnership between EC-Council and ITpreneurs to provide cybersecurity training and certification in the Middle East and Turkey. ITpreneurs will enable training providers in the region to offer EC-Council's programs to help organizations and individuals protect against cyber threats. EC-Council offers a wide range of certifications from entry-level to expert levels that are recognized globally and cover topics like ethical hacking, computer forensics, and security analysis. The partnership will allow training providers to take advantage of EC-Council's established curriculum and programs in a cost-effective manner.
We Are Instructor Led Online Training Hub.Get access to the world’s best learning experience at our online learning community where millions of learners learn cutting-edge skills to advance their careers, improve their lives, and pursue the work they love. We provide a diverse range of courses, tutorials, resume formats, projects based on real business challenges, and job support to help individuals get started with their professional career.
Security5Security5 is an entry level certifi cation fo.docxbagotjesusa
The document discusses several cybersecurity certifications offered through EC-Council Press including Security|5, Wireless|5, Network|5, C|EH (Certified Ethical Hacker), E|NSA (EC-Council Network Security Administrator), E|CSA (EC-Council Certified Security Analyst), C|HFI (Computer Hacking Forensic Investigator), and E|DRP (EC-Council Disaster Recovery Professional). It provides an overview of each certification and what they cover to prepare security professionals. The EC-Council aims to address the need for well-educated information security practitioners through their certifications and publications.
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
What is CyberSecurity? Who are the threats? Why is cyber attack happening? How bad is it? How do attackers do it? What can we learn from Star Wars?
This presentations Cyber Attacks, State of CyberSecurity, some guidance for the students interested in getting into the field, and some great resources.
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
Kyle Lai is the President and CTO of KLC Consulting. He has over 20 years of experience in IT and 15 years specializing in security. His career highlights include roles as CISO and DISA Operations Manager for Security Portal. He holds several security certifications and has consulted for many large companies. Lai is also the author of two security tools and administers several LinkedIn security groups.
The document summarizes an agenda for a presentation on hacking Windows Server 2008 Remote Desktop and an EC-Council security certification course. It includes demos of hacking Remote Desktop user credentials using a man-in-the-middle attack and installing a Trojan from a malcrafted Excel spreadsheet. The document also provides an overview of the Certified Ethical Hacker v7 course, which prepares students to hack into their own computers and defend against various attacks, and introduces other EC-Council security certification courses.
EC-Council Certification Roadmap and Course CatalogNetCom Learning
NetCom Learning is an Accredited Training Center of EC-Council meeting strict excellence standards for delivering instructor-led training. Our EC-Council enterprise skilling plan makes your employees competent in understanding information security's critical aspects, including ethical hacking, network defense, security analysis, and more.
This document introduces version 6.0 of the Center for Internet Security's Critical Security Controls (CIS CSCs) for effective cyber defense. It provides an overview of the 20 CIS CSCs, which are a prioritized set of actions that collectively form a defense-in-depth approach to security. The controls focus on systematically improving an organization's cyber defenses to mitigate known attack techniques. The document also includes appendices that discuss evolving attack models, aligning the controls with other frameworks like NIST, and considerations for privacy impact assessments.
The Ultimate Certification for Network Administrators
A vendor-neutral, hands-on, instructor-led, comprehensive network security certification training program.
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth Network security preparedness.
Hacker Academy UK provides cyber security training and services to help organizations defend against increasingly sophisticated cyber attacks. The document discusses how Chinese hackers stole terabytes of data from the US's most secure systems and how attackers often maintain access for months before detection. Hacker Academy UK offers various cyber security training courses and consultancy services to help organizations identify risks, test security systems, increase awareness, and properly manage information security. These include penetration testing, security audits, ISO implementation, and incident response training.
Hack the Hackers 2012: Client Side Hacking – Targeting the UserNew Horizons Bulgaria
This document summarizes a presentation given by Sean Hanna on client side hacking. The presentation discussed how hacking has evolved from hobbyists to security research companies to organized criminal gangs producing crimeware. It noted how governments are now developing cyber warfare capabilities in a growing arms race. The presentation demonstrated hacking tools and warned that client systems are increasingly being targeted, and that future threats will be even more advanced as hacking continues to evolve.
CyCOPS is an information security company based in Hyderabad, India founded in 2008. It has a team of 25 security professionals with certifications like CISSP and CEH. CyCOPS provides services like vulnerability assessments, penetration testing, security audits, digital forensics, and wireless security. It has experience working with clients in India and abroad from sectors like banking, government, and technology. CyCOPS also partners with IBM and Sipera Systems to offer additional managed security services and unified communications security solutions.
The document discusses a presentation about Certified Ethical Hacking. It begins by asking if computer hacking can be ethical and if one can be certified in it. It then explains that ethical hacking involves using hacking skills to test an organization's security defenses for vulnerabilities, with the organization's authorization. The rest of the document outlines the Certified Ethical Hacking certification program, including what is covered in the training course and exam. It provides examples of hacking tools and techniques taught as well as sample exam questions. The presentation emphasizes that ethical hacking is just one part of managing security risks and that there is no single solution to security issues.
Improve Cybersecurity posture by using ISO/IEC 27032PECB
Cybersecurity is a universal concern across today’s enterprise and the need for strategic approach is required for appropriate mitigation.
Adopting ISO 27032 will help to:
• Understanding the nature of Cyberspace and Cybersecurity
• Explore Cybersecurity Ecosystem – Roles & Responsibilities
• Achieve Cyber Resilience through implementing defensive and detective cybersecurity controls
Presenter:
Obadare Peter Adewale is a first generation and visionary cyberpreneur. He is a PECB certified Trainer, Fellow Chartered Information Technology Professional, the First Licensed Penetration Tester in Nigeria, second COBIT 5 Assessor in Africa and PCI DSS QSA. He is also an alumnus of Harvard Business School and MIT Sloan School of Management Executive Education.
Link of the recorded session published on YouTube: https://youtu.be/NX5RMGOcyBM
Product security by Blockchain, AI and Security CertsLabSharegroup
Three themes You need to think about Product Security — and some tips for How to Do It
I have been working with software security laboratories and IT security firms for years. I have talked with clients, read and watched dozens of articles/videos and talked with several experts about product security themes, future, technologies.
The three themes are:
Is the blockchain the new technology of trust?
Blockchain has the potential to transform industries. However, some security experts raised questions: If blockchain is broadly used in technology solutions will security standards be adopted? How to protect the cryptographic keys that allow access to the blockchain applications? Although it is true that the potential is huge such as securing IoT nodes, edge devices with authentication, improved confidentiality and data integrity, disrupting current PKI systems, reducing DDoS attacks etc.
AI (Machine Learning, Deep Learning, Reinforcement Learning algorithm) potential in Product Security
Machine learning can help in creating products that analyse threats and respond to attacks and security incidents. There are several repositories on GitHub or open-source codes by IBM available for developers. Deep learning networks are rapidly growing due to cheap cloud GPU services and after Reinforcement learning algorithm’s last success nobody knows the upper limit.
Product Security by International security standards and practices
The present, future, and developmental orientations of independent third party certificates Industry. How can the international standards answer the rapid growth of new technologies and maintain secure applications in IoT, Blockchain or AI-driven industries?
Are IT products reliable, secure and will they stay that way?
I would like to explain Product Security in a simple way. My goal is the introduction of product security for Tech startups, fast-growing Tech firms. Furthermore, I would like to emphasize the benefits of product security certification.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
2. Course Description
Key Outcomes
Course Outline
Exam Information
02
Table of Contents
Who We Are 03
Security Wall 04
EC-Council at a Glance 05
Your Learning Options 06
Tracks
Foundation Track 07
Vulnerability Assessment and Penetration Testing 08
Cyber Forensics 09
Network Defense and Operations 10
Software Security 11
Governance 12
Certifications
Certified Secure Computer User (CSCU) 13
Certified Network Defender (CND) 14
Certified Ethical Hacker (CEH) 15
EC-Council Certified Security Analyst (ECSA) 16
EC-Council Certified Incident Handler (ECIH) 17
Computer Hacking and Forensic Investigator (CHFI) 18
EC-Council Certified Secure Programmer (ECSP) Java 19
EC-Council Certified Secure Programmer (ECSP) .Net 20
EC-Council Licensed Penetration Tester (LPT) Master 21
CAST 611 – Advanced Penetration Testing 22
CAST 612 – Advanced Mobile Forensics and Security 23
CAST 613 – Hacking and Hardening Corporate Web Apps 24
CAST 614 – Advanced Network Defense 25
CAST 616 – Securing Windows Infrastructure 26
EC-Council Disaster Recovery Professional (EDRP) 27
Certified Chief Information Security Officer (C|CISO) 28
Academic Programs
Bachelor of Science in Cyber Security (BSCS) 29
Graduate Certificate Programs 30
Master of Science in Cyber Security (MSS) 31
3. Course Description
Key Outcomes
Course Outline
Exam Information
0303
Who We Are
The EC-Council group is made up of several entities
that all help serve the same goal which is to create
a better, safer cyber world through awareness and
education. Our entities include International
Council of eCommerce Consultants (EC-Council),
iClass, EC-Council University, EC-Council Global
Services (EGS), and EC-Council Conferences and
Events.
EC-Council creates content (course materials and
exams) and certification delivered through our
channel of authorized training centers which
consists of over 700 partners representing over
2,000 physical locations in more than 145 countries
across the globe. We are the owner and developer
of the world-famous E-Council Certified Ethical
Hacker (CEH), EC-Council Computer Hacking
Forensics Investigator (CHFI), EC-Council Certified
Security Analyst (ECSA), and EC-Council License
Penetration Tester (LPT) programs.
Our certification programs are recognized
worldwide and have received endorsements from
various government agencies, including the United
States Federal Government (via the Montgomery GI
Bill), the National Security Agency (NSA), and the
Committee on National Security Systems (CNSS).
All these reputed organizations have certified
EC-Council’s Certified Ethical Hacking (CEH),
EC-Council Network Security Administrator (ENSA),
EC-Council Computer Hacking Forensics
Investigator (CHFI), EC-Council Disaster Recovery
Professional (EDRP), EC-Council Certified Security
Analyst (ECSA) and EC-Council Licensed
Penetration Tester (LPT) programs for meeting the
4011, 4012, 4013A, 4014, 4015 and 4016 training
standards for information security professionals.
EC-Council recently received accreditation from the
American National Standards Institute (ANSI). We
have so far certified over 2,00,000 professionals in
various e-business and cyber security skills.
iClass is EC-Council’s direct certification training
program. iClass delivers EC-Council certification
courses through various training methodologies:
instructor-led at client facilities, synchronous
delivery through live, online instructor-led, and
asynchronously through our streaming video
platform. iClass course videos can also be loaded
onto a mobile device, such as an iPad, and shipped
to a client location.
EC-Council University is a DEAC accredited
university offering programs such as Bachelor of
Science in Cyber Security, Master of Science in
Cyber Security, and Graduate Certificate Program.
EC-Council Global Services (EGS) is dedicated to
helping organizations understand and manage
their cyber-security risk posture effectively. EGS
specializes in helping clients make informed
business decisions to protect their organizations.
EGS has over 20 dedicated cyber security practice
areas informed by the best cyber security
practitioners, each of whom have dedicated their
lives to defending organizations from
cyber-attacks.
EC-Council’s Conference and Events Group is
responsible for planning, organizing, and running
conferences throughout the globe. TakeDownCon
and Hacker Halted are IT security conferences that
bring world renowned speakers together for
keynotes, panels, debates, and breakout sessions.
Conferences have been run in Dallas, Las Vegas, St.
Louis, Huntsville, Maryland, Connecticut, Myrtle
Beach, Miami, Atlanta, Iceland, Hong Kong, Egypt,
Singapore, and Kuala Lumpur.
Other events include CISO Summits, Global CISO
Forums, and Executive Cocktail Receptions where
EC-Council brings speakers and content to
executive level IT Security Professionals.
The Global Cyberlympics competition is a“capture
the flag”type competition with approximately
1,000 global participants. EC-Council brings the
hackers together online for preliminary elimination
rounds and then brings the top two teams (6-8
players per team) from each region to compete in
the final head-to-head competition.
“Our lives are dedicated to the
mitigation and remediation
of the cyber plague that is
menacing the world today”
Jay Bavisi
President & CEO
EC-Council
03
4. Course Description
Key Outcomes
Course Outline
Exam Information
04
“EC-Council - Trusted worldwide for its end-to-end enterprise cyber
security solutions for human capital development”
EC-Council
EC-Council Uni-Aid - Don’t stop learning
EC-Council Uni Aid is an EC-Council
scholarship that provides information
technology students at public universities
globally, access to EC-Council’s
industry-recognized information security
education and certification and related
technical disciplines.
Universities and student recipients will be
part of a global community of scholarship
recipients from the United States, Europe,
Middle East, Africa and Asia-Pacific, all of
whom share similar passion for
information security and academic
excellence.
EC-Council has pledged $1,000,000
worth of information security
scholarships for the 2011-2012 academic
year to universities globally.
EC-Council Featured in CNN | The Wolf Blitzer ShowEC-Council Featured in CNN | The Wolf Blitzer Show
Aug 4, 2011 | Albuquerque, NM - Jay
Bavisi, president of EC-Council, was
earlier interviewed by CNN, to comment
on the massive cyber spying incident
which targeted agencies and groups in
14 countries, including U.S government
agencies, the United Nations, defence
contractors and Olympic bodies.
As reported by CNN McAfee said the
attacks, which it calls Operation Shady
RAT, have allowed hackers potentially
to gain access to military and industrial
secrets from 72 targets, most of them in
the United States, over a five-year
period.
EC-Council
04
5. Course Description
Key Outcomes
Course Outline
Exam Information
05
EC-Council at a Glance
EC-Council Group is a multidisciplinary institution of global Information Security professional services.
EC-Council Group is a dedicated Information Security organization that aims at creating knowledge, facilitating innovation, executing research, implementing
development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Some of the finest organizations around the world such as the US Army, US Navy, DoD, the FBI, Microsoft, IBM, and the United Nations have trusted EC-Council to develop
and advance their security infrastructure.
ICECC
International Council of E-Commerce
Consultants
EC-Council Group
ECC
EC-Council Training & Certification
Division of Professional Workforce
Development
EGS
EC-Council Global Services
Division of Corporate Consulting &
Advisory Services
ECCU
EC-Council University
Division of Academic Education
EGE
EC-Council Global Events
Division of Conferences, Forums, Summits,
Workshops & Industry Awards
ECF
EC-Council Foundation
Non-Profit Organization for Cyber Security
Awareness Increase.
CERTIFIED MEMBERS
200,000+
YEARS
EXPERIENCE
15+ TRAINING &
CERTIFICATION
PROGRAMS
40+ COUNTRIES
145+ SUBJECT MATTER
EXPERTS
350+ TRAINING PARTNERS
WORLDWIDE
700+ TOOLS &
TECHNOLOGIES
3000+
05
6. Online Learning
iLearn online training is a distance learning program designed for those who cannot attend a live course. The program is for the people who have a very busy schedule and want to learn at their own
pace through self-study. This modality is also available from our enterprise teams.
Mobile Learning
Our world class content is also available on a mobile device, allowing our students to learn on the go. This program is designed for those who are cannot attend a live course, but are keen to improve
their cyber security skills. This modality is also available from our enterprise teams.
Computer-based Training
For people who work in secure facilities with limited or no access to the internet, we o er computer-based training (CBT) options delivered in an HD DVD format. The DVDs are an upgrade/add-on to the
base iLearn program and are not sold independently. This modality is also available from our enterprise teams.
Hands on Experience with the EC-Council Cyber Range (iLabs)
EC-Council iLabs allows students to dynamically access a host of virtual machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere. Our simplistic web portal enables the
student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost-effective, easy to use, live range lab solution available. Most of our courses are
equipped with iLabs, but iLabs can be purchased independently as well.
Customized Learning
Love a course we offer, but want it customized? No problem! EC-Council has a dedicated team to cater to your needs. We have access to the largest pool of EC-Council certified instructors and enterprise
teams. Let us know where and when you want the training delivered, and we will arrange for an instructor and all that’s required for a course to be taught at a location of your choice. Contact our
network of enterprise teams for a custom solution. EC-Council client-site training includes official courseware, certification exam (Prometric or VUE), iLabs, online labs (wherever available), and our
test-pass guarantee.
Live Online Training
If self-study or self-paced learning does not fit into your personal learning style, we offer you our live online model, iWeek. With iWeek, an instructor will teach you live online while you are seated in the
comfort of your home. This training method gives you the freedom to get trained from a location of your choice. Individuals who choose this delivery method consistently attribute their choice to the
preference of having a live instructor available for which questions can be asked and answered. We offer early-bird rates, group rates, and get even private courses delivered anytime.
06
Instructor-led Training
EC-Council has a large network of enterprise teams spread across 145 countries. Each center has a certified trainer to deliver the entire EC-Council program from a training facility in your
city.
Your Learning Options
7. Course Description
Key Outcomes
Course Outline
Exam Information
07
Foundation Track
Target
Audience
Our Certified Foundation Professionals
are Employed at:
FNS
Network Security
Fundamentals
FIS Information Security
Fundamentals
CFF Computer Forensics
Fundamentals
CSCU Certified Secure
Computer User112-12
ECSS
EC-Council Certified
Security Specialist
Cloud Security
Password
Security
Social Engineering
Countermeasures
Mitigating
Identity Theft
Email Security Safe Browsing
Data Protection Physical Security
Mobile Device
Security
Data Backup
Social Network
Security
Antiviruses
Protection
Disaster
Recovery
Internet Security
Credit Card
Security
Monitoring Kids
Online
Wireless & Home
Network Security
OS Security
Mac
What will You Learn
This course is specifically designed
for todays’computer users who
use the internet extensively to
work, study and play.
. . .
10. Course Description
Key Outcomes
Course Outline
Exam Information
10
* A d d i t i o n a l U n i v e r s i t y c o u r s e s / p r e - r e q u i s i t e s m a y b e r e q u i r e d .
...
12. Course Description
Key Outcomes
Course Outline
Exam Information
12
Job
Roles
- Information Security (IS) Director
- Information Assurance (IA) Program
Manager
1. Securely Provision (SP)
a. Risk Management (RM)
b. Technology R&D (RD)
c. Systems Requirements
Planning (RP)
2. Oversee and Govern (OV)
a. Legal Advice and Advocacy (LG)
b. Training, Education, and
Awareness (ED)
c. Cybersecurity
Management (MG)
d. Strategic Planning and
Policy (PL)
e. Executive Cybersecurity
Leadership (EX)
f. Acquisition and Program/Project
Management (PM)
3. Collect and Operate (CO)
a. Cyber Operational Planning (PL)
This Track Maps to NICE’s Specialty Areas:
CCISO Professionals
are Employed at:
Governance
Information
Security Core
Competencies
Security Program
Management & Operations
Information
Security
Core Concepts
Strategic Planning,
Finance, & Vendor
Management
C CISO
TM
Certified Chief Information Security Officer
712
1
3
24
5
...
Graduate Certificate in:
- Information Security
Professional
- Information Analyst
- Information Technology
Analyst
- Disaster Recovery
- Digital Forensics
DomainDomain
Domain
Domain
Domain
13. Course Description
Key Outcomes
Course Outline
Exam Information
13
CCertified Secure Computer User
CUS Certified Secure Computer User (CSCU)
CSCU provides individuals with the necessary knowledge and skills to protect their information assets.
This course covers fundamentals of various computer and network security threats such as identity theft,
credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking
attacks, and social engineering.
• Fundamentals of various computer and
network security threats
• Understanding of identity theft, phishing
scams, malware, social engineering, and
financial frauds
• Learn to safeguard mobile, media and
protect data
• Protecting computers, accounts, and social
networking profiles as a user
• Understand security incidents and reporting
• Exam name: CSCU (112-12) exam
• Number of questions: 50
• Passing score: 70%
• Test duration: 2 Hours
• Test format: Multiple choice
• Test delivery: EC-Council exam portal
• Introduction to security
• Securing operating systems
• Malware and antivirus
• Internet security
• Security on social networking sites
• Securing email communications
• Securing mobile devices
• Securing the cloud
• Securing network connections
• Data backup and disaster recovery
14. Course Description
Key Outcomes
Course Outline
Exam Information
14
Certified
DNetwork Defender
NC Certified Network Defender (CND)
CND is the world’s most advanced network defense course that covers 14 of the most current network
security domains any individuals will ever want to know when they are planning to protect, detect, and
respond to the network attacks.
The course contains hands-on labs, based on major network security tools and to provide network
administrators real world expertise on current network security technologies and operations.
• Knowledge on how to protect, detect, and
respond to network attacks
• Network defense fundamentals
• Application of network security controls,
protocols, perimeter appliances, secure IDS,
VPN, and firewall configuration
• Intricacies of network traffic signature,
analysis, and vulnerability scanning
• Exam title: CND
• Exam code: 312-38
• Number of questions: 100
• Duration: 4 hours
• Availability: ECC exam
• Test format: Interactive multiple choice
questions
• Computer network and defense
fundamentals
• Network security threats, vulnerabilities,
and attacks
• Network security controls, protocols, and
devices
• Network security policy design and
implementation
• Physical security
• Host security
• Secure firewall configuration and
management
• Secure IDS configuration and management
• Secure VPN configuration and management
• Wireless network defense
• Network traffic monitoring and analysis
• Network risk and vulnerability management
• Data backup and recovery
• Network incident response and
management
15. Course Description
Key Outcomes
Course Outline
Exam Information
15
C EH
TM
Certified Ethical Hacker
Certified Ethical Hacker (CEH)
CEH is the world’s most advanced certified ethical hacking course that covers 18 of the most current
security domains any individual will ever want to know when they are planning to beef-up the information
security posture of their organization.
The accredited course provides the advanced hacking tools and techniques used by hackers and
information security professionals.
• Thorough introduction to ethical hacking
• Exposure to threat vectors and counter
measures
• Addresses emerging areas of cloud and
mobile hacking
• Prepares you to combat Trojans, malware,
backdoors and more
• Enables you to hack using mobile
• Number of questions: 125
• Test duration: 4 Hours
• Test format: Multiple choice
• Test delivery: ECC exam, VUE
• Exam prefix: 312-50 (ECC exam),
312-50 (VUE)
• Introduction to ethical hacking
• Foot printing and reconnaissance
• Scanning networks
• Enumeration
• Sniffing
• System hacking
• Malware threats
• Social engineering
• Denial of service
• Session hijacking
• Hacking web applications
• SQL injection
• Hacking wireless networks
• Hacking web servers
• Hacking mobile platforms
• Evading IDS, Firewalls, and Honeypot
• Cloud computing
• Cryptography
16. Course Description
Key Outcomes
Course Outline
Exam Information
16
CertifiedEC-Council
ASecurity Analyst
TM
CE S EC-Council Certified Security Analyst (ECSA)
ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern
infrastructures, operating systems, and application environments while teaching the students how to
document and write a penetration testing report.
This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s
published penetration testing methodology.
• Introduce to security analysis and
penetration testing methodologies
• In-depth vulnerability analysis, network
penetration testing from external and
internal evading firewalls and ids
• Learn to own web applications and
databases, and take over cloud services
• Analyze security of mobile devices and
wireless networks
• Present findings in a structured actionable
report
• Credit towards certification: ECSA v9
• Number of questions: 150
• Passing score: 70%
• Test duration: 4 hours
• Security analysis and penetration testing
methodologies
• TCP IP packet analysis
• Pre-penetration testing steps
• Information gathering methodology
• Vulnerability analysis
• External network penetration testing
methodology
• Internal network penetration testing
methodology
• Firewall penetration testing methodology
• IDS penetration testing methodology
• Web application penetration testing
methodology
• SQL penetration testing methodology
• Database penetration testing methodology
• Wireless network penetration testing
methodology
• Mobile devices penetration testing
methodology
• Cloud penetration testing methodology
• Report writing and post-test actions
17. Course Description
Key Outcomes
Course Outline
Exam Information
17
E C I HEC-Council Certified Incident Handler
TM
EC-Council Certified Incident Handler (ECIH)
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer
security incidents in an information system. The course addresses various underlying principles and
techniques for detecting and responding to current and emerging computer security threats.
The comprehensive training program will make students proficient in handling as well as responding to
various security incidents such as network security incidents, malicious code incidents, and insider attack
threats.
• Principals, processes and techniques for
detecting and responding to security threats/
breaches
• Liaison with legal and regulatory bodies
• Learn to handle incidents and conduct
assessments
• Cover various incidents like malicious code,
network attacks, and insider attacks
• Credit towards certification: ECIH 212-89
exam
• Test format: Multiple choice
• Test delivery: ECC exam, VUE
• Introduction to incident response and
handling
• Risk assessment
• Incident response and handling steps
• CSIRT
• Handling network security incidents
• Handling malicious code incidents
• Handling insider threats
• Forensic analysis and incident response
• Incident reporting
• Incident recovery
• Security policies and laws
18. Course Description
Key Outcomes
Course Outline
Exam Information
18
C HFIComputer Hacking Forensic
INVESTIGATOR
TM
Computer Hacking and Forensic Investigator (CHFI)
CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to
acquire hands-on experience.
The program provides a strong baseline knowledge of key concepts and practices in the digital forensic
domains relevant to today’s organizations. Moreover, CHFI provides firm grasp on the domains of digital
forensics.
• Comprehensive forensics investigation
process
• Forensics of file systems, operating systems,
network and database, websites, and email
systems
• Techniques for investigating on cloud,
malware, and mobile
• Data acquisition and analysis as well as
anti-forensic techniques
• Thorough understanding of chain of custody,
forensic report, and presentation
• Number of Questions: 150
• Passing Score: 70%
• Test Duration: 4 hours
• Test Format: Multiple choice
• Test Delivery: ECC exam portal
• Computer forensics in today’s world
• Computer forensics investigation process
• Understanding hard disks and file systems
• Defeating anti-forensics techniques
• Operating system forensics
• Network forensics
• Investigating web attacks
• Database forensics
• Cloud forensics
• Malware forensics
• Investigating email crimes
• Mobile forensics
• Forensics report writing and presentation
• Data Acquisition and Duplication
19. Course Description
Key Outcomes
Course Outline
Exam Information
19
Certified
TM
C S P JAVAE Secure ProgrammerEC-Council
EC-Council Certified Secure Programmer (ECSP) Java
The ECSP Java program is a comprehensive course that provides hands-on training covering Java security
features, policies, strengths, and weaknesses. It helps developers understand how to write secure and
robust Java applications, and provides advanced knowledge in various aspects of secure Java development
that can effectively prevent hostile and buggy code.
• Introduces Java security architecture and
common security threats
• Secure software development lifecycle
(SDLC)
• Common threats and mitigation approaches
• Detailed coverage of input validation, output
encoding, authentication and authorization,
and other secure coding practices
• Thorough understanding of Sandbox, JVM,
Bytecode Verifier, Security Manager, and JSF
(Java Security Framework)
• Number of questions: 50
• Passing score: 70%
• Test duration: 2 Hours
• Test format: Multiple choice
• Test delivery: EC-Council exam center
• Exam prefix: 312-94
• Java security principles and secure coding
practices Java Security Platform, Sandbox,
JVM, Class loading, Bytecode verifier, Security
Manager, security policies, and Java Security
Framework
• Secure SDLC, threat modelling, software
security frameworks, and secure software
architectures
• Best practices and standards and guidelines for
secure file input/output and serialization
• Java input validation techniques, validation
errors, and best practices
• Java exceptions, erroneous behaviors, and the
best practices to handle or avoid them
• Secure authentication and authorization
processes
• Java Authentication and Authorization
Service (JAAS), its architecture, Pluggable
Authentication Module (PAM) Framework,
and access permissions through Java Security
Model
• Secure Java concurrency and session
management
• Core security coding practices of Java
Cryptography that includes Encryption, Key
Generator and implementation of Cipher Class,
• Digital signatures, secret keys, and key
management
• Various Java application vulnerabilities
20. Course Description
Key Outcomes
Course Outline
Exam Information
20
EC-Council Certified Secure Programmer (ECSP) .Net
The ECSP .Net program covers identification of security flaws and implementation of security
countermeasures throughout the software development lifecycle to improve the overall quality of products
and applications. This course is purposefully built with a number of labs with three days of training, offering
participants critical hands on time to fully grasp the new techniques and strategies in secure programming.
• Introduces .Net security architecture and
common security threats
• Secure software development lifecycle
(SDLC)
• Common threats and mitigation approaches
• Detailed coverage of input validation, output
encoding, authentication and authorization,
and other secure coding practices
• Number of questions: 50
• Passing score: 70%
• Test duration: 2 Hours
• Test format: Multiple choice
• Test delivery: EC-Council exam center
• Exam prefix: 312-93
• .Net Application Security, ASP.Net Security
Architecture common security threats to
.Net framework
• Security attacks on .Net framework and
Secure SDLC
• Common threats to .Net assemblies and
stack walking processes
• Input validation
• Authorization and authentication
processes and common threats
• Various security principles for session
management
• Importance of cryptography in .Net,
different types of cryptographic attacks in
.Net
• Symmetric and asymmetric encryption,
hashing concepts, digital certificates,
digital and XML signatures
• Principles of secure error handling,
different levels of exception handling, and
various .Net logging tools
• File handling concepts
21. Course Description
Key Outcomes
Course Outline
Exam Information
21
Course Description
Key Outcomes
Testimonials
Exam Information
L P TLicensed Penetration Tester
TM
(Master)
EC-Council Licensed Penetration Tester (LPT) Master
The LPT (Master) credential is developed in collaboration with SMEs and practitioners around the world after a
thorough job role, job task, and skills-gap analysis.
The LPT (Master) practical exam is the capstone to EC-Council’s entire information security track, right from the
CEH to the ECSA Program. The LPT (Master) exam covers the skill-sets, technical analysis and report writing,
required to be a true professional penetration tester.
• Mastery of penetration testing skills
• Ability to perform repeatable methodology
• Commitment to code of ethics
• Ability to present analysed results through
structured reports
• Number of questions: 125
• Test duration: 4 hours
• Test format: Multiple choice
• Test delivery: ECC exam portal
21
LPT Demonstrates
“The LPT (Master) certification allows people like me
to speak from a sense of authority. When presenting
penetration testing results to clients you have a sense
of security that what you are saying is accurate and
real when you are backed up by a certification such
as this.”
Mark Horvat
“The ECSA program also gave me the correct
professional experience in how to interact with my
customers in a professional manner before, during,
and after completing my service to them.”
Moustafa Mohamed
Mohsen
“My overall experience was really good and taught
me great skills. LPT (Master) is a must for every cyber
security specialist and I guarantee it’s worth a try”
Adithya Naresh
“A certification is always a nice thing to show to other
parties, but when you have a credential like the LPT
(Master), you can proudly say that this is just not
another multiple-choice exam. It proves that you can
actually do an end-to-end penetration test of world-
class quality!”
Ali Isikli
22. Course Description
Key Outcomes
Course Outline
Exam Information
22
CAST 611 - Advanced Penetration Testing
The CAST 611– Advanced Penetration Testing is a specialized training program covering key information
security domains, at an advanced level. Students completing this course will gain in-depth knowledge
about information gathering, scanning, enumeration, exploitation and post exploitation, data analysis and
reporting, and a number of advanced techniques.
• Introduces a comprehensive process for a
security test, producing findings and report
for an enterprise class setting
• Complemented with Cyber Ranges that
progresses in difficulty and reflect an
enterprise level architecture, with defenses
to defeat and challenges to overcome
• Exposure to evasion techniques
• Based on practical results
• 60 questions
• 75 minutes
• Open book, note and access to range is
allowed during the test
• 70% minimum required to pass
• Information gathering and OSINT
• Scanning
• Enumeration
• Vulnerability analysis
• Exploitation
• Post exploitation
• Advanced techniques
• Data analysis and reporting
Center for Advanced Security Training
23. Course Description
Key Outcomes
Course Outline
Exam Information
23
CAST 612 – Advanced Mobile Forensics and Security
The CAST 612 – Advanced Mobile Forensics and Security focuses on what today’s mobile forensics
practitioner requires. Some of the advanced areas this course covers are the intricacies of manual
acquisition (physical vs. logical) and advanced analysis using reverse engineering, understanding how the
popular Mobile OSs are hardened to defend against common attacks and exploits.
• Advanced concepts of forensic imaging of
mobile devices, including logical, file, and
storage system
• Data carving and analysis
• Bypassing pattern and password locks
• Reverse engineering of Apps and DB
analysis
• Mobile forensics challenges
• Mobile forensics process
• Mobile hardware design and architectures
• Mobile OS architecture, boot process, and
file systems
• Mobile threats and security
• Mobile evidence acquisition and analysis
• Mobile application reverse engineering
• Mobile forensics reporting and expert
testimony
• Onsite workshop
Center for Advanced Security Training
24. Course Description
Key Outcomes
Course Outline
Exam Information
24
CAST 613 – Hacking and Hardening Corporate Web Apps
The CAST 613 – Hacking and Hardening Corporate Web Apps is a course designed with the average
security unaware programmer in mind. The course is designed with more than 50% involving hands-
on coding labs. The ideal participant should have a development background, coding, or architecting
background either currently or previously.
• Advanced techniques of hacking and
hardening a Website/Web App
• Key concepts of cryptography, TLS, user
account management, and session
management
• Reducing the attack surface with disclosure
controls as well as mitigation of XSS, SQLi,
and CSRF, etc.
• Cryptography decryption
• Account management
• Parameter diddling
• Transport layer protection
• Cross site scripting
• Cookies
• Internal implementation disclosure
• SQL injection
• Cross site attacks
• Exam Title: CAST 613 - Hacking and
Hardening your Corporate Web Application
• Exam Code: CAST613
• Number of Questions: 50
• Duration: 2 hours
• Availability: EC-Council Exam Portal
• Passing Score: 70%
Center for Advanced Security Training
25. Course Description
Key Outcomes
Course Outline
Exam Information
25
CAST 614 – Advanced Network Defense
• Get introduced to concepts of advanced
firewall controls and hardening of systems
• Understand intrusions, detection and
prevention
• Defending web applications, end points,
and critical infrastructure systems
The CAST 614 – Advanced Network Defense will enable you to evaluate advanced hacking methods
of defense fortification, bringing you closer to establishing perfect security best practices and
methodologies you can apply to secure environments. It will cover fundamental areas of fortifying
your defenses by discovering methods of developing a secure baseline and hardening your enterprise
architecture from the most advanced attacks.
• Onsite workshop
• Firewalls
• Advanced filtering
• Firewall configuration
• Hardening: establishing a secure baseline
• Intrusion detection and prevention
• Protecting web applications
• Memory analysis
• Endpoint protection
• Securing wireless
Center for Advanced Security Training
26. Course Description
Key Outcomes
Course Outline
Exam Information
26
CAST 616 – Securing Windows Infrastructure
• Key aspects of Windows infrastructure
security
• Architecture and its interconnected nature in
an enterprise system
• Application of best practices to secure with a
holistic framework
The CAST 616 – Securing Windows Infrastructure focuses on the key aspects of Windows Infrastructure
Security. It is designed with the single purpose of providing infosec professionals complete knowledge and
practical skills necessary for ensuring the security of their network infrastructure, that is fast becoming, if
already not, a top priority and a major challenge for most organizations.
• Windows 7 & 8 hardening
• Windows Server 2008 R2 / Windows Server
2012 hardening
• Hardening Microsoft network roles
• Windows high availability
• Data and application security
• Monitoring, troubleshooting and auditing
Windows
• Automating Windows hardening
• Organizational security
• Three-day technical workshop
Center for Advanced Security Training
27. Course Description
Key Outcomes
Course Outline
Exam Information
27
EC-Council
Disaster
Recovery
Professional
TM
EC-Council Disaster Recovery Professional (EDRP)
The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate
failure risks for an organization. It also provides the networking professional a foundation in disaster
recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the
enterprise, development of policies and procedures, an understanding of the roles and relationships of
various members of an organization, implementation of a plan, and recovering from a disaster.
• Introduction to business continuity, risk
management, and disaster recovery
• Disasters and emergency management, and
applicable regulations
• DR planning process, preparation, recovery
of systems and facilities
• Incident response and liaison with public
services and regulatory bodies
• Exposure to various services from
government and other entities
• Number of questions: 50
• Test duration: 2 hours
• Test format: Multiple choice
• Test delivery: ECC exam portal
• Introduction to disaster recovery and
business continuity
• Nature and causes of disasters
• Emergency management
• Laws and acts
• Business continuity management
• Disaster recovery planning process
• Risk management
• Facility protection
• Data recovery
• System recovery
• Backup and recovery
• Centralized and decentralized system
recovery
• Windows data recovery tools
• Linux, Mac and Novell Netware data
recovery tools
• Incident response
• Role of public services in disaster
• Organizations providing services during
disasters
• Organizations providing disaster recovery
solutions
• Case studies
28. Course Description
Key Outcomes
Course Outline
Exam Information
28
C CISO
TM
Certified Chief Information Security Officer
Certified Chief Information Security Officer (C|CISO)
The C|CISO certification is an industry-leading program that recognizes the real-world experience necessary
to succeed at the highest executive levels of information security. Bringing together all the components
required for a C-Level positions, the C|CISO program combines audit management, governance, IS controls,
human capital management, strategic program development, and the financial expertise vital for leading a
highly successful IS program.
The C|CISO Training Program can be the key to a successful transition to the highest ranks of information
security management.
• Establishes the role of CISO and models for
governance
• Core concepts of information security
controls, risk management, and compliance
• Builds foundation for leadership through
strategic planning, program management,
and vendor management
• Governance
• Security risk management, controls, and
audit management
• Security program management and
operations
• Information security core concepts
• Strategic planning, finance, and vendor
management
• Exam Format : Multiple Choice
• Total number of questions : 150
• Exam duration : 2.5 Hours
• Required passing score : 72%
29. Course Description
Key Outcomes
Course Outline
Exam Information
29
Course Description
Key Outcomes
Courses
Graduation Requirements
Bachelor of Science in Cyber Security (BSCS)
The Bachelor of Science in Cyber Security (BSCS) prepares students the knowledge for careers in cyber
security and assurance. The program consists of topical areas dealing with computer security management,
incident response, and security threat assessment, etc.
• Knowledge and hands-on experience on
various foundational cyber security concepts
• Some of the key topics include security
management and incident response, security
threat assessment and risk management,
legal and regulatory issues and compliance
• Cyber defense and cyber warfare,
implementation of security controls, and
auditing
• Capstone Project
• Completion of 60 credit hours of 300/400
level courses in which the candidate earned
a cumulative GPA of 2.5 or better
• Satisfactory completion of the summative
capstone course
• All degree requirements must be completed
within four years from the date the student
enrolls in the University and begins the
program
• CIS 300 Fundamentals of information systems
security
• CIS 301 Legal issues in cyber security
• CIS 302 Managing risk in information systems
• CIS 303 Security policies and implementation
issues
• CIS 304 Auditing IT infrastructures for
compliance
• CIS 308 Access control
• CIS 401 Security strategies in Windows
platforms and applications
• CIS 402 Security strategies in Linux platforms
and applications
• CIS 403 Network security, Firewalls, and VPNs
• CIS 404 Hacker techniques, tools, and incident
handling
• CIS 405 Internet Security: How to defend
against online attackers
• CIS 406 System forensics, investigation, and
response
• CIS 407 Cyberwarfare
• CIS 408 Wireless and mobile device security
• CIS 410 Capstone course
• ENG 340 English communications
• MTH 350 Introduction to statistics
• PSY 360 Social psychology
• BIS 430 Ethics for the business professional
• ECN 440 Principles of microeconomics
• MGT 450 Introduction to project management
29
ACCREDITED. FLEXIBLE. ONLINE.
30. Course Description
Key Outcomes
Course Outline
Exam Information
Course Description
Key Outcomes
Courses
Certificate Requirements
Graduate Certificate Programs
EC-Council University’s Graduate Certificate Program focuses on the competencies necessary
for information assurance professionals to become managers, directors, and CIOs. Students will
experience not only specialized technical training in a variety of IT security areas, but will also acquire
an understanding of organizational structure and behavior, the skills to work within and across that
organizational structure, and the ability to analyze and navigate its hierarchy successfully. Each certificate
targets skills and understandings specific to particular roles in the IT security framework of an organization.
The certificates can be taken singly or as a progressive set of five, each building on the one before it to
move students from IT practitioner skill levels to IT executive skill levels.
• Preparation for industry recognized
certifications
• NSA program mappings
• Executive leadership development
• Masters level education
• Promoting critical thinking
• Ethical practice
• Scholarship and research
• Completion of mandated credit hours of
courses in which the candidate earned a
cumulative GPA of 2.5 or better
• All certificate requirements must be
completed within six months-one year
from the date the student enrolls in the
university and begins the program
• Information security professional
• ECCU 500 Managing secure network
systems
• ECCU 501 Ethical hacking and
Countermeasures
• ECCU 505 Research and writing for the
IT practitioner
• Digital forensics
• Disaster recovery
• Executive information assurance
• IT Analyst
ACCREDITED. FLEXIBLE. ONLINE.
30
31. Course Description
Key Outcomes
Course Outline
Exam Information
31
Course Description
Key Outcomes
Courses
Graduation Requirements
Master of Science in Cyber Security (MSS)
The Master of Science in Cyber Security (MSS) Program prepares information technology professionals
for careers in cyber security and assurance. The program consists of topical areas dealing with computer
security management, incident response, and cyber security threat assessment, which require students to
be the creators of knowledge and inventors of cyber security processes, not merely users of information.
Additionally, students will receive instruction in leadership and management in preparation for becoming
cyber security leaders, managers, and directors.
• Application of cyber security technical strategies,
tools, and techniques to secure data and
information for a customer or client
• Adherence to a high standard of cyber security
ethical behavior
• Use of research in both established venues and
innovative applications to expand the body of
knowledge in cyber security
• Application of principles of critical thinking to
creatively and systematically solve the problems
and meet the challenges of the everchanging
environments of cyber security
• Mastery of the skills necessary to move into cyber
security leadership roles in companies, agencies,
divisions, or departments
• Completion of thirty-six (36) credits of 500
level courses in which the candidate earned
a cumulative GPA of 3.0 or better
• Satisfactory completion of the summative
capstone course
• All degree requirements must be completed
within four years from the date the student
enrolls in the university and begins the
program
• ECCU 500 Managing secure network systems
• MGMT 502 Business essentials
• ECCU 501 Ethical hacking and
countermeasures
• ECCU 502 Investigating network intrusions
and computer forensics
• ECCU 503 Security analysis and vulnerability
assessment
• ECCU 504 Foundations of organizational
behavior for the IT practitioner
• ECCU 505 Introduction to research and writing
for the IT practitioner
• ECCU 506 Conducting penetration and
security tests
• ECCU 507 Linux networking and security
• ECCU 509 Securing wireless networks
• ECCU 510 Secure programming
• ECCU 511 Global business leadership
• ECCU 512 Beyond business continuity
• ECCU 513 Disaster recovery
• ECCU 514 Quantum leadership
• ECCU 515 Project management in IT security
• ECCU 516 The hacker mind: Profiling the IT
criminal
• ECCU 517 Cyber law
• ECCU 518 Special topics
• ECCU 519 Capstone
31
ACCREDITED. FLEXIBLE. ONLINE.