8/2/2019 CFSI - Course Brochure - 2011
1/24
CFSI
Computer Forensics and Security Institute
Course Brochure 2011
1-868-684-0029
CFSI is a registered company and an ATC (Authorised Training Centre) for the Ec-Council
mailto:[email protected]:[email protected]8/2/2019 CFSI - Course Brochure - 2011
2/24
Computer Forensics and Security Institute
2
ContentsCompTIA A+ and Computer Repairs .......................................................................................... 3
CompTIA Network+ ................................................................................................................... 4
CompTIA Security+ ................................................................................................................... 6
CompTIA Linux+ ....................................................................................................................... 7
CompTIA Server+ ...................................................................................................................... 8
Cisco Certified Network Associate (CCNA) ............................................................................... 9
Certified Wireless Network Associate (CWNA)........................................................................ 11
Microsoft Certified Technology Specialist (MCTS): Windows 7 Configuration ........................ 12
Certified Information Systems Auditor (CISA) ......................................................................... 13
Certified Information Systems Manager (CISM) ....................................................................... 14
Certified internet Webmaster (CIW) Professional ..................................................................... 16
CIW Web Security Associate .................................................................................................... 17
Certified Ethical Hacker (CEH) Version 7.............................................................................. 18
Computer Hacking Forensic Investigator (CHFI) Version 4 ................................................... 20
Ec-Council Certified Systems Analyst (ECSA) Version 4 ...................................................... 22
Upcoming Courses .................................................................................................................... 24
8/2/2019 CFSI - Course Brochure - 2011
3/24
Computer Forensics and Security Institute
3
CompTIA A+ and Computer Repairs
The CompTIA A+ certification is the industry standard for computer supporttechnicians. The international, vendor-neutral certificat ion proves competence in areas such asinstallation, preventative maintenance, networking, security and troubleshooting. CompTIA A+certified technicians also have excellent customer service and communication skills to workwith clients. CompTIA A+ is part of the certification track for corporations such as Microsoft,Hewlett- Packard, Cisco and Novell.
Course Outline:
Introduction to Computers Understanding Electronic Communication An Overview of the Personal Computer The Central Processing Unit Power Supplies Motherboard and ROM BIOS Memory Expansion Buses, Cables, and Connectors Basic Disk Drives Advanced Disk Drive Technology The Display System Printers Portable Computers Connectivity and Networking Telecommunications: Modems and the Internet Operating System Fundamentals Introducing and Installing Microsoft Windows Running Microsoft Windows Maintaining the Modern Computer Upgrading a Computer Troubleshooting Techniques and Client Relations The Basics of Electrical Energy
Pre-requisites: Working knowledge of Windows and the Internet.
Contact Hours: 80
Who Should Attend: Computer Enthusiasts working towards being Certified ComputerTechnicians.
8/2/2019 CFSI - Course Brochure - 2011
4/24
Computer Forensics and Security Institute
4
CompTIA Network+
The CompTIA Network+ certification is the sign of a competent networking professional.It is an international, vendor-neutral certification that proves a technicians competency inmanaging, maintaining, troubleshooting, installing and configuring basic networkinfrastructure. Microsoft includesCompTIA Network+ in their Microsoft Certified Systems Administrator (MCSA) program,and other corporations such as Novell, Cisco and HP also recognize CompTIA Network+as part of their certification tracks.
Course Outline:
Introduction to Networks Common Networking Protocols and Ports TCP/IP Addressing Routing Concepts Routing Protocols Cables and Connectors Physical Network Topologies Wiring Distribution Components LAN Technologies WAN Technologies Wireless Technology
Network Devices , Configuration and Management Network Monitoring and Optimization Network Troubleshooting Methodologies Common Network Troubleshooting Issues Network Scanners Firewalls IPSec VPN Tunnelling and Encryption Remote Access User Authentication Device Management Security
Common Threats and Mitigation Hardware Tools
Pre-requisites: Working knowledge of Windows and the Internet.
Contact Hours: 42
8/2/2019 CFSI - Course Brochure - 2011
5/24
Computer Forensics and Security Institute
5
Who Should Attend: Computer Enthusiasts, Computer Technicians and persons interested inmoving on towards being Network Administrators.
8/2/2019 CFSI - Course Brochure - 2011
6/24
Computer Forensics and Security Institute
6
CompTIA Security+
The CompTIA Security+ certification designates knowledgeable professionals in thefield of security, one of the fastest-growing fields in IT. Security+ is an international,vendor- neutral certificat ion that proves competency in system security, networkinfrastructure, access control and organizat ional security.
Security threats are increasing in number and severity, and the gap between the need forsecurity professionals and qualified IT personnel is the largest of any IT specialty, according toa 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain orincrease their investment in security. Major organizations that employ CompTIA Security+certified staff include Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh,Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U.S. Navy, Army, Air Force
and Marines.
Course Outline:
Introduction to and the need for Security Evaluating Common Security Threats Operating System Hardening Application Security Implementing Security Applications Network Infrastructure Attacks
Network Design Elements and Components Network Security Tools Wireless Network Security Access Control Assessments and Audits (Part 1) General Cryptography Concepts Cryptography Algorithms and Protocols Public Key Infrastructure (PKI) Organizational Security
Pre-requisites: Basic Networking and an Understanding of the OSI Model.
Contact Hours: 36
Who Should Attend: Computer and Network Technicians and persons interested in movingon towards being Network and/or Security Administrators.
8/2/2019 CFSI - Course Brochure - 2011
7/24
Computer Forensics and Security Institute
7
CompTIA Linux+
CompTIA Linux+ Powered by LPI is a high-stakes, vendor-neutral certification thatvalidates the fundamental knowledge and skills required of junior Linux
administrators.
Linux+ covers the Linux system architecture, Linux installation and package management,GNU and UNIX commands, devices, Linux file systems and the File system HierarchyStandard. On completion of the course, the student will be able work at the Linux commandline, perform maintenance tasks, assist users, and install and configure Linux workstations.
Course Outline:
Introduction to Using Linux Planning your installation Pre-installation Hardware Considerations Installation of Linux Installing and Updating Software in Linux User Administration in Linux Administration of File systems and Security Administration of Networks in Linux Linux Essentials Configuring Printing and File Sharing
Configuration Files and Related Topics Maintenance of a Linux System Troubleshooting Problems in a Linux System Troubleshooting in Linux Hardware issues in Linux Multimedia in Linux Introduction to sed and awk Security issues Printing and Mail
Pre-requisites: Network+ is an asset but not mandatory as long as the student has a working
knowledge of networks.
Contact Hours: 36
Who Should Attend: Computer and Network Technicians and persons interested in movingon towards being Junior Linux Administrators, Network and/or Security Administrators.
8/2/2019 CFSI - Course Brochure - 2011
8/24
Computer Forensics and Security Institute
8
CompTIA Server+
CompTIA Server+ certifies the technical knowledge and skills required to build, maintain,troubleshoot and support server hardware and software technologies. This course also coversvirtualization, disaster recovery and security procedures.
Course Outline:
Introduction to Servers Server Roles System Board Types Server Chassis Types
Memory Features Processor Features Expansion Cards NOS Installation, Configuration, Deployment and Security NOS Management Features Server Virtualization Networking Essentials Server RAID Internal and External Storage Technologies Documentation and Best Practices Environmental Controls and Location
Server Access Methods Physical Security Measures Backup and Restore Replication, Retention, and Disposition Disaster Recovery Steps Troubleshooting and Methodology Hardware, Software and Network Troubleshooting and Tools Troubleshooting Storage Issues
Pre-requisites: A+ and Network+ are assets but not mandatory as long as the student has aworking knowledge of computer and network technologies.
Contact Hours: 36
Who Should Attend: Technical Support Professionals and Computer and NetworkTechnicians as well as persons interested in moving on towards being Network Administrators.
8/2/2019 CFSI - Course Brochure - 2011
9/24
Computer Forensics and Security Institute
9
Cisco Cer tified Networ k Associate (CCNA)
The Cisco Certified Network Associate (CCNA) certification validates your skills andknowledge required to deploy, maintain, secure and operate a medium-sized network using
Cisco technologies. CCNA certified professionals can install, configure and operate LAN,
WAN and dial access services for small networks.
Students will gain the knowledge and skills required to install, operate, and troubleshoot a
small to medium size enterprise branch network, including connecting to a WAN;
implementing network security; network types; network media; routing and switching
fundamentals; the TCP/IP and OSI models; IP addressing; WAN technologies; operating and
configuring IOS devices; extending switched networks with VLANs; determining IP routes;
managing IP traffic with access lists; establishing point-to-point connections; and establishingFrame Relay connections.
Course Outline: The OSI Model and its Layers in everything networking. TCP/IP: TCP and UDP Communication, Addressing and Ports Understanding LAN Switches Working with the Cisco Switch IOS Initial Setup of a Cisco Switch Configuring Switch Security
Optimizing and Troubleshooting Switches Understanding Wireless Networking Wireless Security and Implementation Advanced TCP/IP: IP Subnetting Initial Router Configuration SDM and DHCP Server Configuration Implementing Static and Dynamic Routing Internet Access with NAT and PAT WAN Connectivity Telnet, SSH, and CDP Management and Security: File Management
Understanding Trunks and VTP Configuring VLANs Switch STP: Understanding the Spanning-Tree Protocol General Switching: Troubleshooting and Security Best Practices Understanding VLSM Distance Vector vs. Link State OSPFC Concepts
8/2/2019 CFSI - Course Brochure - 2011
10/24
Computer Forensics and Security Institute
10
OSPFC Configuration and Troubleshooting EIGRP Concepts and Configuration Access-Lists: The Rules of the ACL Access-Lists: Configuring ACLs Command Line NAT Configuration
Concepts of VPN Technology Configuring Frame Relay
Pre-requisites: Network+ and a thorough understanding of the OSI model. Security+ is anasset but not mandatory.
Contact Hours: 42-50
Who Should Attend: Computer and Network Technicians and Administrators as well aspersons interested in moving on towards becoming Network Administrators andProfessionals.
8/2/2019 CFSI - Course Brochure - 2011
11/24
Computer Forensics and Security Institute
11
Certified Wireless Network Associate (CWNA)
The CWNA certification can get you started in your wireless career by ensuring you have theskills to successfully administer enterprise-class wireless LAN.
Students will gain a working knowledge of Radio Frequency (RF) Technologies, AntennaConcepts, Wireless LAN Hardware and Software, Network Design, Installation, andManagement, Wireless Standards and Organizations, 802.11 Network Architecture, WirelessLAN Security, Performing Site Surveys and Troubleshooting.
Course Outline:
Revisiting the Wireless LAN Radio Frequency (RF) Fundamentals Spread Spectrum Technology Wireless LAN Infrastructure Devices Wireless LAN Antennas Wireless LAN Accessories Wireless LAN Organizations and Standards 802.11 Network Architecture MAC and Physical Layers Troubleshooting Wireless LAN Installations Wireless LAN Security
Site Survey Fundamentals Site Survey Equipment and Procedures Radio Frequency (RF) Fundamentals Spread Spectrum Technology Wireless LAN Infrastructure Devices Wireless LAN Organization and Standards Wireless LAN Security - Wireless Network Management Systems WLAN Deployment and Vertical Markets PoE, HT, and 802.11n
Pre-requisites: Network+ or 8 months networking experience.
Contact Hours: 36
Who Should Attend: Computer and Network Technicians and Administrators as wellas persons interested in moving on towards becoming Wireless NetworkAdministrators and Professionals.
8/2/2019 CFSI - Course Brochure - 2011
12/24
Computer Forensics and Security Institute
12
Micros oft Cer tified Techn ology Spe cialist (MCTS): Wind ows 7
Configuration
In this course, students will install, deploy, and upgrade to Windows 7, ensure hardware andsoftware compatibility and configure pre-installation and post-installation system settings.
Students will gain hands-on experience in Windows security features, network connectivityapplications included with Windows 7, and mobile computing. This includes being able tomaintain systems, monitor and resolve performance and reliability issues using the GUI as wellas the Windows PowerShell.
Course Outline:
Installation, Upgrading and Migration Creating, Capturing and Deploying an Image Configuring a VHD Configuring Devices Managing Disks Managing Applications Application Restrictions Internet Explorer IPv4 Networking IPv6 Networking
Wireless Networking Windows Firewall Remote Administration Accessing Resources Authentication and User Account Control Remote Access Mobile Computing Monitoring Systems Configuring Performance Windows Updates Backup and Recovery
Pre-requisites: Network+.
Contact Hours: 30
Who Should Attend: Computer and Network Technicians as well as persons interested inmoving on towards becoming Network Administrators and Networking Professionals.
8/2/2019 CFSI - Course Brochure - 2011
13/24
Computer Forensics and Security Institute
13
Cer tified Informat ion System s Aud itor (CISA)
The skills and practices that CISA promotes and evaluates are the building blocks of success inthe field. Possessing the CISA demonstrates proficiency and is the basis for measurement in theprofession. With a growing demand for individuals possessing IS audit, control and securityskills, CISA has become a preferred certification program by individuals and organizationsaround the world.
Course Outline:
The IS Audit Process. Information Security Policies.
Computer Assisted Audit Technique (CAAT) and Control Self-Assessment (CSA)Framework.
Information Technology Governance. Risk Management Processes and Risk Analysis Methods. Project Management Practices, Tools and Control Frameworks. Organizational Change Management, IS Quality and Performance management. Systems and Infrastructure Life Cycle Management. Infrastructure Development Acquisition and IS Maintenance Methods. Application Controls and Auditing. Application developing, acquiring and maintaining business application systems. IT Service Delivery and Support.
IS operation and Hardware, Hardware Management and IS architecture Incident and Problem Management Practices Information Security Management Network Infrastructure Security Attack Methods and Techniques Protection of Information Assets. Disaster Recovery and Business Continuity.
Pre-requisites: Training in Network+, Security+ and MCTS or equivalent.
Contact Hours: 30
Who Should Attend: Networking Professionals who wish to expand into the lucrative andin-demand field of Network Security and Auditing.
8/2/2019 CFSI - Course Brochure - 2011
14/24
Computer Forensics and Security Institute
14
Cer tified Informat ion Syste ms Man ager (CISM)
The management-focused CISM is a unique certification for individuals who design, build andmanage enterprise information security programs. The CISM certification promotesinternational practices and individuals earning the CISM become part of an elite peer network,attaining a one-of-a-kind credential.
Although certification may not be mandatory for you at this time, a growing number oforganizations are recommending that employees become certified. To help ensure success inthe global marketplace, it is vital to select a certification program based on universally acceptedtechnical practices.
Course Outline:
Submitting Required Paperwork Asset Identification Risk Assessment Vulnerability Assessments Asset Management, Classification and Ownership Structured Information Risk Assessment Process Change Management Information Security Strategy Development of Information Security Architectures
Security Awareness, Training, and Education Communication and Maintenance of Standards, Procedures, and Other Documentation Security Metrics Security Program Management Overview Security Baselines Security Program Infrastructure Security Impact on Users Accountability Response Management Overview Importance of Response Management Performing a Business Impact Analysis
Developing Response and Recovery Plans The Incident Response Process Implementing Response and Recovery Plans Response Documentation Post-Event Reviews
Pre-requisites: Training in Network+, Security+ and MCTS or equivalent.
8/2/2019 CFSI - Course Brochure - 2011
15/24
Computer Forensics and Security Institute
15
Contact Hours: 36
Who Should Attend: Networking and Security Professionals who wish to advance theircareer into IT Managerial Positions.
8/2/2019 CFSI - Course Brochure - 2011
16/24
Computer Forensics and Security Institute
16
Cer tified inte rnet Webma ster (CIW) Pr ofessional
Course Outline:
LEVEL 1 (3 parts):
The CIWInternet Business Foundations course prepares you to work effectivelyin today's business environment. In this course, you will learn about the tasksinvolved in various Web Technology job roles, and you will learn the skills andtechnologies to perform them.
The CIW Site Development Foundations course teaches you essential Web pagedevelopment skills and ways to work as a productive part of a Web site
development team.
TheNetwork Technology Foundations course prepares you for job readiness in manybusiness
and technology-related careers. Understanding the fundamentals of networking, Internetprotocols and network security is important for all professionals who use the Internet.
LEVEL 2 (2 parts):
The CIW Web Design Specialistcourse is for the individual who wants to developthe skills necessary to specialize in Web site design.
Creating pages using popular production tools, including Microsoft Frontpage,Expression Web, and Adobe Dreamweaver, Fireworks and Flash.
Design and development technologies, including Cascading Style Sheets (CSS)
CSS, XHTML, and XML Essentials
Web Site Management and Planning
Web Site Copyright and Legal Issues
Pre-requisites: Must have a working knowledge and understanding of the Internet.
Contact Hours: 42
Who Should Attend: Persons interested in Webpage and Website design.
8/2/2019 CFSI - Course Brochure - 2011
17/24
Computer Forensics and Security Institute
17
CIW Web Secur ity Associat e
The CIWNetwork Security and Firewalls course teaches you how to secure your network fromunauthorized activity. This course teaches you about security principles, such as establishing aneffective security policy, and about the different types of hacker activities that you are mostlikely to encounter. Individuals with these security skills can pursue or advance careers in manyaspects of online and network security.
Course Outline:
Network Security Background Elements of Security
Applied Encryption Network Attack Categories Brute-Force and Dictionary Attacks System Bugs and Back Doors Malware (Malicious Software) Social Engineering Attacks Denial-of-Service (DOS) Attacks Distributed Denial-of-Service (DDOS) Attacks Spoofing Attacks Scanning Attacks
Man-in-the-Middle Attacks Bots and Botnets Importance of Response Management Recent Network Vulnerability Considerations General Security Principles Protocol Layers and Security Securing Resources Firewalls and Virtual Private Networks Levels of Firewall Protection Detecting and Distracting Hackers Incident Response
Pre-requisites: Security+
Contact Hours: 24
Who Should Attend: Persons interested in Internet and Intranet Security.
8/2/2019 CFSI - Course Brochure - 2011
18/24
Computer Forensics and Security Institute
18
Cer tified Eth ical Hacker (CEH) Ver sion 7
To beat a hacker, you need to think like one! This is exactly what this class will teach you. It isthe pinnacle of the most desired information security training program any informationsecurity professional will ever want to be in.
This class will immerse the students into a hands-on environment where they will be shownhow to conduct ethical hacking. They will be exposed to an entirely different way ofachieving optimal information security posture in their organization; by hacking it! Theywill scan, test, hack and secure their own systems.
Course Outline:
Module 01: Introduction to Ethical HackingModule 02: Foot printingModule 03: ScanningModule 04: EnumerationModule 05: System HackingModule 06: TrojansModule 07: Viruses/WormsModule 08: SniffersModule 09: Social EngineeringModule 10: Denial-of-Service
Module 11: Session HijackingModule 12: Hacking WebserversModule 13: Hacking Web ApplicationModule 14: SQL injectionModule 15: Wireless Hacking
Module 16: Evading FirewallsModule 17: Buffer OverflowsModule 18: CryptographyModule 19: Penetration Testing
Pre-requisites: Network+ and Security+ or Equivalent.
Contact Hours: 48
Who Should Attend: Security Officers, Auditors, Network and Security Administrators andProfessionals, Site Administrators, and anyone who is concerned about the integrity of thenetwork infrastructure.
8/2/2019 CFSI - Course Brochure - 2011
19/24
Computer Forensics and Security Institute
19
NB: Students will be responsible for obtaining the kits (study materials and exam voucher)at an added expense of $800 USD (not included in the tuition fee) which is mandatory,as stated by the EC-council, in order to sit the exam and obtain certification.
The study materials (with exam voucher) can be paid for separately as part of a paymentplan.
The kits can be purchased directly from CFSI which is an Ec-council (ATC) AuthorisedTraining Centre.
8/2/2019 CFSI - Course Brochure - 2011
20/24
Computer Forensics and Security Institute
20
Compu ter Hacking Fore nsic Invest igat or (CHFI) Ver sion 4
Computer forensics enables the systematic and careful identification of evidence in computerrelated crime and abuse cases. This may range from tracing the tracks of a hacker through aclients systems, to tracing the originator of defamatory emails, to recovering signs of fraud.
Computer forensics is simply the application ofcomputer investigation and analysistechniques in the interests of determining potential legal evidence. Evidence might be sought ina wide range ofcomputer crime or misuse, including but not limited to theft of trade secrets,theft of or destruction of intellectual property, and fraud.
Students will draw on an array of methods for discovering data that resides in a computersystem, or recovering deleted, encrypted, or damaged file information known as Computer
Data Recovery.
Course Outline:
Module 01 - Computer Forensics in Today's WorldModule 02 - Computer Forensics Investigation ProcessModule 03 - Searching and Seizing ComputersModule 04 - Digital EvidenceModule 05 - First Responder ProceduresModule 06 - Incident HandlingModule 07 - Computer Forensics Lab
Module 08 - Understanding Hard Disks and File SystemsModule 09 - Digital Media DevicesModule 10 - CD/DVD ForensicsModule 11 - Windows Linux Macintosh Boot ProcessModule 12 - Windows Forensics IModule 13 - Windows Forensics IIModule 14 - Linux ForensicsModule 15 - Mac ForensicsModule 16 - Data Acquisition and DuplicationModule 17 - Recovering Deleted Files and PartitionModule 18 - Forensic Investigation Using AccessData FTK
Module 19 - Forensics Investigations Using EnCaseModule 20 - SteganographyModule 21 - Image File ForensicsModule 22 - Audio File ForensicsModule 23 - Application Password CrackersModule 24 - Network Forensics and Investigating LogsModule 25 - Investigating Network TrafficModule 26 - Router Forensics
8/2/2019 CFSI - Course Brochure - 2011
21/24
Computer Forensics and Security Institute
21
Module 27 - Investigating Wireless AttacksModule 28 - Investigating Web AttacksModule 29 - Investigating DoS AttacksModule 30 - Investigating Internet CrimesModule 31 - Tracking Emails and Investigating Email Crimes
Module 32 - PDA ForensicsModule 33 - BlackBerry ForensicsModule 34 - iPod and iPhone ForensicsModule 35 - Cell Phone ForensicsModule 36 - Investigating Corporate EspionageModule 37 - Investigate Trademark and Copyright InfringementModule 38 - Investigating Sexual Harassment IncidentsModule 39 - Investigating Child Pornography CasesModule 40 - Investigative ReportsModule 41 - Becoming an Expert Witness
The Updated CHFI v4 syllabus includes 24 new modules based on:
Searching and Seizing of Computers, Digital Evidence, CD & DVD Forensics, WindowsForensics Mac Forensics, Image and File Forensics, Audio and File Forensics, Video FileForensics, Logs and Capturing Event Correlation, iPod and iPhone Forensics, USB Forensics,Printer Forensics, Investigating Computer Data Breaches, Investigating Identify Theft Cases,Investigating Defamation over Websites and Blog , Investigating Search Keywords, How toBecome a Digital Detective, Computer Forensic Lawyers, Computer Forensics and LegalCompliance, Security Policies Rick Assessment, Evaluation and Certification of InformationSystem, Computer Forensics Consulting Companies and Digital Forensic Templates
Pre-requisites: Network+ and Security+ or Equivalent. CEH is an asset but not required.
Contact Hours: 48
Who Should Attend: Security Officers, Auditors, Network and Security Administrators andProfessionals, Police and other law enforcement personnel, Defense and Military personnel,e-Business Security professionals, Systems administrators, Legal professionals, Banking,Insurance and other professionals, Government agencies and IT managers.
NB: Students will be responsible for obtaining the kits (study materials and exam voucher)
at an added expense of $800 USD (not included in the tuition fee) which is mandatory,as stated by the EC-council, in order to sit the exam and obtain certification.
The study materials (with exam voucher) can be paid for separately as part of a paymentplan.
The kits can be purchased directly from CFSI which is an Ec-council (ATC) AuthorisedTraining Centre.
8/2/2019 CFSI - Course Brochure - 2011
22/24
Computer Forensics and Security Institute
22
Ec-Cou ncil Cer t ified System s Analys t (ECSA) Ver sion 4
ECSA works hand in hand with CEH by going into the analytical phase of ethical hacking.ECSA is a logical progression from CEH by giving you the skills to analyze the outcome
from these tools and technologies. ECSA will assist you in conducting intensive assessments
required to create a robust risk management system through groundbreaking penetration
testing methods and techniques.
Students will learn how to clarify, isolate and overcome security problems in order to
effectively avoid and eliminate them. The class will enable you to provide the best complete
coverage of network security- testing topic and analysis. Designing and performing
comprehensive tests on your networks will be second nature to you once you leave this advance
class.
Course Outline:
Module 1: The Need for Security AnalysisModule 2: Advanced GooglingModule 3: TCP/IP Packet AnalysisModule 4: Advanced Sniffing TechniquesModule 5: Vulnerability Analysis with NessusModule 6: Advanced Wireless Testing
Module 7: Designing a DMZModule 8: Snort AnalysisModule 9: Log Analysis
Module 10: Advanced Exploits and ToolsModule 11: Penetration Testing MethodologiesModule 12: Customers and Legal AgreementsModule 13: Rules of EngagementModule 14: Penetration Testing Planning and SchedulingModule 15: Pre Penetration Testing ChecklistModule 16: Information GatheringModule 17: Vulnerability Analysis
Module 18: External Penetration TestingModule 19: Internal Network Penetration TestingModule 20: Routers and SwitchesModule 21: Firewall Penetration TestingModule 22: IDS Penetration TestingModule 23: Wireless Network Penetration TestingModule 24: Denial of Service Penetration TestingModule 25: Password Cracking
8/2/2019 CFSI - Course Brochure - 2011
23/24
Computer Forensics and Security Institute
23
Module 26: Social EngineeringModule 27: Stolen Laptop, PDAs and Cell phones Penetration TestingModule 28: Application Penetration TestingModule 29: Physical Security PenetrationModule 30: Database Penetration testing
Module 31: VoIP Penetration TestingModule 32: VPN Penetration TestingModule 33: War DiallingModule 34: Virus and Trojan DetectionModule 35: Log Management Penetration TestingModule 36: File Integrity CheckingModule 37: Blue Tooth and Hand held Device Penetration TestingModule 38: Telecommunication and Broadband Communication Penetration TestingModule 39: Email Security Penetration TestingModule 40: Security Patches PenetrationModule 41: Data Leakage Penetration Testing
Module 42: Penetration Testing Deliverables and ConclusionModule 43: Penetration Testing Report and DocumentationModule 44: Penetration Testing Report AnalysisModule 45: Post Testing ActionsModule 46: Ethics of a Licensed Penetration TesterModule 47: Standards and Compliance
Pre-requisites: Network+ and Security+ or Equivalent. CEH is an asset but not required.
Contact Hours: 42
Who Should Attend: Network and Server Administrators, Firewall Administrators,Security Testers, System Administrators and Risk Assessment Professionals.
NB: Students will be responsible for obtaining the kits (study materials and exam voucher)at an added expense of $800 USD (not included in the tuition fee) which is mandatory,as stated by the EC-council, in order to sit the exam and obtain certification.
The study materials (with exam voucher) can be paid for separately as part of a paymentplan.
The kits can be purchased directly from CFSI which is an Ec-council (ATC) AuthorisedTraining Centre.
8/2/2019 CFSI - Course Brochure - 2011
24/24
Computer Forensics and Security Institute
24
Upcom ing Cour ses
Hacking and Penetration Testing With Backtrack 4 Wireshark Packet Analysis (Introduction to Intermediate) Digital Forensics using EnCase Digital Forensics using Helix, DD and FTK