ESSOKA CYBERSECURITY SERVICES
Take control and remain in control of your information resources.
We offer offensive Cybersecurity training that will empower companies and individuals on how to protect their information assets (CSCU), identify and protect all Information technology infrastructure from cyber-attack (CEH) by identifying threats and effectively resolving high risk operating standards: services that will exploit vulnerabilities and provide counter measures to cybercrime; Services on how to investigate (CHFI) cybercrime with concrete legally acceptable digital evidence. Essoka Cybersecurity training programs and services are licensed by EC-Council, the world's leading Cybersecurity Tuition Provider. We also offer industry security solutions through partnerships with GFI Software, Checkpoint and Kaspersky.
1. Modulated Services per CSCU
2. Modulated Services per Offensive Cybersecurity
3. Modulated Services per CHFI
4. ECSD Cybersecurity Team:
Essoka Cybersecurity Division (ECSD) services are furnished by a cyber team overly qualified in personal-business
organizational development and internationally certified in the following areas;
1. Modulated Services per CSCU
- Cybersecurity Personal, and Corporate Training Programs for the knowledge workers...read more
2. Modulated Services per Offensive Cybersecurity
- Our penetration testing and counter measure services:
- Incident management and penetration testing
- Footprinting and Reconnaissance and countermeasures
- Network scanning and scanning countermeasures
- Enumeration and enumeration countermeasures
- System hacking methodology, steganography, steganalysis attacks
- Types of Trojans, Trojan analysis, and Trojan countermeasures
- Virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffing and scanning countermeasures
- Social Engineering, identify theft, and social engineering countermeasures
- DoS/DDoS attack, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking and countermeasures
- Types of webserver attacks, attack methodology, and countermeasures
- Types of web application attacks, web application hacking methodology, and countermeasures
- SQL injection attacks and injection detection tools
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wireless security tools
- Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
- Cloud Hacking: Various cloud computing concepts, threats, attacks, and security techniques and tools
- Types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
3. Modulated Services per CHFI
- Computer Forensics Investigation (AccessData FTK, EnCase)
- Digital Evidence
- First Responder Procedures
- Data Acquisition and Duplication
- Disaster Recovery: Recovering Deleted Files and Deleted Partitions
- System Hacking: Steganography and Image File Forensics
- Password Cracking: Application Password Crackers, Log Capturing and Event Correlation
- Wireless Hacking: Investigating Network Traffic, Investigating Wireless Attacks, Investigating Web Attacks
- Mobile Hacking: Mobile Forensics.
4. ECSD Cybersecurity Team:
Essoka Cybersecurity Division (ECSD) services are furnished by a cyber team overly qualified in personal-business
organizational development and internationally certified in the following areas;
- Vulnerability Assessment and Penetration Testing (VAPT): Certified Network Defender (CND), Certified Ethical Hacker (CEH Master), Certified Penetration Testing Professional (CPENT), Licensed Penetration Tester (LPT)
- Cyber Forensics: Certified Network Defender (CND), Certified Ethical Hacker (CEH Master), Certified Threat Intelligence Analyst (CTIA), EC-Council Certified Incident Handler (ECIH), Computer Hacking Forensic Investigator (CHFI).
- Network Defense and Operations: Certified Network Defender (CND), Certified SOC Analyst (CSA), Certified Threat Intelligence Analyst (CTIA), EC-Council Certified Incident Handler (ECIH), EC-Council Disaster Recovery Professional (EDRP), Advanced Network Defense (CAST 614)
- Software Security: Certified Network Defender (CND), Certified Ethical Hacker (CEH Master), Certified Application Security Engineer .Net (CASE .Net), Certified Application Security Engineer Java (CASE Java), EC-Council Certified Security Analyst (ECSA), Licensed Penetration Tester (LPT Master).