Вы находитесь на странице: 1из 7

7 Bonus Courses

Our compilation of IT Security courses completes a 360 cycle by providing you with the knowledge that takes you from the very first steps of a Ethical Hacker or Penetration Tester all the way up-to that of a Digital Forensics Investigator. As a IT Security Engineer you are required to have such a broad depth of design, implement, and secure highly functional scalable solutions using a comprehensive security knowledge of LAN and WAN technologies. IT Security Engineer Career Track will show you how to manage, configure, scan, test, hack, and secure your own server and network systems. The intensive lab demonstrations gives each student in-depth knowledge and practical experience with the current security systems. Duties of an IT Security Engineer include the analysis of an organization's overall security risks and requirements, rating the importance of a company's products and offerings, and the related design, configuration, implementation and support of the information infrastructure to protect the business from potential security breaches. This role has overlap with that of a network engineer but is higher level in that it is a more specialized career.

1. Certified Penetration Testing Specialist / Certified Ethical Hacker / Backtrack


This course is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. Sequrit trainers keep abreast of their expertise by practicing what they teach because we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. The course presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to Hack -- the norm with the classes that have been available until now. Our course is developed based on

Copyright Sequrit 2009 All rights reserved.

principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets.

Upon completion, Certified Penetration Testing Specialist students will be able to confidently undertake the Certified Ethical Hacker (CEH 312-50 Self Study). Students will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever changing security environment. This course offers up-to-date proprietary laboratories that have been researched and developed by leading security professionals from around the world.

Module 1: Business and Technical Logistics of Penetration Testing Module 2: Information Gathering Module 3: Linux Fundamentals Module 4: Detecting Live Systems Module 5: Reconnaissance -- Enumeration Module 6: Cryptography Module 7: Vulnerability Assessments Module 8: Malware Software Goes Undercover Module 9: Hacking Windows Module 10: Advanced Vulnerability and Exploitation Techniques Module 11: Attacking Wireless Networks Module 12: Networks, Firewalls, Sniffing and IDS Module 13: Injecting the Database Module 14: Attacking Web Technologies

2. Computer Forensics Training - Digital Forensics and Electronic Discovery

Copyright Sequrit 2009 All rights reserved.

The dramatic increase in computer-related crime requires corporate security personnel and law enforcement agents to understand how to legally obtain electronic evidence stored in computers. Electronic records such as computer network logs, e-mails, word processing files, and .jpg picture files increasingly provide the government and corporations with important (and sometimes essential) evidence in criminal and civil cases.

One of the purposes of this training in Computer Forensics & Electronic Discovery is to provide law enforcement agents and corporate security personnel with systematic guidance that can help them understand some of the issues that arise when they seek electronic evidence in criminal and civil investigations.

Module 1 - Computer Forensic Incidents Computer Forensic Incidents Module 2 - Digital Incident Response Digital Incident Response Module 3 - OS / Disk Storage Concepts OS / Disk Storage Concepts Module 4 - Digital Acquisition & Analysis Tools Digital Acquisition & Analysis Tools Module 5 - Forensic Examination Protocols Forensic Examination Protocols Module 6 - Digital Evidence Protocols Digital Evidence Protocols Module 7 - Digital Evidence Presentation Digital Evidence Presentation

3. Computer Forensics Training - Advanced Digital Forensic Techniques


The dramatic increase in computer-related crime requires corporate security personnel and law enforcement agents to understand how to legally obtain electronic evidence stored in computers. Electronic records such as computer network logs, e-mails, word processing files, and .jpg picture files increasingly provide the government and corporations with important (and sometimes essential) evidence in criminal and civil cases.

Copyright Sequrit 2009 All rights reserved.

One of the purposes of this training in Computer Forensics & Electronic Discovery is to provide law enforcement agents and corporate security personnel with systematic guidance that can help them understand some of the issues that arise when they seek electronic evidence in criminal and civil investigations.

Module 1 - Computer Forensic Investigative Theory History of Digital Forensics Module 2 - Computer Forensic Laboratory Protocols Overview Module 3 - Computer Forensic Processing Techniques Goal of Digital Evidence Processing

Module 4 - Crypto and Password Recovery Background Module 5 - Specialized Artifact Recovery Overview

4. Certified Wireless Network Administrator (CWNA) Training


This course enables an individual to plan, select and implement the appropriate wireless hardware and deploy the correct security controls to support a typical environment. A focus on RF (radio frequency) technologies in a vendor neutral environment, with hands-on laboratories to reinforce concepts, allows participants the broadest exposure to key concepts. This course is committed to be the most current in the industry, with professionally developed laboratory exercises and real world hardware.

Upon completion, students will be able to confidently undertake the Planet3 Wireless CWNA examinations conducted at Thompson Prometric testing centers. Students will benefit from an in-depth course that is continuously updated to maintain and incorporate the rapidly changing wireless networking and security environment.

Module 1 - Overview of Wireless Standards & Organizations Module 2 - Radio Frequency Fundamentals Module 3 - Radio Frequency Components, Measurements and Mathematics

Copyright Sequrit 2009 All rights reserved.

Module 4 - Radio Frequency Signal and Antenna Concepts Module 5 - IEEE 802.11 Standards Module 6 - Wireless Networks and Spread Spectrum Technologies Module 7 - Wireless LAN Topologies Module 8 - Medium Access Module 9 - MAC Architecture Module 10 - Network Design, Implementation and Management Module 11 - Wireless Devices Module 12 - WLAN Trouble Shooting Module 13 - Network Security Architecture Module 14 - Wireless Attacks and Monitoring Module 15 - Radio Frequency Site Survey

5. DRBC Disaster Recovery & Business Continuity


This introductory DRS course has been built upon proven Disaster Recovery Planning and business continuity planning BCP methodologies. Our trainers keep up to date in the field by consulting as we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you as a student. The DRS course presents information on the latest risks and responses.

The class also enhances the business skills needed to identify protection opportunities, justify budget requests to optimize DR processes. Our course is developed on the generally accepted principals and uses the same methods and best practices. Its focus is professional DRBCP - Disaster Recovery & Business Continuity planning for protection of assets and human life.

Module 1 - Initiation and Project Management Module 2 - Risk Evaluation & Control

Copyright Sequrit 2009 All rights reserved.

Module 3 - Business Impact Analysis BIA Module 4 - Developing Strategies Module 5 - Emergency Preparedness and Response Module 6 - BC Plan Development and Implementation Module 7 - Awareness and Training Programs Module 8 - Maintenance Policies Module 9 - Crisis Communications Module 10 - Cyber Attacks Module 11 Pandemics

6. Security Awareness: End User Basic


Participants will fully understand the security threats that are prevailing daily and they will also understand the countermeasures associated with these attacks. Upon completion of this course, participants would realize the fact that they themselves are the first link in the security threat chain. Having acknowledged this fact, the participant is well placed to understand what can happen, what to look for and lastly how to utilize some basic and common sense tactics to keep their computer as safe as possible.

Module 1 - The Risk Overview Module 2 - User Security Module 3 - Implementing Countermeasures

7. Security Awareness: End User Advanced


Participants will fully understand the security threats that are prevailing daily and they will also understand the countermeasures associated with these attacks. Upon completion of this course, participants would realize the fact that the weakest link in any security program is a poorly trained employee. Having acknowledged this fact, the participant is

Copyright Sequrit 2009 All rights reserved.

well placed to understand how he can be an asset to the organization in respect of security assurance.

Module 1 - Introduction: The Importance of your Attendance Module 2 - Using the Internet @ Work Module 3 - Accessing the Companys Network Through Your Assigned PC Module 4 - Accessing the Corporate Network Remotely Module 5 - Protecting Your Companys Assets

Copyright Sequrit 2009 All rights reserved.

Вам также может понравиться