Академический Документы
Профессиональный Документы
Культура Документы
Our compilation of IT Security courses completes a 360 cycle by providing you with the knowledge that takes you from the very first steps of a Ethical Hacker or Penetration Tester all the way up-to that of a Digital Forensics Investigator. As a IT Security Engineer you are required to have such a broad depth of design, implement, and secure highly functional scalable solutions using a comprehensive security knowledge of LAN and WAN technologies. IT Security Engineer Career Track will show you how to manage, configure, scan, test, hack, and secure your own server and network systems. The intensive lab demonstrations gives each student in-depth knowledge and practical experience with the current security systems. Duties of an IT Security Engineer include the analysis of an organization's overall security risks and requirements, rating the importance of a company's products and offerings, and the related design, configuration, implementation and support of the information infrastructure to protect the business from potential security breaches. This role has overlap with that of a network engineer but is higher level in that it is a more specialized career.
principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets.
Upon completion, Certified Penetration Testing Specialist students will be able to confidently undertake the Certified Ethical Hacker (CEH 312-50 Self Study). Students will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever changing security environment. This course offers up-to-date proprietary laboratories that have been researched and developed by leading security professionals from around the world.
Module 1: Business and Technical Logistics of Penetration Testing Module 2: Information Gathering Module 3: Linux Fundamentals Module 4: Detecting Live Systems Module 5: Reconnaissance -- Enumeration Module 6: Cryptography Module 7: Vulnerability Assessments Module 8: Malware Software Goes Undercover Module 9: Hacking Windows Module 10: Advanced Vulnerability and Exploitation Techniques Module 11: Attacking Wireless Networks Module 12: Networks, Firewalls, Sniffing and IDS Module 13: Injecting the Database Module 14: Attacking Web Technologies
The dramatic increase in computer-related crime requires corporate security personnel and law enforcement agents to understand how to legally obtain electronic evidence stored in computers. Electronic records such as computer network logs, e-mails, word processing files, and .jpg picture files increasingly provide the government and corporations with important (and sometimes essential) evidence in criminal and civil cases.
One of the purposes of this training in Computer Forensics & Electronic Discovery is to provide law enforcement agents and corporate security personnel with systematic guidance that can help them understand some of the issues that arise when they seek electronic evidence in criminal and civil investigations.
Module 1 - Computer Forensic Incidents Computer Forensic Incidents Module 2 - Digital Incident Response Digital Incident Response Module 3 - OS / Disk Storage Concepts OS / Disk Storage Concepts Module 4 - Digital Acquisition & Analysis Tools Digital Acquisition & Analysis Tools Module 5 - Forensic Examination Protocols Forensic Examination Protocols Module 6 - Digital Evidence Protocols Digital Evidence Protocols Module 7 - Digital Evidence Presentation Digital Evidence Presentation
One of the purposes of this training in Computer Forensics & Electronic Discovery is to provide law enforcement agents and corporate security personnel with systematic guidance that can help them understand some of the issues that arise when they seek electronic evidence in criminal and civil investigations.
Module 1 - Computer Forensic Investigative Theory History of Digital Forensics Module 2 - Computer Forensic Laboratory Protocols Overview Module 3 - Computer Forensic Processing Techniques Goal of Digital Evidence Processing
Module 4 - Crypto and Password Recovery Background Module 5 - Specialized Artifact Recovery Overview
Upon completion, students will be able to confidently undertake the Planet3 Wireless CWNA examinations conducted at Thompson Prometric testing centers. Students will benefit from an in-depth course that is continuously updated to maintain and incorporate the rapidly changing wireless networking and security environment.
Module 1 - Overview of Wireless Standards & Organizations Module 2 - Radio Frequency Fundamentals Module 3 - Radio Frequency Components, Measurements and Mathematics
Module 4 - Radio Frequency Signal and Antenna Concepts Module 5 - IEEE 802.11 Standards Module 6 - Wireless Networks and Spread Spectrum Technologies Module 7 - Wireless LAN Topologies Module 8 - Medium Access Module 9 - MAC Architecture Module 10 - Network Design, Implementation and Management Module 11 - Wireless Devices Module 12 - WLAN Trouble Shooting Module 13 - Network Security Architecture Module 14 - Wireless Attacks and Monitoring Module 15 - Radio Frequency Site Survey
The class also enhances the business skills needed to identify protection opportunities, justify budget requests to optimize DR processes. Our course is developed on the generally accepted principals and uses the same methods and best practices. Its focus is professional DRBCP - Disaster Recovery & Business Continuity planning for protection of assets and human life.
Module 1 - Initiation and Project Management Module 2 - Risk Evaluation & Control
Module 3 - Business Impact Analysis BIA Module 4 - Developing Strategies Module 5 - Emergency Preparedness and Response Module 6 - BC Plan Development and Implementation Module 7 - Awareness and Training Programs Module 8 - Maintenance Policies Module 9 - Crisis Communications Module 10 - Cyber Attacks Module 11 Pandemics
Module 1 - The Risk Overview Module 2 - User Security Module 3 - Implementing Countermeasures
well placed to understand how he can be an asset to the organization in respect of security assurance.
Module 1 - Introduction: The Importance of your Attendance Module 2 - Using the Internet @ Work Module 3 - Accessing the Companys Network Through Your Assigned PC Module 4 - Accessing the Corporate Network Remotely Module 5 - Protecting Your Companys Assets