Cyber Security & Ethical Hacker Expert - Training Package (with CISA, CISSP, CISM, CHFI & CEH)

Ealing Hammersmith and West London College
Online

£ 200 - (219 )

Informazioni importanti

Tipologia Vocational qualification
Metodologia Online
Inizio lezioni Flessible
  • Vocational qualification
  • Online
  • Inizio lezioni:
    Flessible
Descrizione

Master the skills needed to reach the highest levels of IT security professionalism and stand out from the crowd with this all-inclusive five course Cyber Security & Ethical Hacker Expert package.

Informazioni importanti
Quali sono gli obiettivi della formazione?

With this package the IT security world is truly your oyster. You can function in roles such as lead auditing manager, IT security architect and IT security consultant.

È la formazione giusta per me?

This package is for anyone who is looking to gain extensive, expert knowledge in IT security.

Requisiti: There are no pre-requisites for this course. In order to obtain certification for CISSP students must have at least five years of recent full-time professional work experience in at least 2 of the 8 CISSP domains.

Sedi

Dove e quando

Inizio Luogo
Flessible
Online
Inizio Flessible
Luogo
Online

Cosa impari in questo corso?

Information Systems
Network
Hacker
systems
Network Training
CISSP
CISA
Information security strategy
Risk assessment methodologies
Media disposal process

Programma

The course includes all the materials needed to study towards obtaining the most recognised certifications in the industry: Certified Ethical Hacker (CEH) • Using enumeration to catalogue system resources and potential routes to breach. • Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks. • The role of social engineering to steal confidential information directly from employees. • Using sniffers and session hijacking to mask illegal access to system resources. • Web-based attacks that can take online systems down. • How wireless network security can be breached. • How hackers avoid protective measures like IDS, firewalls and honeypots. • Using cryptography and steganography to protect data. • How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate. Computer Hacking Forensic Investigator (CHFI) • How to carry out an investigation according to industry best practice principles and legal guidelines. • Searching and seizing resources as required for the investigation. • How to handle digital evidence to maintain legal standards. • What the first responder needs to do as soon as a breach is identified to prevent loss of evidence or failing to meet legal evidence requirements. • Acquiring and duplicating data • Using Access Data’s Forensic Toolkit (FTK), EnCase and special steps to review data whilst leaving all evidence intact. • Understanding steganography and how such techniques can be used to mask data theft. • Password recovery techniques and how to circumvent basic technologies employed to hide criminal activity. Certified Information Security Manager (CISM) • Information security management • How to develop an information security strategy. • Risk assessment methodologies • How to implement an info risk assessment process • Conversation of strategies into implementation plans • Integrating enterprise business objectives and info security policies • Security stakeholder education process • Components of incident response Certified Information Systems Auditor (CISA) • Internal control classifications • IT strategy • Information systems maintenance practices • Media disposal process • How to evaluate service level management practices • Network security devices and network components • Business continuity and disaster recovery regulations Certified Information Systems Security Professional (CISSP) • Accounts and identity management • Technical penetration testing • Layers of protection • Connectivity interfaces and applications • Digital signature overview • How to apply integrity controls • Types of encryption • Software OS and design • Data backup and control • Policy and program management

Ulteriori informazioni

Flexible, interest-free, part payment options available.