All of the products in this accelerated e-learning programme include, the full self-paced course materials, the relevant exam voucher for each product and 6-months access to the EC-Council iLabs to practice.
This bundle consists of the following online courses:
- EC Council Certified Network Defender
- EC Council Certified Ethical Hacker
- EC Council Certified Hacking and Forensic Investigator
More details on course content is detailed below,
EC Council Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).
What will you learn in the CND online learning?
- Network security controls, protocols and devices
- Security policies for your organisation
- Choosing appropriate firewall solution, topology and configurations
- Risk and vulnerability assessment
- First response to a network security incident
A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
What will you learn in the CEH online learning?
- Key issues plaguing the information security world, incident management process, and penetration testing.
- Various types of foot printing, foot printing tools, and countermeasures.
- Network scanning techniques and scanning countermeasures.
- Enumeration techniques and enumeration countermeasures.
- System hacking methodology, steganography, steganalysis attacks, and covering tracks.
- Different types of Trojans, Trojan analysis, and Trojan countermeasures.
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
- Packet sniffing techniques and how to defend against sniffing.
- Social Engineering techniques, identify theft, and social engineering countermeasures.
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
- Session hijacking techniques and countermeasures.
- Different types of webserver attacks, attack methodology, and countermeasures.
- Different types of web application attacks, web application hacking methodology, and countermeasures.
- SQL injection attacks and injection detection tools.
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
- Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
- Various cloud computing concepts, threats, attacks, and security techniques and tools.
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
- Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
- Different threats to IoT platforms and learn how to defend IoT devices securely.
Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. In the event of a cyber-attack or incident, it is critical investigations be carried out in a manner that is forensically sound to preserve evidence in the event of a breach of the law. The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees a firm grasp on the domains of digital forensics.
What is covered in the CHFI online learning?
- Module 01: Computer Forensics in Today’s World
- Module 02: Computer Forensics Investigation Process
- Module 03: Understanding Hard Disks and File Systems
- Module 04: Data Acquisition and Duplication
- Module 05: Defeating Anti-forensics Techniques
- Module 06: Operating System Forensics (Windows, Mac, Linux)
- Module 07: Network Forensics
- Module 08: Investigating Web Attacks
- Module 09: Database Forensics
- Module 10: Cloud Forensics
- Module 11: Malware Forensics
- Module 12: Investigating Email Crimes
- Module 13: Mobile Phone Forensics
- Module 14: Forensics Report Writing and Presentation