Cyber Security & Ethical Hacker Expert - Training Package (with CISA, CISSP, CISM, CHFI & CEH)Ealing Hammersmith and West London College
£ 200 - (239 €)
- Vocational qualification
The course includes all the materials needed to study towards obtaining the most recognised certifications in the industry: Certified Ethical Hacker (CEH) • Using enumeration to catalogue system resources and potential routes to breach. • Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks. • The role of social engineering to steal confidential information directly from employees. • Using sniffers and session hijacking to mask illegal access to system resources. • Web-based attacks that can take online systems down. • How wireless network security can be breached. • How hackers avoid protective measures like IDS, firewalls and honeypots. • Using cryptography and steganography to protect data. • How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate. Computer Hacking Forensic Investigator (CHFI) • How to carry out an investigation according to industry best practice principles and legal guidelines. • Searching and seizing resources as required for the investigation. • How to handle digital evidence to maintain legal standards. • What the first responder needs to do as soon as a breach is identified to prevent loss of evidence or failing to meet legal evidence requirements. • Acquiring and duplicating data • Using Access Data’s Forensic Toolkit (FTK), EnCase and special steps to review data whilst leaving all evidence intact. • Understanding steganography and how such techniques can be used to mask data theft. • Password recovery techniques and how to circumvent basic technologies employed to hide criminal activity. Certified Information Security Manager (CISM) • Information security management • How to develop an information security strategy. • Risk assessment methodologies • How to implement an info risk assessment process • Conversation of strategies into implementation plans • Integrating enterprise business objectives and info security policies • Security stakeholder education process • Components of incident response Certified Information Systems Auditor (CISA) • Internal control classifications • IT strategy • Information systems maintenance practices • Media disposal process • How to evaluate service level management practices • Network security devices and network components • Business continuity and disaster recovery regulations Certified Information Systems Security Professional (CISSP) • Accounts and identity management • Technical penetration testing • Layers of protection • Connectivity interfaces and applications • Digital signature overview • How to apply integrity controls • Types of encryption • Software OS and design • Data backup and control • Policy and program management
Flexible, interest-free, part payment options available.