What are the objectives of this course?
The course includes all the materials needed to study towards obtaining the most recognized certifications in the industry: Certified Ethical Hacker (CEH)
- Using enumeration to catalogue system resources and potential routes to breach.
- Automated tools for breaching security including Trojans, backdoors, viruses, worms, and Denial of Service (DOS) attacks.
- The role of social engineering to steal confidential information directly from employees.
- Using sniffers and session hijacking to mask illegal access to system resources.
- Web-based attacks that can take online systems down.
- How wireless network security can be breached.
- How hackers avoid protective measures like IDS, firewalls, and honeypots.
- Using cryptography and steganography to protect data.
- How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate.
Computer Hacking Forensic Investigator (CHFI)
- How to carry out an investigation according to industry best practice principles and legal guidelines.
- Searching and seizing resources as required for the investigation.
- How to handle digital evidence to maintain legal standards.
- What the first responder needs to do as soon as a breach is identified to prevent loss of evidence or failing to meet legal evidence requirements.
- Acquiring and duplicating data
- Using Access Data’s Forensic Toolkit (FTK), EnCase and special steps to review data whilst leaving all evidence intact.
- Understanding steganography and how such techniques can be used to mask data theft.
- Password recovery techniques and how to circumvent basic technologies employed to hide criminal activity.
Certified Information Security Manager (CISM)
- Information security management
- How to develop an information security strategy.
- Risk assessment methodologies
- How to implement an info risk assessment process
- Conversation of strategies into implementation plans
- Integrating enterprise business objectives and info security policies
- Security stakeholder education process
- Components of incident response
Certified Information Systems Auditor (CISA)
- Internal control classifications
- IT strategy
- Information systems maintenance practices
- Media disposal process
- How to evaluate service level management practices
- Network security devices and network components
- Business continuity and disaster recovery regulations
Certified Information Systems Security Professional (CISSP)
- Accounts and identity management
- Technical penetration testing
- Layers of protection
- Connectivity interfaces and applications
- Digital signature overview
- How to apply integrity controls
- Types of encryption
- Software OS and design
- Data backup and control
- Policy and program management
Who is it intended for?
This package is for anyone who is looking to gain extensive, expert knowledge in IT security.
There are no pre-requisites for this course. In order to obtain certification for CISSP students must have at least five years of recent full-time professional work experience in at least 2 of the 8 CISSP domains.
What marks this course apart?
With this package, the IT security world is truly your oyster. You can function in roles such as lead auditing manager, IT security architect and IT security consultant.
What happens after requesting information?
Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require.
This school offers programs in:
Last updated November 21, 2017