Академический Документы
Профессиональный Документы
Культура Документы
international
software
company
focused
on
the
development
of
organizations,
financial
institutions,
state
and
local
knowledge.
FORESEC
certification
is
reflection
of
personal
knows
the
worldwide
information
security
consulting
will
be.
Our
credibility
as
consultants
hinges
on
that
deterrent,
preventive,
detective,
recovery,
and
Module Topics:
Module 0: Course Overview
Module 1: Security Management Practices
Module 2: Access Control
Module 3: Cryptography
Module 4: Physical Security
Module 5: Security Architecture and Models
Module 6: Legal and Compliance
Module 7: Telecommunications and Network
Module 8: Business Continuity Objectives
Module 9: Application and System Development
Module 10: Operations Security
2. Foresec Certified Computer Hacking (FCCH)
FCCHs foundation is built firmly upon proven, hands-on, Penetration
Testing
methodologies
utilized
by
our
international
group
of
transfer
to
you,
the
student.
The
FCCH
presents
course
material
reflects
Backtrack
and
advanced
deliverables are
each
and
every
technique
and
template
available.
or
defend
cases
such
as
terrorist
activates,
illegal
Module Topics:
Module 1: Introduction to Computer Crime
Module 2: Disk Storage Concepts
Module 3: Forensic Examination
Module 4: Electronic Discovery and Digital Evidence
Module 5: Specialized Examination Tools
Module 6: Seizure Concepts
Module 7: Forensic Examination
Module 8: Advanced Artifact Recovery
Module 9: Crypto and Password Recovery
Module 10: Specialized Digital Media Analysis and Recovery
Module 11: Cyber-terrorism and Internet Investigations
Module 12: Electronic Discovery, Acquisition and Analysis Laboratory
Module 13: Documenting and Reporting Digital Evidence
Module 14: Presentation of Digital Evidence
What Are The Benefits :
FORESEC
is
non-profit
organization
and
mostly
the
international
Assurance
of
graduates
through
competency-based
certification process.
6. Expand study and thinking perspective into global horizon
Areas of Partnership:
1. Skills Certification in Computer Security and Forensic.
2. Quality Content Development
3. Faculty and Staff Training Programmes
How Are The Processes Of ICCP :
1. Submitting Partners Institutions General Profile to FORESEC
To begin the partnership process, it is requirement that FORESEC
knows the partner institutions profile in general, e.g. background of
institution, human resources, physical facilities, etc. An institution
facilities,
number
of
students,
procedures
on
2. Validation Visit
After the completion of the profile review and the signing of
Memorandum of Understanding (MOU), FORESEC will validate or visit
the prospect institution at a stipulated date, if necessary. Partners
institution will have to complete a documentation requirement i.e.
Partners Institutions Profile Form.
Items required to be completed:
MOU Signed
3. MOA signing
MOA is required to be signed prior to the detailed implementation of
the developed curriculum. This process is critical to protect FORESEC
intellectual property.
4. Training of Lecturers
After the Memorandum of Agreement (MOA) is signed, the initial
training can commence. The execution of the partnership programme
starts by training the lecturers into running and teaching the updated
curriculum. Here, lecturers will be taught using as much as possible for
Computer Security and Forensic technologies and up-to-date teaching
techniques, and/or FORESEC standardized training modules.
More
(based
on
the
agreement)
and
this
is
will
take
MOA signed
Training completed
satisfactorily
with
or
grade,
competency
Certificate
of