Cyber
executives, the Certified Chief Information Security Officer Training (CCISO) program is the first of
its kind training and certification program aimed at producing top-level information
security executives. The CCISO does not focus solely on technical knowledge but
on the application of information security management principles from an
executive management point of view. The program was developed by sitting CISOs
for current and aspiring CISOs. This comprehensive program addressed six
domains: 1) Governance and Risk Management, 2) Information Security Controls,
Compliance and Audit Management, 3) Security Program Management and Operations,
4) Information Security Core Competencies, and 5) Strategic Planning, Finance,
Procurement and Vendor Management. Two training-certification options include:
1) Courseware Only This option is available to individuals who possess the
requisite Information Security Management experience. Self-study candidates
must submit the Exam Eligibility application proving they have at least five
years of experience in each of the five C|CISO domains. Exam Eligibility Application, or 2) iLearn Self-Paced Online
Security Management Training iLearn is EC Council’s facilitated self-paced
option. Facilitated in that all of the same modules taught in the live course
are recorded and presented in a streaming video format. Self-paced in that a certification
candidate can set their own learning pace by pausing the lectures and returning
to their studies.
InfoSec
& Cyber colleagues, computer forensics
is the application of computer investigation and analysis techniques in the
interests of determining potential legal evidence. Evidence might be sought in
a wide range of computer crime or misuse, including but not limited to theft of
trade secrets, theft of or destruction of intellectual property, and fraud.
CHFI investigators can draw on an array of methods for discovering data that
resides in a computer system, or recovering deleted, encrypted, or damaged file
information known as computer data recovery. The purpose of the CHFI credential is to validate
the candidate’s skills to identify an intruder’s footprints and to properly
gather the necessary evidence to prosecute in the court of law. Training modules
cover: 1) Computer Forensics in Today’s
World, 2) Computer Forensics Investigation
Process, 3) Understanding Hard Disks and
File Systems, 4) Operating System Forensics,
5) Defeating Anti-Forensics Techniques, 6) Data Acquisition and Duplication, 6) Network Forensics, 7) Investigating
Web Attacks, 8) Database Forensics,
9) Cloud Forensics, 10) Malware Forensics, 11) Investigating
Email Crimes, 11) Mobile Forensics,
and finally 12) Investigative Reports. The
312-49 Exam has 150 multiple choice questions over 4 hours.
Pen
Testing colleagues, the ECSA “Practical” level certification training is a
12-hour, rigorous program exam built to test your penetration testing skills. ECSA
(Practical) will present you with an organization and its network environment,
containing multiple hosts. The internal network consists of several subnets
housing various organizational units. The
preparatory course for this certification is the EC-Council Certified Security
Analyst (ECSA) course. While there is no additional course or training
required after the ECSA, it is strongly recommended that you attempt the ECSA
(Practical) exam only if you have attended the current ECSA course or equivalent
training. Application Process In order to proceed with the exam the below
steps will need to be completed: 1) The exam dashboard code can be purchased,
and 2) Upon successful purchase, the candidate will be sent the exam dashboard
code with instructions to schedule the exam (valid for one year). Should you
require the exam dashboard code validity to be extended, kindly contact the EC
Council before the expiry date. Only valid/ active codes can be extended. The
exam needs to be scheduled a minimum 3 days prior to the desired exam date.
Exam slots are subject to availability. Training options include: 1) iLearn
(Self-Study), 2) iWeek (Live Online), 3) Master Class, and 4) In-Person
Instructor-led class.
Cyber colleagues, this
program is based on a rigorous Job Task Analysis (JTA) of the job roles involved
in the field of threat intelligence. It is a highly interactive, comprehensive,
standards-based, intensive 3-day training program that teaches information
security professionals to build professional threat intelligence. Why become a
Certified Threat Intelligence Analyst? C|TIA is built in
compliance with JTA listed under ‘Analyze’ category of NICE 2.0. The credential helps increase employability. It is developed by SMEs and follows the Detect, Respond, Defeat Methodology.
Moreover, C|TIA is a holistic approach
to Threat Intelligence. Ultimately, this program equips professionals combat Cyber Threats.
Course Outline
addresses: 1) Introduction to Threat Intelligence,
2) Cyber Threats and
Kill Chain Methodology,
3) Requirements,
Planning, Direction, and Review,
4) Data Collection and
Processing, 5) Data Analysis,
and 6) Intelligence
Reporting and Dissemination.
Cyber colleagues,
the Certified Application Security Engineer (CASE) training and certification
program provides a comprehensive application security approach which
encompasses security activities involved in all the phases of Software
Development Lifecycle (SDLC). Duration: Total Training: 24 hours or 3 full-day
sessions. Attendees receive a copy of the CASE courseware,
an EC-Council CASE exam voucher, and access to iLabs (EC-Council’s cloud driven
labs environment). The CASE exam can be challenged after attending the official
CASE training. Candidates that successfully pass the exam will receive their
CASE certificate and membership privileges. Members are expected to adhere to
the policies of EC-Council’s Continuing Education Requirements. Training modules
address: 1) Understanding Application Security, Threats, and Attacks, 2) Requirements
Gathering, 3) Application Design
and Architecture, 4) Coding Practices for
Input Validation, 5) Coding Practices for
Authentication and Authorization, 6) Coding Practices for
Cryptography, 7) Coding Practices for
Session Management, 8) Coding Practices for
Error Handling, 9) Static and Dynamic
Application Security Testing (SAST & DAST), and 10) Secure Deployment and Maintenance.
Register today:
InfoSec
& Cyber colleagues, computer forensics
is the application of computer investigation and analysis techniques in the
interests of determining potential legal evidence. Evidence might be sought in
a wide range of computer crime or misuse, including but not limited to theft of
trade secrets, theft of or destruction of intellectual property, and fraud.
CHFI investigators can draw on an array of methods for discovering data that
resides in a computer system, or recovering deleted, encrypted, or damaged file
information known as computer data recovery. The purpose of the CHFI credential is to validate
the candidate’s skills to identify an intruder’s footprints and to properly
gather the necessary evidence to prosecute in the court of law. Training modules
cover: 1) Computer Forensics in Today’s
World, 2) Computer Forensics Investigation
Process, 3) Understanding Hard Disks and
File Systems, 4) Operating System Forensics,
5) Defeating Anti-Forensics Techniques, 6) Data Acquisition and Duplication, 6) Network Forensics, 7) Investigating
Web Attacks, 8) Database Forensics,
9) Cloud Forensics, 10) Malware Forensics, 11) Investigating
Email Crimes, 11) Mobile Forensics,
and finally 12) Investigative Reports. The 312-49
Exam has 150 multiple choice questions over 4 hours.