Certified Ethical Hacking – CEH v11
This is the most advanced course in Ethical Hacking and covers 20 of the most current domains that any ethical hacker will want to handle when they are carrying out a plan to strengthen an organization’s information security. Within 20 modules, about 270 technologies are covered that are commonly used by hackers.
Objectives:
- YOU CAN’T DEFEND IF YOU DON’T KNOW HOW YOU ARE GOING TO BE ATTACKED
- Knowing the techniques used by cybercriminals to compromise an organization.
- Applying techniques to determine the degree of strength or weakness of a company on a security level.
Pre-requisites:
The mission of the Ethical Hacking and Countermeasures course is to educate, show and demonstrate hacking tools for the sole purpose of conducting penetration testing. Prior to the start of the course, the professional will be required to sign an agreement in which he or she agrees not to make illegal use of the skills and knowledge acquired, to not carry out illegal malicious attacks and not to use the tools obtained in the course to compromise the security of any information system or information network.
Certified Security Analyst – ECSA
The ECSA course offers continuous learning progress by picking up where the CEH program left off. The new ECSA includes updated curricular plans and an industry-recognized step-by-step penetration testing methodology. This allows the student to increase their ability to apply new skills learned through intensive labs and practical challenges. ECSA presents a set of distinguishable integral methodologies that can cover different pentesting requirements in different verticals.
Objectives
- Application of the penetration test methodology.
- Perform an integral security audit of an organization, just like in the real world.
- Analysis of manual and automated vulnerability, selection of exploits, customization, launch and post-exploitation maneuvers.
Pre-requisites
For a better use of the course the student must have knowledge in networks, operating systems, additionally it is important that it is a CEH.
Computer Hacking Forensic Investigator – CHFI
Computer Hacking Forensic Investigation is the process of detecting attacks perpetrated by a hacker and to properly extract evidence to report cyber crimes, as well as conduct audits to avoid future attacks. This is simply the application of analysis technics on Cyber investigations with the aim to determine enough legal evidence
Objectives
- To give the student all the tools and knowledge necessary to be able to collect the Digital Evidence correctly and safely.
- To teach the student the necessary methods to perform forensic analysis in different medias: Hard Disks, RAM memory, network traffic, mobiles, etc.
- Provide the student with the proper guidelines for filing a case in court.
Pre-requisites:
Knowledge of TCP/IP, Linux and Windows is required. For a better use of the course, it is recommended to have knowledge in Ethical Hacking.
Certified Incident Handler – CIH
This program is designed to provide students with the skills necessary to manage and respond to security incidents in an information system.
The course addresses several basic principles and techniques for detecting and responding to current security threats. Students will learn how to manage various types of incidents, risk assessment methodologies and regulations related to incident management.
Objectives:
- To understand the different existing methodologies that allow us to effectively carry out the Risk Analysis of the company.
- Respond appropriately to an IT incident.
- Learn how to properly structure a CSIRT or CERT Team that can meet the challenges of solving the incident.
Pre-requisites:
It is necessary to have knowledge in:
- TCP/ IP
- Linux
- Windows
Certified Network Defender – CND
The CND certification aims to train its students (in a practical way) to face and manage real life situations involving network defense and to provide the necessary technical knowledge to design a secure network taking into account future threats.
Objectives:
Through this course participants will be prepared for:
- To work in protection, analysis, detection and response to incidents at the level of network security.
- Design and implement security policies and procedures.
- Select appropriate solutions, configurations and topologies.
- Identify threats and the way to mitigate them.
Pre-requisites
People interested in this certification must have basic knowledge in networks.
Disaster Recovery Professional – EDRP
EDRP is a professional course that teaches students how to design and develop plans for disaster recovery and business continuity plans in the whole organization.
Objectives:
- To apply methods for identifying vulnerabilities and mitigating vulnerabilities within a company.
- To protect information by implementing policies and procedures.
- To recover and restore the organization’s critical data after a disaster.
- To analyze business impact, risk assessment, policy development, procedures and a implementation of a disaster recovery plan.
Pre-requisites:
The student must have a minimum of 2 years experience in the BC / DR domain, basic knowledge in infrastructure, networks and operating systems.
Certified Chief Information Security Officer – CCISO
This program is the first of its kind aimed at training high-level security information executives. The CCISO does not focus only on technical knowledge, but also on the application of information security management principles from the point of view of executive management.
Objectives:
- The main objective of this course is to give the participants deep knowledge in each one of the 5 proposed domains with the support of an entity of recognition and wide international trajectory.
- It is aimed at senior managers, who seek to advance their careers by applying their technical knowledge to solve business problems
Pre-requisites:
- People interested in the CCISO (Certified Chief Information Security Officer) certification must be able to show a minimum of 5 years experience, in 3 of the domains.
- If a person does not comply with this time or does not send the necessary documentation they will be a candidate to apply for the EISM (EC-Council Information Security Manager) certification.
- EISM certified individuals may apply for CCISO certification after completing the required years of experience.