MASTER IN CYBER SECURITY

EC-Council’s cybersecurity programs and credentials are organized into tracks to allow professionals to specialize in a particular domain or gain advancements with added recognition and skills, one after the other.

CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks. The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations.

CEH is the world’s most advanced ethical hacking course covering 20 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals.

IH Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system.  The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents.

Certified Network Defender Certification

The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyze the subject material. In addition, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans..

 

CND is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).

The purpose of the CND credential is to:

Validate the skills that will help the Network Administrators foster resiliency and continuity of operations during attacks.

About the Exam

Number of Questions: 100

Test Duration: 4 Hours

Test Format: Multiple Choice

CND (CERTIFIED NETWORK DEFENDER)

Computer Network and Defense Fundamentals

Network Security Threats, Vulnerabilities, and Attacks

Network Security Controls, Protocols, and Devices

Network Security Policy Design and Implementation

Physical Security

Host Security

Secure Firewall Configuration and Management

Secure IDS Configuration and Management

Secure VPN Configuration and Management

Wireless Network Defense

Network Traffic Monitoring and Analysis

Network Risk and Vulnerability Management

Data Backup and Recovery

Network Incident Response and Management

Certified Ethical Hacker Certification

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

About the Exam

Number of Questions: 125

Test Duration: 4 Hours

Test Format: Multiple Choice

Certified Ethical Hacker Certification

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  11. Session Hijacking
  12. Evading IDS, Firewalls, and Honeypots
  13. Hacking Web Servers
  14. Hacking Web Applications
  15. SQL Injection
  16. Hacking Wireless Networks
  17. Hacking Mobile Platforms
  18. IoT Hacking
  19. Cloud Computing
  20. Cryptography

Incident Handler 

HOW TO IDENTIFY AN INCIDENT

Handling Incidents

Need for Incident Response

Goals of Incident Response

Incident Response Plan

Purpose of Incident Response Plan

Requirements of Incident Response Plan

Preparation

Incident Response and Handling Steps

Step 1: Identification

Step 2: Incident Recording

Step 3: Initial Response

Step 4: Communicating the Incident

Step 5: Containment

Step 6: Formulating a Response Strategy

Step 7: Incident Classification

Step 8: Incident Investigation

Step 9: Data Collection

Step 10: Forensic Analysis

Step 11: Evidence Protection

Step 12: Notify External Agencies

Step 13: Eradication

Step 14: Systems Recovery

Step 15: Incident Documentation

Step 16: Incident Damage and Cost Assessment

Step 17: Review and Update the Response Policies

DURATION : 120 Hrs

GET GUIDANCE FROM EXPERT COUNSELORS


Get Guidance from Expert Counselors
close slider