Courses by EC-Council

  • Course: Certified Chief Information Security Officer (C|CISO)
  • Length: 4 days
SCHEDULE

Course Overview:

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

Target Student:

This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems.

Prerequisites:

Candidates interested in earning the C|CISO Certification must qualify via ECCouncil’s Exam Eligibility application before sitting for the C|CISO Exam. Only students with at least five years of experience in three of the five domains are permitted to sit for the C|CISO Exam. Any student who does not qualify to sit for the exam or who does not fill out the application will be permitted to take the EC-Council Information Security Manager (EISM) exam and earn that certification. EISMs may then apply for the CCISO Exam once they have achieved the required years of experience.

Course Objectives:

In this course, you will learn in-depth content in each of the 5 CCISO Domains:

Domain 1 – Governance (Policy, Legal, and Compliance)

The first Domain of the C|CISO program is concerned with the following:

  • Information Security Management Program
  • Defining an Information Security Governance Program
  • Regulatory and Legal Compliance
  • Risk Management

Domain 2 - IS Management Controls and Auditing Management

Domain 2 of the CCISO program, one of the cornerstones of any information security program, is concerned with the following:

  • Designing, deploying, and managing security controls
  • Understanding security controls types and objectives
  • Implementing control assurance frameworks
  • Understanding the audit management process

Domain 3 of the C|CISO program covers the day-to-day responsibilities of a CISO, including:

  • The role of the CISO
  • Information Security Projects
  • Integration of security requirements into other operational processes (change management, version control, disaster recovery, etc.)

Domain 4 of the CCISO program covers, from an executive perspective, the technical aspects of the CISO job including:

  • Access Controls
  • Physical Security
  • Disaster Recovery and Business Continuity Planning
  • Network Security
  • Threat and Vulnerability Management
  • Application Security
  • System Security
  • Encryption
  • Vulnerability Assessments and Penetration Testing
  • Computer Forensics and Incident Response

Domain 5 of the CCISO program is concerned with the area with which many more technically inclined professionals may have the least experience, including:

  • Security Strategic Planning
  • Alignment with business goals and risk tolerance
  • Security emerging trends
  • Key Performance Indicators (KPI)
  • Financial Planning
  • Development of business cases for security
  • Analyzing, forecasting, and developing a capital expense budget
  • Analyzing, forecasting, and developing an operating expense budget
  • Return on Investment (ROI) and cost-benefit analysis
  • Vendor management
  • Integrating security requirements into the contractual agreement and procurement process
  • Taken together, these five Domains of the C|CISO program translate to a thoroughly knowledgeable, competent executive information security practitioner.
  • Course: Computer Hacking Forensic Investigator (CHFI)
  • Length: 5 days
SCHEDULE

Course Outline:

Module 01 Computer Forensics in Today's World

Module 02 Computer Forensics Investigation Process

Module 03 Understanding Hard Disks and File Systems

Module 04 Data Acquisition and Duplication

Module 05 Defeating Anti-forensics Techniques

Module 06 Operating System Forensics (Windows, Mac, Linux)

Module 07 Network Forensics

Module 08 Investigating Web Attacks

Module 09 Database Forensics

Module 10 Cloud Forensics

Module 11 Malware Forensics

Module 12 Investigating Email Crimes

Module 13 Mobile Forensics

Module 14 Forensics Report Writing and Presentation

 

 

  • Course: Certified Ethical Hacker v10 (CEH v10)
  • Length: 5 days
SCHEDULE

Course Outline

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

 

  • Course: EC-Council Disaster Recovery Professional (EDRP)
  • Length: 5 days
SCHEDULE

Course Outline

Module 01: Introduction to Disaster Recovery and Business Continuity

Module 02: Business Continuity Management (BCM)

Module 03: Risk Assessment

Module 04: Business Impact Analysis (BIA)

Module 05: Business Continuity Planning (BCP)

Module 06: Data Backup Strategies

Module 07: Data Recovery Strategies

Module 08: Virtualization-Based Disaster Recovery

Module 09: System Recovery

Module 10: Centralized and Decentralized System Recovery

Module 11: Disaster Recovery Planning Process

Module 12: BCP Testing, Maintenance, and Training

Register Now