Certified Network Defender (Volumes 1 through 4) | Complete Set

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.

EC-Council Certified Secure Program .Net (ECSP) (VO)

Software defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming. Hence, it has become a must for organizations to educate their software developers about secure coding practices.

Attackers try to find security vulnerabilities in the applications or servers and then try to use these vulnerabilities to steal secrets, corrupt programs and data, and gain control of computer systems and networks. Sound programming techniques and best practices can be used to develop high quality code to prevent web application attacks. Secure programming is a defensive measure against attacks targeted towards application systems.

Computer Hacking Forensic Investigator (CHFI) VO

This class is designed to provide the participants the necessary skills to perform an effective digital forensics investigation. The course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.

EC-Council Certified Security Analyst (ECSA) (VO)

ECSA-cover600
The EC-Council Certified Security Analyst/Licensed Penetration Tester program consists of two components i.e. EC-Council Certified Security Analyst (ECSA) training and Licensed Penetration Tester (LPT) performance-based skill assessment.

The EC–Council Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology.

Core Modules:

  1. Need for Security Analysis
  2. TCP IP Packet Analysis
  3. Penetration Testing Methodologies
  4. Customers and Legal Agreements
  5. Rules of Engagement
  6. Penetration Testing Planning and Scheduling
  7. Pre-penetration Testing Steps
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. IDS Penetration Testing  
  14. Password Cracking Penetration Testing
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Penetration Testing Reports and Post Testing Actions

Certified Incident Handler (CIH) (VO)

ECIH_Promo600
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents.

Core Concepts VO

coreconcepts
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric..

Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where the Core Concepts course comes in, it is the bridge between a beginning level security course and CEH; furthermore, it focus on the main concepts required to build a foundation in security.

By taking this course you will learn the foundations of security to include in-depth knowledge of the TCP/IP protocol.

  • You will learn how to analyze packets for irregularities
  • You will learn how to detect signs of crafted packets
  • You will learn advanced protocol analysis techniques
  • You will perform low-level protocol analysis
  • You will leans functional skills in Unix and Linux
  • You will learn virtualization and how to build your own virtual labs
  • You will learn the fundamentals of vulnerability assessment and the hacking methodology

Advanced Penetration Testing (CAST 611) – Kevin Cardwell (VO)

Purpose of Class:

The course will teach you how to do a professional security test and produce the most important thing from a test … the findings and the report!

The format is practice the professional security testing methodology. Once you have practiced this then you will go against a “live” range.

The ranges progress in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is not your typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques.

The format you will use has been used to train 1000s of penetration testers globally, it is proven and effective!

Course Objectives:

Students who successfully complete this class will be able to:

  • Analyze a variety of targets using a systematic process for professional security testing
  • Identify the risk to an organization based on the systems and software encountered
  • Analyze the results and findings from a professional assessment and identify the critical components susceptible to attack
  • Identify the defenses that are in place, and bypass them
  • Create a professional security report

Certified Secure Computer User (CSCU) (VO)

The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

Course Objectives:

After successfully completing this course, students will be able to:

  • Understand the need and importance of data security.
  • Implement Operating System security measures on their computers.
  • Understand Malware and its symptoms.
  • Make an informed decision about choosing the antivirus which is most relevant to their needs.
  • Understand the risks associated with different online activities.
  • Understand why and how to secure web browsers.
  • Identify safe websites.
  • Safeguard against the threats associated with online social networking.
  • Understand how to make their social networking accounts secure.
  • Understand the threats associated with email communications and how to safeguard against them.

  • Understand the threats to mobile devices and how to safeguard against them.
  • Understand the threats associated with cloud accounts and how to safeguard against them.
  • Make an informed decision about a cloud service provider which fulfills their requirements.
  • Understand the various types of networks and the threats associated with them.
  • Configure a home network.
  • Make their networks secure.
  • Understand the threats to data and the need for data backups.
  • Backup and restore data on their computers.
  • Destroy data permanently.

Certified Ethical Hacker (CEH) (VO)

CEHv9 is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

Advanced Penetration Testing (CAST 611) – Kevin Cardwell

Purpose of Class:

The course will teach you how to do a professional security test and produce the most important thing from a test … the findings and the report!

The format is practice the professional security testing methodology. Once you have practiced this then you will go against a “live” range.

The ranges progress in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is not your typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques.

The format you will use has been used to train 1000s of penetration testers globally, it is proven and effective!

Course Objectives:

Students who successfully complete this class will be able to:

  • Analyze a variety of targets using a systematic process for professional security testing
  • Identify the risk to an organization based on the systems and software encountered
  • Analyze the results and findings from a professional assessment and identify the critical components susceptible to attack
  • Identify the defenses that are in place, and bypass them
  • Create a professional security report

Certified Chief Information Security Officer (CCISO) – Keith Rayle

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. Material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Certified Network Defender (CND)

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real-world expertise on current network security technologies and operations.

Core Concepts

coreconcepts
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric..

Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training. For many, when you take a class like the Certified Ethical Hacker (CEH) you have not established the foundation that is needed to get the most from the course, this is where the Core Concepts course comes in, it is the bridge between a beginning level security course and CEH; furthermore, it focus on the main concepts required to build a foundation in security.

By taking this course you will learn the foundations of security to include in-depth knowledge of the TCP/IP protocol.

  • You will learn how to analyze packets for irregularities
  • You will learn how to detect signs of crafted packets
  • You will learn advanced protocol analysis techniques
  • You will perform low-level protocol analysis
  • You will leans functional skills in Unix and Linux
  • You will learn virtualization and how to build your own virtual labs
  • You will learn the fundamentals of vulnerability assessment and the hacking methodology

Computer Hacking Forensic Investigator (CHFI)

This class is designed to provide the participants the necessary skills to perform an effective digital forensics investigation. The course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators.

Certified Incident Handler (CIH)

ECIH_Promo600
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents.

EC-Council Certified Security Analyst (ECSA)

ECSA-cover600
The EC-Council Certified Security Analyst/Licensed Penetration Tester program consists of two components i.e. EC-Council Certified Security Analyst (ECSA) training and Licensed Penetration Tester (LPT) performance-based skill assessment.

The EC–Council Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology.

Core Modules:

  1. Need for Security Analysis
  2. TCP IP Packet Analysis
  3. Penetration Testing Methodologies
  4. Customers and Legal Agreements
  5. Rules of Engagement
  6. Penetration Testing Planning and Scheduling
  7. Pre-penetration Testing Steps
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. IDS Penetration Testing  
  14. Password Cracking Penetration Testing
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Penetration Testing Reports and Post Testing Actions

Certified Ethical Hacker (CEH)

CEHv9 is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.