Cyber4Africa Technocratic Training Program Outline:
Core Cybersecurity Certifications / Projects
Introduction of ECSD (Standardization)
ECSD (Essoka Cyber Security Division) has accomplished international accreditation and recognition for training and proctoring cybersecurity exams (Cert ID EATC52208) through EC-Council, as a premier international standardization framework embodying her vision on cyber-information security across Africa.
A Practicum...
As a technocratic entity in Information technology, Communication Technology, and Cybersecurity, ECSD uses a practical, postindustrial - action learning (learning by doing) approach, which is in line with her vision for comprehensive cybersecurity across Africa by Africans, via the training of technocrats:
The following technocratic elaboration below is an overview of ECSD’s comprehensive landscape of training, certifications and projects to accede to her vision of across-the-board cybersecurity for Africa by Africans;
C4A – PHASE 1- FUNDAMENTAL CERTIFIED IT TRAINING AND PROJECTS
Internet & Computing Core (IC3):
Technology is integrated into nearly every aspect of our lives. From cell phones and personal devices to the more robust systems that power modern vehicles and large corporations, we use technology every day. And whether we are simply updating a social media status or managing complex IT infrastructures, technology plays a critical role in our happiness and success.
The IC3 Digital Literacy certification is a credential that is designed to remain relevant in an ever evolving world of technology. With a focus on the most critical elements that drive technology today, IC3 Global Standard 5 (GS5) delivers a comprehensive solution for learning how to succeed in any environment that requires the use of computers, devices, or the Internet. Best of all, because IC3 GS5 includes concepts and skills that apply to almost any school or career pathway, it’s the ideal solution for any student or jobseeker looking to enhance or validate their digital skills.
Like its predecessors, IC3 GS5 validates a candidate’s ability to effectively use some of the world’s most current and prominent technologies, and is comprised of three individual exams:
(ECSD IC3 Module and Project Areas: )
A. Computing Fundamentals: Covers fundamental understanding of computing; Designed to help the user get the most out of technology, the Computing Fundamentals examination covers a foundational understanding of computer hardware, software, operating systems, peripherals, and troubleshooting. And new to the Global Standard 5 exams (GS5), Computing Fundamentals will now also include Mobile Device and Cloud Computing concepts.
B. Key Applications: Covers popular word processing, spreadsheet and presentation applications and the common features of all applications: These days, it seems that no matter what you’re doing - “there’s an app for that!” The Key Applications training and certification program covers the most common features of the world’s best spreadsheet, word processing, and presentation applications. And, with the release of IC3 Global Standard 5 (GS5), this domain now includes app culture elements that will help the examinee understand how to obtain and maximize the use of some of today’s most popular apps.
C. Living Online: Covers skills for working in an Internet or networked environment: We live in a connected world where the Internet plays a vital role in both our personal and professional activities. The Living Online training and certification program is designed to help users understand how to effectively use the Internet or work in a networked environment and maximize communication, education, collaboration, and social interactions in a safe and ethical way. The Global Standard 5 (GS5) release of this training and exam brings with it various new and enhanced modules including social media, calendaring, streaming, and online conferencing elements that truly measure a candidate’s ability to succeed in an increasingly digital world.
The ECSD IC3 Project is designed to standardize such relevant digital skills in the work environment of the digital era: With a focus on the most critical elements that drive technology today, IC3 Global Standard 5 (GS5) delivers a comprehensive solution for learning how to succeed in any environment that requires the use of computers, devices, or the Internet. A collaboration on such a vital triad capacity building project on standardizing digital literacy, would endow staff from government agencies to private institutions with digital industry credentials to function efficiently and enhance sustainable productivity across the digital era.
Standardization used: Certified Secure Computer User
Certified Secure Computer User
Hundreds of millions of people globally harness the power of the web, email and computer applications daily. They fill the offices, halls of academia, and very much run the wheels of global economics.
Computer users need to know how to protect information assets and securely connect to another system over a network. CSCU program enables them to build on their existing skills and achieve better efficiency in using computing resources by educating them on practical aspects of security and networking. CSCU is about empowering the knowledge worker with the Information necessary to compute securely, network efficiently, and be in control of the computing environment.
The aforementioned achieved enduser security posture would not only mitigate a wad of nationwide cybersecurity threats, centered around endusers as the weakest link to every cybersecurity posture, but would further provide the foundation for the consolidation of comprehensive cybersecurity practice across government ministries, agencies, institutions and the nation at large.
(CSCU EC-Council) via Accredited Training Center, ECSD.
End User Cybersecurity Certified Training modules:
End User Cybersecurity Program-Project Domains:
CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills
Why is it different?
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.
About the exam
The CompTIA IT Fundamentals exam focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike, including:
The CompTIA ITF+ is part of the C4A project because the objective of the project is to train technocrats with varied expertise knowledge to serve the information, and communication technology needs that would enable comprehensive cybersecurity across African nations by Africans.
Introducing the 1st Smart Project Management Professional Training and Certification Program for fresh graduates
Contextual Training, Global Application
As organizations transform into smart, adaptive, digital enterprises and economies evolve to consumer-centric and data-driven peer-to-peer ecosystems, our mission is and has always been to help business professionals obtain relevant, implementable and practical digital skills to facilitate corporate growth globally.
The Certified Project Manager (C|PM) Course was developed to help respective aspiring professionals gain excessive knowledge in Project Management technology and its implication on businesses & operations. C|PM program, a 360°, vendor agnostic and practical course, focuses on digital tools, smart applications and other technological advancements useful to modern project managers.
C4A – PHASE 2 : Core IT Certification Programs: (With CEP)
Continuing Education Program (CEP): Test Centers (Pearson Vue) facilitate the provision of the CEP via ilearn, labs, iclass etc.
CEPs are Formal lectures, courses, seminars, webinars, or any other similar type of educational program designed to educate an individual and give him or her further skills or knowledge to be applied in his or her line of work. These programs are intended to educate persons on new advancements, or to build upon a person's expertise in a given field. These may be optional for some trades, but in other circumstances can be required to maintain status, certification, or licensure.
Read more: http://www.businessdictionary.com/definition/continuing-education-program.html
These Phase provides CEPs in CT (Networking) Programs and Certifications like CCNA-CCNP-CCIE to further advance a mastery and career in networking in the C4A project via the CEP provisions: iclass, labs, online and hands on training, spread across a customizable schedule.
Technocratic comprehensive cyber4Africa Training-certification-project/program:
The goal of the technocratic program is to train internationally licensed/certified experts who constitute teams/members of a highly-comprehensive skilled elite group; with respect to the comprehensive cyber4Africa project-program, this training and her respective projects would comprise 29 licenses in the following 3 major licensure/program-project areas:
A. Information Technology: CompTIA A+ / MTA licenses
CompTIA A+ is the industry standard for establishing a career in IT. CompTIA A+ is the preferred qualifying credential for technical support and IT operational roles. It is about much more than PC repair.
9 skills that you master and validate with CompTIA A+
HARDWARE
Identifying, using, and connecting hardware components and devices
WINDOWS OPERATING SYSTEMS
Install and support Windows OS including command line & client support
SOFTWARE TROUBLESHOOTING
Troubleshoot PC and mobile device issues including application security support
NETWORKING
Explain types of networks and connections including TCP/IP, WIFI and SOHO
HARDWARE & NETWORK TROUBLESHOOTING
Troubleshoot device and network issues
SECURITY
Identify and protect against security vulnerabilities for devices and their network connections
MOBILE DEVICES
Install & configure laptops and other mobile devices
OTHER OS & TECHNOLOGIES
Understand Mac OS, Linux and mobile OS
OPERATIONAL PROCEDURES
Follow best practices for safety, environmental impacts, and communication and professionalism
Microsoft Technology Associate (MTA) Licenses :
Microsoft Technology Associate (MTA) are professional based certifications on Microsoft products and they provide the fundamentals for Databases, Development and IT Infrastructure.
Earning an MTA: Microsoft Technology Associate certifications validate the fundamental knowledge needed to begin building a career in technology. These certifications are the foundation for technological know-how of the ECSD technocratic project-program as follows:
1. Windows Operating System Fundamentals (Exam 98-349)
2. Software Development Fundamentals (Exam 98-361)
3. Database Fundamentals (Exam 98-364)
4. Windows Server Administration Fundamentals (Exam 98-365)
5. Networking Fundamentals (Exam 98-366)
6. Security Fundamentals (Exam 98-367)
7. Mobility and Devices Fundamentals (Exam 98-368)
8. Cloud Fundamentals (Exam 98-369)
9. HTML5 Application Development Fundamentals (98-375)
10. Introduction to Programming Using Block-Based Languages (Touch Develop) – (Exam 98-380)
11. Introduction to Programming Using Python (Exam 98-381)
I. Apply Strategies to Solve Computational Problems (15-20%)
II. Design Algorithms (25-30%)
III. Work with Data Representation in Block-Based Programming Languages (15-20%)
IV. Solve Computational Problems by Using Modeling and Simulation (5-10%)
V. Code Programs in Block-Based Programming (15-20%)
VI. Assess Personal Security in Internet Communications (5-10%)
VII. Examine the Software Development Process (5-10%)
12. Introduction to Programming Using JavaScript (98-382)
13. Introduction to Programming Using HTML and CSS (98-383)
14. Introduction to Programming Using Java (98-388)
B. Communication Technology (Licensure and Project competences): CompTIA Network+:
Network+ ensures an IT professional has the knowledge and skills to:
C4A – PHASE 3 – CORE / ADVANCED CYBERSECURITY CERTIFICATION / PROJECTS:
fundamentals
• Network security threats, vulnerabilities,
and attacks
• Network security controls, protocols, and
devices
• Network security policy design and
implementation
• Physical security
• Host security
• Secure firewall configuration and
management
• Secure IDS configuration and management
• Secure VPN configuration and management
• Wireless network defense
• Network traffic monitoring and analysis
• Network risk and vulnerability management
• Data backup and recovery
• Network incident response and
management
• Introduction to ethical hacking
• Foot printing and reconnaissance
• Scanning networks
• Enumeration
• Sniffing
• System hacking
• Malware threats
• Social engineering
• Denial of service
• Session hijacking
• Hacking web applications
• SQL injection
• Hacking wireless networks
• Hacking web servers
• Hacking mobile platforms
• Evading IDS, Firewalls, and Honeypot
• Cloud computing
• Cryptography
• Computer forensics in today’s world
• Computer forensics investigation process
• Understanding hard disks and file systems
• Defeating anti-forensics techniques
• Operating system forensics
• Network forensics
• Investigating web attacks
• Database forensics
• Cloud forensics
• Malware forensics
• Investigating email crimes
• Mobile forensics
• Forensics report writing and presentation
• Data Acquisition and Duplication
infrastructures, operating systems, and application environments while teaching the students/polymaths how to document and write a penetration testing report. This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s published penetration testing methodology.
Program Outline:
• Security analysis and penetration testing
methodologies
• TCP IP packet analysis
• Pre-penetration testing steps
• Information gathering methodology
• Vulnerability analysis
• External network penetration testing
methodology
• Internal network penetration testing
methodology
• Firewall penetration testing methodology
• IDS penetration testing methodology
• Web application penetration testing
methodology
• SQL penetration testing methodology
• Database penetration testing methodology
• Wireless network penetration testing
methodology
• Mobile devices penetration testing
methodology
• Cloud penetration testing methodology
• Report writing and post-test actions
developed in close collaboration with SMEs and practitioners around the world after a thorough job role,
job task, and skills-gap analysis. The LPT (Master) practical exam is the capstone to EC-Council’s entire information security track, right from the CEH to the ECSA Program. The LPT (Master) exam covers the entire Penetration Testing process and lifecycle with keen focus on report writing, required to be a true professional Penetration Tester.
Key Outcomes:
• Mastery of Penetration Testing skills
• A consistent, repeatable and measurable
approach to Penetration Testing
• Commitment to code of ethics
• Ability to present analysed results through
professional reports
- Introduction of ECSD (Standardization)
- C4A – Phase 1- Fundamental Certified IT Training and Projects
- Standardization of Digital Literacy Training / Projects
- End User Cybersecurity Training / Projects
- CompTIA IT Fundamentals (ITF+)
- Certified Project Manager (CPM by IIB EC-Council)
- C4A – Phase 2 – Core Information and Communication Technology Certified Training and Projects:
- Core IT : CompTIA A+
- Core CT: CompTIA N+
- MTA licenses
- C4A – Phase 3 – Core / Advanced Cybersecurity Certifications / projects:
Core Cybersecurity Certifications / Projects
- Certified Network Defender (CND EC-Council)
- CompTIA Security+
- Certified Ethical Hacker (CEH EC-Council)
- Computer Hacking Forensic Investigator (CHFI EC-Council)
- EC-Council Certified Security Analyst (ECSA)
- Licensed Penetration Tester (LPT EC-Council)
Introduction of ECSD (Standardization)
ECSD (Essoka Cyber Security Division) has accomplished international accreditation and recognition for training and proctoring cybersecurity exams (Cert ID EATC52208) through EC-Council, as a premier international standardization framework embodying her vision on cyber-information security across Africa.
A Practicum...
As a technocratic entity in Information technology, Communication Technology, and Cybersecurity, ECSD uses a practical, postindustrial - action learning (learning by doing) approach, which is in line with her vision for comprehensive cybersecurity across Africa by Africans, via the training of technocrats:
The following technocratic elaboration below is an overview of ECSD’s comprehensive landscape of training, certifications and projects to accede to her vision of across-the-board cybersecurity for Africa by Africans;
C4A – PHASE 1- FUNDAMENTAL CERTIFIED IT TRAINING AND PROJECTS
- Standardization of Digital Literacy Project:
Internet & Computing Core (IC3):
Technology is integrated into nearly every aspect of our lives. From cell phones and personal devices to the more robust systems that power modern vehicles and large corporations, we use technology every day. And whether we are simply updating a social media status or managing complex IT infrastructures, technology plays a critical role in our happiness and success.
The IC3 Digital Literacy certification is a credential that is designed to remain relevant in an ever evolving world of technology. With a focus on the most critical elements that drive technology today, IC3 Global Standard 5 (GS5) delivers a comprehensive solution for learning how to succeed in any environment that requires the use of computers, devices, or the Internet. Best of all, because IC3 GS5 includes concepts and skills that apply to almost any school or career pathway, it’s the ideal solution for any student or jobseeker looking to enhance or validate their digital skills.
Like its predecessors, IC3 GS5 validates a candidate’s ability to effectively use some of the world’s most current and prominent technologies, and is comprised of three individual exams:
(ECSD IC3 Module and Project Areas: )
A. Computing Fundamentals: Covers fundamental understanding of computing; Designed to help the user get the most out of technology, the Computing Fundamentals examination covers a foundational understanding of computer hardware, software, operating systems, peripherals, and troubleshooting. And new to the Global Standard 5 exams (GS5), Computing Fundamentals will now also include Mobile Device and Cloud Computing concepts.
B. Key Applications: Covers popular word processing, spreadsheet and presentation applications and the common features of all applications: These days, it seems that no matter what you’re doing - “there’s an app for that!” The Key Applications training and certification program covers the most common features of the world’s best spreadsheet, word processing, and presentation applications. And, with the release of IC3 Global Standard 5 (GS5), this domain now includes app culture elements that will help the examinee understand how to obtain and maximize the use of some of today’s most popular apps.
C. Living Online: Covers skills for working in an Internet or networked environment: We live in a connected world where the Internet plays a vital role in both our personal and professional activities. The Living Online training and certification program is designed to help users understand how to effectively use the Internet or work in a networked environment and maximize communication, education, collaboration, and social interactions in a safe and ethical way. The Global Standard 5 (GS5) release of this training and exam brings with it various new and enhanced modules including social media, calendaring, streaming, and online conferencing elements that truly measure a candidate’s ability to succeed in an increasingly digital world.
The ECSD IC3 Project is designed to standardize such relevant digital skills in the work environment of the digital era: With a focus on the most critical elements that drive technology today, IC3 Global Standard 5 (GS5) delivers a comprehensive solution for learning how to succeed in any environment that requires the use of computers, devices, or the Internet. A collaboration on such a vital triad capacity building project on standardizing digital literacy, would endow staff from government agencies to private institutions with digital industry credentials to function efficiently and enhance sustainable productivity across the digital era.
- End User Cybersecurity Projects:
Standardization used: Certified Secure Computer User
Certified Secure Computer User
Hundreds of millions of people globally harness the power of the web, email and computer applications daily. They fill the offices, halls of academia, and very much run the wheels of global economics.
Computer users need to know how to protect information assets and securely connect to another system over a network. CSCU program enables them to build on their existing skills and achieve better efficiency in using computing resources by educating them on practical aspects of security and networking. CSCU is about empowering the knowledge worker with the Information necessary to compute securely, network efficiently, and be in control of the computing environment.
The aforementioned achieved enduser security posture would not only mitigate a wad of nationwide cybersecurity threats, centered around endusers as the weakest link to every cybersecurity posture, but would further provide the foundation for the consolidation of comprehensive cybersecurity practice across government ministries, agencies, institutions and the nation at large.
(CSCU EC-Council) via Accredited Training Center, ECSD.
End User Cybersecurity Certified Training modules:
- Introduction to Security
- Securing Email Communications
- Securing Operating Systems
- Securing Mobile Devices
- Malware and Antivirus
- Securing The Cloud
- Internet Security
- Securing Network Connections
- Security on Social Networking Sites
- Data Backup and Disaster Recovery
End User Cybersecurity Program-Project Domains:
- Cloud Security
- Data Backup
- Password Security
- Social Network Security
- Social Engineering Countermeasures
- Antivirus Protection
- Mitigating Identity Theft
- Disaster Recovery
- Email Security
- Internet Security
- Safe Browsing
- Credit Card Security
- Data Protection
- Monitoring Kids Online
- Physical Security
- Wireless & Home Network Security
- Mobile Device Security
- OS Security
- CompTIA IT Fundamentals
CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills
Why is it different?
CompTIA ITF+ helps professionals to decide if a career in IT is right for them or to develop a broader understanding of IT.
- ITF+ is the only pre-career certification that helps students or career changers determine if they have a competency for information technology and if it is the right career path for them.
- ITF+ is the only single certification that covers all areas of IT foundations, creating a broader understanding of IT making it ideal for non-technical professionals.
- ITF+ establishes an IT education framework for students in middle school and high school.
About the exam
The CompTIA IT Fundamentals exam focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike, including:
- Using features and functions of common operating systems and establishing network connectivity
- Identifying common software applications and their purpose
- Using security and web browsing best practices
The CompTIA ITF+ is part of the C4A project because the objective of the project is to train technocrats with varied expertise knowledge to serve the information, and communication technology needs that would enable comprehensive cybersecurity across African nations by Africans.
- Certified Project Manager
Introducing the 1st Smart Project Management Professional Training and Certification Program for fresh graduates
Contextual Training, Global Application
As organizations transform into smart, adaptive, digital enterprises and economies evolve to consumer-centric and data-driven peer-to-peer ecosystems, our mission is and has always been to help business professionals obtain relevant, implementable and practical digital skills to facilitate corporate growth globally.
The Certified Project Manager (C|PM) Course was developed to help respective aspiring professionals gain excessive knowledge in Project Management technology and its implication on businesses & operations. C|PM program, a 360°, vendor agnostic and practical course, focuses on digital tools, smart applications and other technological advancements useful to modern project managers.
C4A – PHASE 2 : Core IT Certification Programs: (With CEP)
Continuing Education Program (CEP): Test Centers (Pearson Vue) facilitate the provision of the CEP via ilearn, labs, iclass etc.
CEPs are Formal lectures, courses, seminars, webinars, or any other similar type of educational program designed to educate an individual and give him or her further skills or knowledge to be applied in his or her line of work. These programs are intended to educate persons on new advancements, or to build upon a person's expertise in a given field. These may be optional for some trades, but in other circumstances can be required to maintain status, certification, or licensure.
Read more: http://www.businessdictionary.com/definition/continuing-education-program.html
These Phase provides CEPs in CT (Networking) Programs and Certifications like CCNA-CCNP-CCIE to further advance a mastery and career in networking in the C4A project via the CEP provisions: iclass, labs, online and hands on training, spread across a customizable schedule.
Technocratic comprehensive cyber4Africa Training-certification-project/program:
The goal of the technocratic program is to train internationally licensed/certified experts who constitute teams/members of a highly-comprehensive skilled elite group; with respect to the comprehensive cyber4Africa project-program, this training and her respective projects would comprise 29 licenses in the following 3 major licensure/program-project areas:
A. Information Technology: CompTIA A+ / MTA licenses
CompTIA A+ is the industry standard for establishing a career in IT. CompTIA A+ is the preferred qualifying credential for technical support and IT operational roles. It is about much more than PC repair.
- Candidates are better prepared to troubleshoot and problem solve.
- Technicians understand a wide variety of issues ranging from networking and operating systems to mobile devices and security.
- A+ supports the ability to connect users to the data they need to do their jobs regardless of the devices being used.
9 skills that you master and validate with CompTIA A+
HARDWARE
Identifying, using, and connecting hardware components and devices
WINDOWS OPERATING SYSTEMS
Install and support Windows OS including command line & client support
SOFTWARE TROUBLESHOOTING
Troubleshoot PC and mobile device issues including application security support
NETWORKING
Explain types of networks and connections including TCP/IP, WIFI and SOHO
HARDWARE & NETWORK TROUBLESHOOTING
Troubleshoot device and network issues
SECURITY
Identify and protect against security vulnerabilities for devices and their network connections
MOBILE DEVICES
Install & configure laptops and other mobile devices
OTHER OS & TECHNOLOGIES
Understand Mac OS, Linux and mobile OS
OPERATIONAL PROCEDURES
Follow best practices for safety, environmental impacts, and communication and professionalism
Microsoft Technology Associate (MTA) Licenses :
Microsoft Technology Associate (MTA) are professional based certifications on Microsoft products and they provide the fundamentals for Databases, Development and IT Infrastructure.
Earning an MTA: Microsoft Technology Associate certifications validate the fundamental knowledge needed to begin building a career in technology. These certifications are the foundation for technological know-how of the ECSD technocratic project-program as follows:
1. Windows Operating System Fundamentals (Exam 98-349)
2. Software Development Fundamentals (Exam 98-361)
3. Database Fundamentals (Exam 98-364)
4. Windows Server Administration Fundamentals (Exam 98-365)
5. Networking Fundamentals (Exam 98-366)
6. Security Fundamentals (Exam 98-367)
7. Mobility and Devices Fundamentals (Exam 98-368)
8. Cloud Fundamentals (Exam 98-369)
9. HTML5 Application Development Fundamentals (98-375)
10. Introduction to Programming Using Block-Based Languages (Touch Develop) – (Exam 98-380)
11. Introduction to Programming Using Python (Exam 98-381)
I. Apply Strategies to Solve Computational Problems (15-20%)
II. Design Algorithms (25-30%)
III. Work with Data Representation in Block-Based Programming Languages (15-20%)
IV. Solve Computational Problems by Using Modeling and Simulation (5-10%)
V. Code Programs in Block-Based Programming (15-20%)
VI. Assess Personal Security in Internet Communications (5-10%)
VII. Examine the Software Development Process (5-10%)
12. Introduction to Programming Using JavaScript (98-382)
13. Introduction to Programming Using HTML and CSS (98-383)
14. Introduction to Programming Using Java (98-388)
B. Communication Technology (Licensure and Project competences): CompTIA Network+:
Network+ ensures an IT professional has the knowledge and skills to:
- Design and implement functional networks
- Configure, manage, and maintain essential network devices
- Use devices such as switches and routers to segment network traffic and create resilient networks
- Identify benefits and drawbacks of existing network configurations
- Implement network security, standards, and protocols
- Troubleshoot network problems
- Support the creation of virtualized networks
C4A – PHASE 3 – CORE / ADVANCED CYBERSECURITY CERTIFICATION / PROJECTS:
- CompTIA Security+: CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.
- Certified Network Defender (CND): CND is the world’s most advanced network defense certification program that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks. This certification program contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations. The core course outline of this certification and her respective work project areas are as follows:
fundamentals
• Network security threats, vulnerabilities,
and attacks
• Network security controls, protocols, and
devices
• Network security policy design and
implementation
• Physical security
• Host security
• Secure firewall configuration and
management
• Secure IDS configuration and management
• Secure VPN configuration and management
• Wireless network defense
• Network traffic monitoring and analysis
• Network risk and vulnerability management
• Data backup and recovery
• Network incident response and
management
- Certified Ethical Hacker (CEH): CEH is the world’s most advanced certified ethical hacking course that covers 18 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization. The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals. The core course outline of this certification and her respective work project areas are as follows:
• Introduction to ethical hacking
• Foot printing and reconnaissance
• Scanning networks
• Enumeration
• Sniffing
• System hacking
• Malware threats
• Social engineering
• Denial of service
• Session hijacking
• Hacking web applications
• SQL injection
• Hacking wireless networks
• Hacking web servers
• Hacking mobile platforms
• Evading IDS, Firewalls, and Honeypot
• Cloud computing
• Cryptography
- Computer Hacking Forensic Investigator (CHFI): CHFI is a comprehensive certification covering major forensic investigation scenarios, enabling students/polymaths to acquire hands-on experience. The program provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. Moreover, CHFI provides firm grasp on the domains of digital forensics via the following areas:
• Computer forensics in today’s world
• Computer forensics investigation process
• Understanding hard disks and file systems
• Defeating anti-forensics techniques
• Operating system forensics
• Network forensics
• Investigating web attacks
• Database forensics
• Cloud forensics
• Malware forensics
• Investigating email crimes
• Mobile forensics
• Forensics report writing and presentation
• Data Acquisition and Duplication
- EC-Council Certified Security Analyst (ECSA):
infrastructures, operating systems, and application environments while teaching the students/polymaths how to document and write a penetration testing report. This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s published penetration testing methodology.
Program Outline:
• Security analysis and penetration testing
methodologies
• TCP IP packet analysis
• Pre-penetration testing steps
• Information gathering methodology
• Vulnerability analysis
• External network penetration testing
methodology
• Internal network penetration testing
methodology
• Firewall penetration testing methodology
• IDS penetration testing methodology
• Web application penetration testing
methodology
• SQL penetration testing methodology
• Database penetration testing methodology
• Wireless network penetration testing
methodology
• Mobile devices penetration testing
methodology
• Cloud penetration testing methodology
• Report writing and post-test actions
- Licensed Penetration Tester (LPT Master):
developed in close collaboration with SMEs and practitioners around the world after a thorough job role,
job task, and skills-gap analysis. The LPT (Master) practical exam is the capstone to EC-Council’s entire information security track, right from the CEH to the ECSA Program. The LPT (Master) exam covers the entire Penetration Testing process and lifecycle with keen focus on report writing, required to be a true professional Penetration Tester.
Key Outcomes:
• Mastery of Penetration Testing skills
• A consistent, repeatable and measurable
approach to Penetration Testing
• Commitment to code of ethics
• Ability to present analysed results through
professional reports