Top Banner

of 24

CFSI - Course Brochure - 2011

Apr 05, 2018

Download

Documents

Indra Parasram
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/2/2019 CFSI - Course Brochure - 2011

    1/24

    CFSI

    Computer Forensics and Security Institute

    Course Brochure 2011

    [email protected]

    1-868-684-0029

    CFSI is a registered company and an ATC (Authorised Training Centre) for the Ec-Council

    mailto:[email protected]:[email protected]
  • 8/2/2019 CFSI - Course Brochure - 2011

    2/24

    Computer Forensics and Security Institute

    2

    ContentsCompTIA A+ and Computer Repairs .......................................................................................... 3

    CompTIA Network+ ................................................................................................................... 4

    CompTIA Security+ ................................................................................................................... 6

    CompTIA Linux+ ....................................................................................................................... 7

    CompTIA Server+ ...................................................................................................................... 8

    Cisco Certified Network Associate (CCNA) ............................................................................... 9

    Certified Wireless Network Associate (CWNA)........................................................................ 11

    Microsoft Certified Technology Specialist (MCTS): Windows 7 Configuration ........................ 12

    Certified Information Systems Auditor (CISA) ......................................................................... 13

    Certified Information Systems Manager (CISM) ....................................................................... 14

    Certified internet Webmaster (CIW) Professional ..................................................................... 16

    CIW Web Security Associate .................................................................................................... 17

    Certified Ethical Hacker (CEH) Version 7.............................................................................. 18

    Computer Hacking Forensic Investigator (CHFI) Version 4 ................................................... 20

    Ec-Council Certified Systems Analyst (ECSA) Version 4 ...................................................... 22

    Upcoming Courses .................................................................................................................... 24

  • 8/2/2019 CFSI - Course Brochure - 2011

    3/24

    Computer Forensics and Security Institute

    3

    CompTIA A+ and Computer Repairs

    The CompTIA A+ certification is the industry standard for computer supporttechnicians. The international, vendor-neutral certificat ion proves competence in areas such asinstallation, preventative maintenance, networking, security and troubleshooting. CompTIA A+certified technicians also have excellent customer service and communication skills to workwith clients. CompTIA A+ is part of the certification track for corporations such as Microsoft,Hewlett- Packard, Cisco and Novell.

    Course Outline:

    Introduction to Computers Understanding Electronic Communication An Overview of the Personal Computer The Central Processing Unit Power Supplies Motherboard and ROM BIOS Memory Expansion Buses, Cables, and Connectors Basic Disk Drives Advanced Disk Drive Technology The Display System Printers Portable Computers Connectivity and Networking Telecommunications: Modems and the Internet Operating System Fundamentals Introducing and Installing Microsoft Windows Running Microsoft Windows Maintaining the Modern Computer Upgrading a Computer Troubleshooting Techniques and Client Relations The Basics of Electrical Energy

    Pre-requisites: Working knowledge of Windows and the Internet.

    Contact Hours: 80

    Who Should Attend: Computer Enthusiasts working towards being Certified ComputerTechnicians.

  • 8/2/2019 CFSI - Course Brochure - 2011

    4/24

    Computer Forensics and Security Institute

    4

    CompTIA Network+

    The CompTIA Network+ certification is the sign of a competent networking professional.It is an international, vendor-neutral certification that proves a technicians competency inmanaging, maintaining, troubleshooting, installing and configuring basic networkinfrastructure. Microsoft includesCompTIA Network+ in their Microsoft Certified Systems Administrator (MCSA) program,and other corporations such as Novell, Cisco and HP also recognize CompTIA Network+as part of their certification tracks.

    Course Outline:

    Introduction to Networks Common Networking Protocols and Ports TCP/IP Addressing Routing Concepts Routing Protocols Cables and Connectors Physical Network Topologies Wiring Distribution Components LAN Technologies WAN Technologies Wireless Technology

    Network Devices , Configuration and Management Network Monitoring and Optimization Network Troubleshooting Methodologies Common Network Troubleshooting Issues Network Scanners Firewalls IPSec VPN Tunnelling and Encryption Remote Access User Authentication Device Management Security

    Common Threats and Mitigation Hardware Tools

    Pre-requisites: Working knowledge of Windows and the Internet.

    Contact Hours: 42

  • 8/2/2019 CFSI - Course Brochure - 2011

    5/24

    Computer Forensics and Security Institute

    5

    Who Should Attend: Computer Enthusiasts, Computer Technicians and persons interested inmoving on towards being Network Administrators.

  • 8/2/2019 CFSI - Course Brochure - 2011

    6/24

    Computer Forensics and Security Institute

    6

    CompTIA Security+

    The CompTIA Security+ certification designates knowledgeable professionals in thefield of security, one of the fastest-growing fields in IT. Security+ is an international,vendor- neutral certificat ion that proves competency in system security, networkinfrastructure, access control and organizat ional security.

    Security threats are increasing in number and severity, and the gap between the need forsecurity professionals and qualified IT personnel is the largest of any IT specialty, according toa 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain orincrease their investment in security. Major organizations that employ CompTIA Security+certified staff include Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh,Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U.S. Navy, Army, Air Force

    and Marines.

    Course Outline:

    Introduction to and the need for Security Evaluating Common Security Threats Operating System Hardening Application Security Implementing Security Applications Network Infrastructure Attacks

    Network Design Elements and Components Network Security Tools Wireless Network Security Access Control Assessments and Audits (Part 1) General Cryptography Concepts Cryptography Algorithms and Protocols Public Key Infrastructure (PKI) Organizational Security

    Pre-requisites: Basic Networking and an Understanding of the OSI Model.

    Contact Hours: 36

    Who Should Attend: Computer and Network Technicians and persons interested in movingon towards being Network and/or Security Administrators.

  • 8/2/2019 CFSI - Course Brochure - 2011

    7/24

    Computer Forensics and Security Institute

    7

    CompTIA Linux+

    CompTIA Linux+ Powered by LPI is a high-stakes, vendor-neutral certification thatvalidates the fundamental knowledge and skills required of junior Linux

    administrators.

    Linux+ covers the Linux system architecture, Linux installation and package management,GNU and UNIX commands, devices, Linux file systems and the File system HierarchyStandard. On completion of the course, the student will be able work at the Linux commandline, perform maintenance tasks, assist users, and install and configure Linux workstations.

    Course Outline:

    Introduction to Using Linux Planning your installation Pre-installation Hardware Considerations Installation of Linux Installing and Updating Software in Linux User Administration in Linux Administration of File systems and Security Administration of Networks in Linux Linux Essentials Configuring Printing and File Sharing

    Configuration Files and Related Topics Maintenance of a Linux System Troubleshooting Problems in a Linux System Troubleshooting in Linux Hardware issues in Linux Multimedia in Linux Introduction to sed and awk Security issues Printing and Mail

    Pre-requisites: Network+ is an asset but not mandatory as long as the student has a working

    knowledge of networks.

    Contact Hours: 36

    Who Should Attend: Computer and Network Technicians and persons interested in movingon towards being Junior Linux Administrators, Network and/or Security Administrators.

  • 8/2/2019 CFSI - Course Brochure - 2011

    8/24

    Computer Forensics and Security Institute

    8

    CompTIA Server+

    CompTIA Server+ certifies the technical knowledge and skills required to build, maintain,troubleshoot and support server hardware and software technologies. This course also coversvirtualization, disaster recovery and security procedures.

    Course Outline:

    Introduction to Servers Server Roles System Board Types Server Chassis Types

    Memory Features Processor Features Expansion Cards NOS Installation, Configuration, Deployment and Security NOS Management Features Server Virtualization Networking Essentials Server RAID Internal and External Storage Technologies Documentation and Best Practices Environmental Controls and Location

    Server Access Methods Physical Security Measures Backup and Restore Replication, Retention, and Disposition Disaster Recovery Steps Troubleshooting and Methodology Hardware, Software and Network Troubleshooting and Tools Troubleshooting Storage Issues

    Pre-requisites: A+ and Network+ are assets but not mandatory as long as the student has aworking knowledge of computer and network technologies.

    Contact Hours: 36

    Who Should Attend: Technical Support Professionals and Computer and NetworkTechnicians as well as persons interested in moving on towards being Network Administrators.

  • 8/2/2019 CFSI - Course Brochure - 2011

    9/24

    Computer Forensics and Security Institute

    9

    Cisco Cer tified Networ k Associate (CCNA)

    The Cisco Certified Network Associate (CCNA) certification validates your skills andknowledge required to deploy, maintain, secure and operate a medium-sized network using

    Cisco technologies. CCNA certified professionals can install, configure and operate LAN,

    WAN and dial access services for small networks.

    Students will gain the knowledge and skills required to install, operate, and troubleshoot a

    small to medium size enterprise branch network, including connecting to a WAN;

    implementing network security; network types; network media; routing and switching

    fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and

    configuring IOS devices; extending switched networks with VLANs; determining IP routes;

    managing IP traffic with access lists; establishing point-to-point connections; and establishingFrame Relay connections.

    Course Outline: The OSI Model and its Layers in everything networking. TCP/IP: TCP and UDP Communication, Addressing and Ports Understanding LAN Switches Working with the Cisco Switch IOS Initial Setup of a Cisco Switch Configuring Switch Security

    Optimizing and Troubleshooting Switches Understanding Wireless Networking Wireless Security and Implementation Advanced TCP/IP: IP Subnetting Initial Router Configuration SDM and DHCP Server Configuration Implementing Static and Dynamic Routing Internet Access with NAT and PAT WAN Connectivity Telnet, SSH, and CDP Management and Security: File Management

    Understanding Trunks and VTP Configuring VLANs Switch STP: Understanding the Spanning-Tree Protocol General Switching: Troubleshooting and Security Best Practices Understanding VLSM Distance Vector vs. Link State OSPFC Concepts

  • 8/2/2019 CFSI - Course Brochure - 2011

    10/24

    Computer Forensics and Security Institute

    10

    OSPFC Configuration and Troubleshooting EIGRP Concepts and Configuration Access-Lists: The Rules of the ACL Access-Lists: Configuring ACLs Command Line NAT Configuration

    Concepts of VPN Technology Configuring Frame Relay

    Pre-requisites: Network+ and a thorough understanding of the OSI model. Security+ is anasset but not mandatory.

    Contact Hours: 42-50

    Who Should Attend: Computer and Network Technicians and Administrators as well aspersons interested in moving on towards becoming Network Administrators andProfessionals.

  • 8/2/2019 CFSI - Course Brochure - 2011

    11/24

    Computer Forensics and Security Institute

    11

    Certified Wireless Network Associate (CWNA)

    The CWNA certification can get you started in your wireless career by ensuring you have theskills to successfully administer enterprise-class wireless LAN.

    Students will gain a working knowledge of Radio Frequency (RF) Technologies, AntennaConcepts, Wireless LAN Hardware and Software, Network Design, Installation, andManagement, Wireless Standards and Organizations, 802.11 Network Architecture, WirelessLAN Security, Performing Site Surveys and Troubleshooting.

    Course Outline:

    Revisiting the Wireless LAN Radio Frequency (RF) Fundamentals Spread Spectrum Technology Wireless LAN Infrastructure Devices Wireless LAN Antennas Wireless LAN Accessories Wireless LAN Organizations and Standards 802.11 Network Architecture MAC and Physical Layers Troubleshooting Wireless LAN Installations Wireless LAN Security

    Site Survey Fundamentals Site Survey Equipment and Procedures Radio Frequency (RF) Fundamentals Spread Spectrum Technology Wireless LAN Infrastructure Devices Wireless LAN Organization and Standards Wireless LAN Security - Wireless Network Management Systems WLAN Deployment and Vertical Markets PoE, HT, and 802.11n

    Pre-requisites: Network+ or 8 months networking experience.

    Contact Hours: 36

    Who Should Attend: Computer and Network Technicians and Administrators as wellas persons interested in moving on towards becoming Wireless NetworkAdministrators and Professionals.

  • 8/2/2019 CFSI - Course Brochure - 2011

    12/24

    Computer Forensics and Security Institute

    12

    Micros oft Cer tified Techn ology Spe cialist (MCTS): Wind ows 7

    Configuration

    In this course, students will install, deploy, and upgrade to Windows 7, ensure hardware andsoftware compatibility and configure pre-installation and post-installation system settings.

    Students will gain hands-on experience in Windows security features, network connectivityapplications included with Windows 7, and mobile computing. This includes being able tomaintain systems, monitor and resolve performance and reliability issues using the GUI as wellas the Windows PowerShell.

    Course Outline:

    Installation, Upgrading and Migration Creating, Capturing and Deploying an Image Configuring a VHD Configuring Devices Managing Disks Managing Applications Application Restrictions Internet Explorer IPv4 Networking IPv6 Networking

    Wireless Networking Windows Firewall Remote Administration Accessing Resources Authentication and User Account Control Remote Access Mobile Computing Monitoring Systems Configuring Performance Windows Updates Backup and Recovery

    Pre-requisites: Network+.

    Contact Hours: 30

    Who Should Attend: Computer and Network Technicians as well as persons interested inmoving on towards becoming Network Administrators and Networking Professionals.

  • 8/2/2019 CFSI - Course Brochure - 2011

    13/24

    Computer Forensics and Security Institute

    13

    Cer tified Informat ion System s Aud itor (CISA)

    The skills and practices that CISA promotes and evaluates are the building blocks of success inthe field. Possessing the CISA demonstrates proficiency and is the basis for measurement in theprofession. With a growing demand for individuals possessing IS audit, control and securityskills, CISA has become a preferred certification program by individuals and organizationsaround the world.

    Course Outline:

    The IS Audit Process. Information Security Policies.

    Computer Assisted Audit Technique (CAAT) and Control Self-Assessment (CSA)Framework.

    Information Technology Governance. Risk Management Processes and Risk Analysis Methods. Project Management Practices, Tools and Control Frameworks. Organizational Change Management, IS Quality and Performance management. Systems and Infrastructure Life Cycle Management. Infrastructure Development Acquisition and IS Maintenance Methods. Application Controls and Auditing. Application developing, acquiring and maintaining business application systems. IT Service Delivery and Support.

    IS operation and Hardware, Hardware Management and IS architecture Incident and Problem Management Practices Information Security Management Network Infrastructure Security Attack Methods and Techniques Protection of Information Assets. Disaster Recovery and Business Continuity.

    Pre-requisites: Training in Network+, Security+ and MCTS or equivalent.

    Contact Hours: 30

    Who Should Attend: Networking Professionals who wish to expand into the lucrative andin-demand field of Network Security and Auditing.

  • 8/2/2019 CFSI - Course Brochure - 2011

    14/24

    Computer Forensics and Security Institute

    14

    Cer tified Informat ion Syste ms Man ager (CISM)

    The management-focused CISM is a unique certification for individuals who design, build andmanage enterprise information security programs. The CISM certification promotesinternational practices and individuals earning the CISM become part of an elite peer network,attaining a one-of-a-kind credential.

    Although certification may not be mandatory for you at this time, a growing number oforganizations are recommending that employees become certified. To help ensure success inthe global marketplace, it is vital to select a certification program based on universally acceptedtechnical practices.

    Course Outline:

    Submitting Required Paperwork Asset Identification Risk Assessment Vulnerability Assessments Asset Management, Classification and Ownership Structured Information Risk Assessment Process Change Management Information Security Strategy Development of Information Security Architectures

    Security Awareness, Training, and Education Communication and Maintenance of Standards, Procedures, and Other Documentation Security Metrics Security Program Management Overview Security Baselines Security Program Infrastructure Security Impact on Users Accountability Response Management Overview Importance of Response Management Performing a Business Impact Analysis

    Developing Response and Recovery Plans The Incident Response Process Implementing Response and Recovery Plans Response Documentation Post-Event Reviews

    Pre-requisites: Training in Network+, Security+ and MCTS or equivalent.

  • 8/2/2019 CFSI - Course Brochure - 2011

    15/24

    Computer Forensics and Security Institute

    15

    Contact Hours: 36

    Who Should Attend: Networking and Security Professionals who wish to advance theircareer into IT Managerial Positions.

  • 8/2/2019 CFSI - Course Brochure - 2011

    16/24

    Computer Forensics and Security Institute

    16

    Cer tified inte rnet Webma ster (CIW) Pr ofessional

    Course Outline:

    LEVEL 1 (3 parts):

    The CIWInternet Business Foundations course prepares you to work effectivelyin today's business environment. In this course, you will learn about the tasksinvolved in various Web Technology job roles, and you will learn the skills andtechnologies to perform them.

    The CIW Site Development Foundations course teaches you essential Web pagedevelopment skills and ways to work as a productive part of a Web site

    development team.

    TheNetwork Technology Foundations course prepares you for job readiness in manybusiness

    and technology-related careers. Understanding the fundamentals of networking, Internetprotocols and network security is important for all professionals who use the Internet.

    LEVEL 2 (2 parts):

    The CIW Web Design Specialistcourse is for the individual who wants to developthe skills necessary to specialize in Web site design.

    Creating pages using popular production tools, including Microsoft Frontpage,Expression Web, and Adobe Dreamweaver, Fireworks and Flash.

    Design and development technologies, including Cascading Style Sheets (CSS)

    CSS, XHTML, and XML Essentials

    Web Site Management and Planning

    Web Site Copyright and Legal Issues

    Pre-requisites: Must have a working knowledge and understanding of the Internet.

    Contact Hours: 42

    Who Should Attend: Persons interested in Webpage and Website design.

  • 8/2/2019 CFSI - Course Brochure - 2011

    17/24

    Computer Forensics and Security Institute

    17

    CIW Web Secur ity Associat e

    The CIWNetwork Security and Firewalls course teaches you how to secure your network fromunauthorized activity. This course teaches you about security principles, such as establishing aneffective security policy, and about the different types of hacker activities that you are mostlikely to encounter. Individuals with these security skills can pursue or advance careers in manyaspects of online and network security.

    Course Outline:

    Network Security Background Elements of Security

    Applied Encryption Network Attack Categories Brute-Force and Dictionary Attacks System Bugs and Back Doors Malware (Malicious Software) Social Engineering Attacks Denial-of-Service (DOS) Attacks Distributed Denial-of-Service (DDOS) Attacks Spoofing Attacks Scanning Attacks

    Man-in-the-Middle Attacks Bots and Botnets Importance of Response Management Recent Network Vulnerability Considerations General Security Principles Protocol Layers and Security Securing Resources Firewalls and Virtual Private Networks Levels of Firewall Protection Detecting and Distracting Hackers Incident Response

    Pre-requisites: Security+

    Contact Hours: 24

    Who Should Attend: Persons interested in Internet and Intranet Security.

  • 8/2/2019 CFSI - Course Brochure - 2011

    18/24

    Computer Forensics and Security Institute

    18

    Cer tified Eth ical Hacker (CEH) Ver sion 7

    To beat a hacker, you need to think like one! This is exactly what this class will teach you. It isthe pinnacle of the most desired information security training program any informationsecurity professional will ever want to be in.

    This class will immerse the students into a hands-on environment where they will be shownhow to conduct ethical hacking. They will be exposed to an entirely different way ofachieving optimal information security posture in their organization; by hacking it! Theywill scan, test, hack and secure their own systems.

    Course Outline:

    Module 01: Introduction to Ethical HackingModule 02: Foot printingModule 03: ScanningModule 04: EnumerationModule 05: System HackingModule 06: TrojansModule 07: Viruses/WormsModule 08: SniffersModule 09: Social EngineeringModule 10: Denial-of-Service

    Module 11: Session HijackingModule 12: Hacking WebserversModule 13: Hacking Web ApplicationModule 14: SQL injectionModule 15: Wireless Hacking

    Module 16: Evading FirewallsModule 17: Buffer OverflowsModule 18: CryptographyModule 19: Penetration Testing

    Pre-requisites: Network+ and Security+ or Equivalent.

    Contact Hours: 48

    Who Should Attend: Security Officers, Auditors, Network and Security Administrators andProfessionals, Site Administrators, and anyone who is concerned about the integrity of thenetwork infrastructure.

  • 8/2/2019 CFSI - Course Brochure - 2011

    19/24

    Computer Forensics and Security Institute

    19

    NB: Students will be responsible for obtaining the kits (study materials and exam voucher)at an added expense of $800 USD (not included in the tuition fee) which is mandatory,as stated by the EC-council, in order to sit the exam and obtain certification.

    The study materials (with exam voucher) can be paid for separately as part of a paymentplan.

    The kits can be purchased directly from CFSI which is an Ec-council (ATC) AuthorisedTraining Centre.

  • 8/2/2019 CFSI - Course Brochure - 2011

    20/24

    Computer Forensics and Security Institute

    20

    Compu ter Hacking Fore nsic Invest igat or (CHFI) Ver sion 4

    Computer forensics enables the systematic and careful identification of evidence in computerrelated crime and abuse cases. This may range from tracing the tracks of a hacker through aclients systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

    Computer forensics is simply the application ofcomputer investigation and analysistechniques in the interests of determining potential legal evidence. Evidence might be sought ina wide range ofcomputer crime or misuse, including but not limited to theft of trade secrets,theft of or destruction of intellectual property, and fraud.

    Students will draw on an array of methods for discovering data that resides in a computersystem, or recovering deleted, encrypted, or damaged file information known as Computer

    Data Recovery.

    Course Outline:

    Module 01 - Computer Forensics in Today's WorldModule 02 - Computer Forensics Investigation ProcessModule 03 - Searching and Seizing ComputersModule 04 - Digital EvidenceModule 05 - First Responder ProceduresModule 06 - Incident HandlingModule 07 - Computer Forensics Lab

    Module 08 - Understanding Hard Disks and File SystemsModule 09 - Digital Media DevicesModule 10 - CD/DVD ForensicsModule 11 - Windows Linux Macintosh Boot ProcessModule 12 - Windows Forensics IModule 13 - Windows Forensics IIModule 14 - Linux ForensicsModule 15 - Mac ForensicsModule 16 - Data Acquisition and DuplicationModule 17 - Recovering Deleted Files and PartitionModule 18 - Forensic Investigation Using AccessData FTK

    Module 19 - Forensics Investigations Using EnCaseModule 20 - SteganographyModule 21 - Image File ForensicsModule 22 - Audio File ForensicsModule 23 - Application Password CrackersModule 24 - Network Forensics and Investigating LogsModule 25 - Investigating Network TrafficModule 26 - Router Forensics

  • 8/2/2019 CFSI - Course Brochure - 2011

    21/24

    Computer Forensics and Security Institute

    21

    Module 27 - Investigating Wireless AttacksModule 28 - Investigating Web AttacksModule 29 - Investigating DoS AttacksModule 30 - Investigating Internet CrimesModule 31 - Tracking Emails and Investigating Email Crimes

    Module 32 - PDA ForensicsModule 33 - BlackBerry ForensicsModule 34 - iPod and iPhone ForensicsModule 35 - Cell Phone ForensicsModule 36 - Investigating Corporate EspionageModule 37 - Investigate Trademark and Copyright InfringementModule 38 - Investigating Sexual Harassment IncidentsModule 39 - Investigating Child Pornography CasesModule 40 - Investigative ReportsModule 41 - Becoming an Expert Witness

    The Updated CHFI v4 syllabus includes 24 new modules based on:

    Searching and Seizing of Computers, Digital Evidence, CD & DVD Forensics, WindowsForensics Mac Forensics, Image and File Forensics, Audio and File Forensics, Video FileForensics, Logs and Capturing Event Correlation, iPod and iPhone Forensics, USB Forensics,Printer Forensics, Investigating Computer Data Breaches, Investigating Identify Theft Cases,Investigating Defamation over Websites and Blog , Investigating Search Keywords, How toBecome a Digital Detective, Computer Forensic Lawyers, Computer Forensics and LegalCompliance, Security Policies Rick Assessment, Evaluation and Certification of InformationSystem, Computer Forensics Consulting Companies and Digital Forensic Templates

    Pre-requisites: Network+ and Security+ or Equivalent. CEH is an asset but not required.

    Contact Hours: 48

    Who Should Attend: Security Officers, Auditors, Network and Security Administrators andProfessionals, Police and other law enforcement personnel, Defense and Military personnel,e-Business Security professionals, Systems administrators, Legal professionals, Banking,Insurance and other professionals, Government agencies and IT managers.

    NB: Students will be responsible for obtaining the kits (study materials and exam voucher)

    at an added expense of $800 USD (not included in the tuition fee) which is mandatory,as stated by the EC-council, in order to sit the exam and obtain certification.

    The study materials (with exam voucher) can be paid for separately as part of a paymentplan.

    The kits can be purchased directly from CFSI which is an Ec-council (ATC) AuthorisedTraining Centre.

  • 8/2/2019 CFSI - Course Brochure - 2011

    22/24

    Computer Forensics and Security Institute

    22

    Ec-Cou ncil Cer t ified System s Analys t (ECSA) Ver sion 4

    ECSA works hand in hand with CEH by going into the analytical phase of ethical hacking.ECSA is a logical progression from CEH by giving you the skills to analyze the outcome

    from these tools and technologies. ECSA will assist you in conducting intensive assessments

    required to create a robust risk management system through groundbreaking penetration

    testing methods and techniques.

    Students will learn how to clarify, isolate and overcome security problems in order to

    effectively avoid and eliminate them. The class will enable you to provide the best complete

    coverage of network security- testing topic and analysis. Designing and performing

    comprehensive tests on your networks will be second nature to you once you leave this advance

    class.

    Course Outline:

    Module 1: The Need for Security AnalysisModule 2: Advanced GooglingModule 3: TCP/IP Packet AnalysisModule 4: Advanced Sniffing TechniquesModule 5: Vulnerability Analysis with NessusModule 6: Advanced Wireless Testing

    Module 7: Designing a DMZModule 8: Snort AnalysisModule 9: Log Analysis

    Module 10: Advanced Exploits and ToolsModule 11: Penetration Testing MethodologiesModule 12: Customers and Legal AgreementsModule 13: Rules of EngagementModule 14: Penetration Testing Planning and SchedulingModule 15: Pre Penetration Testing ChecklistModule 16: Information GatheringModule 17: Vulnerability Analysis

    Module 18: External Penetration TestingModule 19: Internal Network Penetration TestingModule 20: Routers and SwitchesModule 21: Firewall Penetration TestingModule 22: IDS Penetration TestingModule 23: Wireless Network Penetration TestingModule 24: Denial of Service Penetration TestingModule 25: Password Cracking

  • 8/2/2019 CFSI - Course Brochure - 2011

    23/24

    Computer Forensics and Security Institute

    23

    Module 26: Social EngineeringModule 27: Stolen Laptop, PDAs and Cell phones Penetration TestingModule 28: Application Penetration TestingModule 29: Physical Security PenetrationModule 30: Database Penetration testing

    Module 31: VoIP Penetration TestingModule 32: VPN Penetration TestingModule 33: War DiallingModule 34: Virus and Trojan DetectionModule 35: Log Management Penetration TestingModule 36: File Integrity CheckingModule 37: Blue Tooth and Hand held Device Penetration TestingModule 38: Telecommunication and Broadband Communication Penetration TestingModule 39: Email Security Penetration TestingModule 40: Security Patches PenetrationModule 41: Data Leakage Penetration Testing

    Module 42: Penetration Testing Deliverables and ConclusionModule 43: Penetration Testing Report and DocumentationModule 44: Penetration Testing Report AnalysisModule 45: Post Testing ActionsModule 46: Ethics of a Licensed Penetration TesterModule 47: Standards and Compliance

    Pre-requisites: Network+ and Security+ or Equivalent. CEH is an asset but not required.

    Contact Hours: 42

    Who Should Attend: Network and Server Administrators, Firewall Administrators,Security Testers, System Administrators and Risk Assessment Professionals.

    NB: Students will be responsible for obtaining the kits (study materials and exam voucher)at an added expense of $800 USD (not included in the tuition fee) which is mandatory,as stated by the EC-council, in order to sit the exam and obtain certification.

    The study materials (with exam voucher) can be paid for separately as part of a paymentplan.

    The kits can be purchased directly from CFSI which is an Ec-council (ATC) AuthorisedTraining Centre.

  • 8/2/2019 CFSI - Course Brochure - 2011

    24/24

    Computer Forensics and Security Institute

    24

    Upcom ing Cour ses

    Hacking and Penetration Testing With Backtrack 4 Wireshark Packet Analysis (Introduction to Intermediate) Digital Forensics using EnCase Digital Forensics using Helix, DD and FTK