Intro To Students - Cyber Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Over 1,200

Highly Qualified
Certified Instructors

w w w.e ccouncil.org
Your Learning Options

Instructor-led Training
facility in your city.

Course Description
Online Training Course Outline
iLearn online training is a distance learning program designed for those who cannot attend a live course. The program is for the people who have a very busy schedule and want to learn at their own
pace through self-study. This modality is also available from our enterprise teams.

Mobile Learning
Our world class content is also available on a mobile device, allowing our students to learn on the go. This program is designed for those who are cannot attend a live course, but are keen to improve
their cyber security skills. This modality is also available from our enterprise teams.

Computer-based Training
base iLearn program and are not sold independently. This modality is also available from our enterprise teams.

Key Outcomes Exam Information


Hands-on Experience with the EC-Council Cyber Range ( iLabs)
EC-Council iLabs allows students to dynamically access a host of virtual machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere. Our simplistic web portal enables
the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost-effective, easy to use, live range lab solution available. Most of our
courses are equipped with iLabs, but iLabs can be purchased independently as well.

Customized Learning
channel. Let us know where and when you want the training delivered, and we will arrange for an instructor and all that’s required for a course to be taught at a location of your choice. Contact our
accredited training partners for a custom solution.
EC-Council client-site training includes official courseware, certification exam (ECC-Exam or VUE), iLabs, online labs (wherever available), and our test-pass guarantee.

Live Online Training


With iWeek, an instructor will teach you live online while you are seated in the comfort of your home. This training method gives you the freedom to get trained from a location of your choice.
Individuals who choose this delivery method consistently attribute their choice to the preference of having a live instructor available for which questions can be asked and answered. We offer early-bird
rates, group rates, and get even private courses delivered anytime.

09
Foundation Track

Target
Audience

Course Description
CSCU ECSS
EC-Council Certified
Security Specialist
ECES
212-81
EC-Council Certified
Encryption Specialist
Course Outline
112-12 Computer User
This track focuses on todays’
computer users who use the internet
extensively to work, study and play.

What will You Learn


are Employed at:

KeyOutcomes
Key Outcomes Exam Information
Password Social Engineering Mitigating
Cloud Security Email Security Safe Browsing
Security Countermeasures Identity Theft

Data Protection Mobile Device Social Network Antiviruses


Physical Security Encryption
Security Security Protection

Mac

...
Disaster Credit Card Monitoring Kids Wireless & Home
Internet Security OS Security
Recovery Security Online Network Security

*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
07
10
Vulnerability Assessment & Penetration Testing (VAPT)

Job
ECSA Security Analyst LPT Licensed Penetration
Roles
(Practical) (Practical) (Master) Tester (Master)

Course Description
CEH ECSA
Course Outline
Hacker (Master) 412-79 Security Analyst - Information Security Analyst/Administrator
- Information Security Manager/Specialist
Track

- Information Systems Security


Engineer/Manager
CTIA - Security Analyst
312-38 312-85 Intelligence Analyst

- Information Security Auditors


- Risk/Vulnerability Analyst

* B e s p o k e m o d u l e s a v a i l a b l e f o r e n t e r p r i s e s

are Employed at:


Key Outcomes Exam Information
Graduate Certificate in
Academic
Track

Incident Management and


Business Continuity
*Additional University courses/pre-requisites may be required.

CORE ADVANCED EXPERT

This track maps to NICE’s Specialty Areas:


1. Protect and Defend (PR) Support (INF) 2. Securely Provision (SP)
a. Cybersecurity c. Incident Response (IR) a. Test and Evaluation
Defense Analysis (DA) d. Vulnerability 3. Analyze (AN)
b. Cybersecurity Assessment and a. Threat Analysis (TA)
Defense Infrastructure Management (VA) b. Exploitation Analysis (XA)

*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
08
11
Job
Roles

Course
CEHDescription
Certified Ethical Course Outline
(MASTER) Hacker (Master)

CTIA Certified Threat


312-85 Intelligence Analyst
312-38

* B e s p o k e m o d u l e s a v a i l a b l e f o r e n t e r p r i s e s

Key Outcomes Exam Information


Graduate Certificate in Digital
Forensics, Incident Management
and Business Continuity
* Additional University courses/pre-requisites may be required.

...
*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
12
Course Description Course Outline
CSA Certified SOC Analyst
312-39

312-38

CTIA
312-85 Intelligence Analyst

Key Outcomes Exam Information


Graduate Certificate in
Incident Management and
Business Continuity
*Additional University courses/pre-requisites may be required.

...
*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
13
Job
Roles
ECSA EC-Council Certified LPT Licensed Penetration
412-79 Security Analyst (MASTER) Tester (Master)

Course Description Course Outline


Certified Application
CASE Java Security Engineer
312-96 Java

CEH
Hacker (Master)
Certified Application
CASE .Net Security Engineer
312-95 .Net

312-38

Our Certified Software Security Professionals


are Employed at:

Key Outcomes Exam Information


Graduate Certificate in
Information Security
Professional, Security Analyst

This Track Maps to NICE’s Specialty Areas:


1. Securely Provision 3. Oversee and Govern (OV) 5. 5. Analyze (AN)
a. Software Development (DEV) a. Cybersecurity Management (MG) a. Analyzes collected information to identify
b. Technology (RD) 4. Protect and Defend (PR) vulnerabilities and potential for exploitation.
2. Operate and Maintain (0M)
a. Data Administration (DA)
b. Systems Analysis (AN)
a. Cybersecurity Defense
Analysis (DA)
b. Vulnerability Assessment and
...
Management (VA)

*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
14
Domain

Strategic Planning,
5 1 Domain
Job
Roles
Finance, & Vendor Governance
Course Description
Management Course Outline
- Information Security (IS) Director
- Information Assurance (IA) Program
Manager

2
TM

4 C CISO
Domain
Domain

Certified Chief Information Security Officer


Security Risk CCISO Professionals
Information Management, are Employed at:
Security Controls,
Core 712-50 & Audit
Competencies Management Graduate Certificate in:
Key Outcomes Exam Information

3
- Information Security
Professional
Domain - Executive Leadership in
Information Assurance
Security Program
Management & Operations

This Track Maps to NICE’s Specialty Areas:


e. Executive Cybersecurity
1. Securely Provision (SP)
b. Training, Education, and Leadership (EX)
a. Risk Management (RM)
Awareness (ED) f. Acquisition and Program/Project
b. Technology R&D (RD)
c. Cybersecurity Management (PM)
c. Systems Requirements
...
Management (MG) 3. Collect and Operate (CO)
Planning (RP)
d. Strategic Planning and a. Cyber Operational Planning (PL)
2. Oversee and Govern (OV)
Policy (PL)
a. Legal Advice and Advocacy (LG)

*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
15
Course Description Course Outline

Key Outcomes Exam Information

w w w.e ccouncil.org
41

You might also like