Monday, May 25, 2020

Certified Chief Information Security Officer Training (CCISO) – EC Council

Cyber executives, the Certified Chief Information Security Officer Training (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs. This comprehensive program addressed six domains: 1) Governance and Risk Management, 2) Information Security Controls, Compliance and Audit Management, 3) Security Program Management and Operations, 4) Information Security Core Competencies, and 5) Strategic Planning, Finance, Procurement and Vendor Management. Two training-certification options include: 1) Courseware Only This option is available to individuals who possess the requisite Information Security Management experience. Self-study candidates must submit the Exam Eligibility application proving they have at least five years of experience in each of the five C|CISO domains. Exam Eligibility Application, or 2) iLearn Self-Paced Online Security Management Training iLearn is EC Council’s facilitated self-paced option. Facilitated in that all of the same modules taught in the live course are recorded and presented in a streaming video format. Self-paced in that a certification candidate can set their own learning pace by pausing the lectures and returning to their studies.

Register today at:  https://tinyurl.com/yaxups3x

Much career success, Lawrence Wilson – Cybersecurity Certification Center

Monday, May 18, 2020

Certified Hacking Forensic Investigator Training – EC Council (CHFI) [Exam 312-49]

InfoSec & Cyber colleagues, computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery. The purpose of the CHFI credential is to validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Training modules cover: 1) Computer Forensics in Today’s World, 2) Computer Forensics Investigation Process, 3) Understanding Hard Disks and File Systems, 4) Operating System Forensics, 5) Defeating Anti-Forensics Techniques, 6) Data Acquisition and Duplication, 6) Network Forensics, 7) Investigating Web Attacks, 8) Database Forensics, 9) Cloud Forensics, 10) Malware Forensics, 11) Investigating Email Crimes, 11) Mobile Forensics, and finally 12) Investigative Reports. The 312-49 Exam has 150 multiple choice questions over 4 hours.

Register today at:  https://tinyurl.com/y92v79nf

Much career success, Lawrence Wilson – Cybersecurity Certification Center

EC Council Security Analyst (ECSA) [Practical] – EC Council {Penetration Testing}

Pen Testing colleagues, the ECSA “Practical” level certification training is a 12-hour, rigorous program exam built to test your penetration testing skills. ECSA (Practical) will present you with an organization and its network environment, containing multiple hosts. The internal network consists of several subnets housing various organizational units.  The preparatory course for this certification is the EC-Council Certified Security Analyst (ECSA) course. While there is no additional course or training required after the ECSA, it is strongly recommended that you attempt the ECSA (Practical) exam only if you have attended the current ECSA course or equivalent training. Application Process In order to proceed with the exam the below steps will need to be completed: 1) The exam dashboard code can be purchased, and 2) Upon successful purchase, the candidate will be sent the exam dashboard code with instructions to schedule the exam (valid for one year). Should you require the exam dashboard code validity to be extended, kindly contact the EC Council before the expiry date. Only valid/ active codes can be extended. The exam needs to be scheduled a minimum 3 days prior to the desired exam date. Exam slots are subject to availability. Training options include: 1) iLearn (Self-Study), 2) iWeek (Live Online), 3) Master Class, and 4) In-Person Instructor-led class.

Register today at:  https://tinyurl.com/y96rsnnc

Much career success, Lawrence Wilson – Cybersecurity Certification Center

Monday, May 11, 2020

Certified Threat Intelligence Analyst Training (CTIA) – EC Council

Cyber colleagues, this program is based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence. Why become a Certified Threat Intelligence Analyst? C|TIA is built in compliance with JTA listed under ‘Analyze’ category of NICE 2.0. The credential helps increase employability. It is developed by SMEs and follows the Detect, Respond, Defeat Methodology. Moreover, C|TIA is a holistic approach to Threat Intelligence. Ultimately, this program equips professionals combat Cyber Threats. Course Outline addresses: 1) Introduction to Threat Intelligence, 2) Cyber Threats and Kill Chain Methodology, 3) Requirements, Planning, Direction, and Review, 4) Data Collection and Processing, 5) Data Analysis, and 6) Intelligence Reporting and Dissemination.

Register today at:  https://tinyurl.com/y9q7u28e

Much career success, Lawrence Wilson – Cybersecurity Certification Center


Certified Application Security Engineer Training (CASE .Net & Java) – EC Council

Cyber colleagues, the Certified Application Security Engineer (CASE) training and certification program provides a comprehensive application security approach which encompasses security activities involved in all the phases of Software Development Lifecycle (SDLC). Duration: Total Training: 24 hours or 3 full-day sessions. Attendees receive a copy of the CASE courseware, an EC-Council CASE exam voucher, and access to iLabs (EC-Council’s cloud driven labs environment). The CASE exam can be challenged after attending the official CASE training. Candidates that successfully pass the exam will receive their CASE certificate and membership privileges. Members are expected to adhere to the policies of EC-Council’s Continuing Education Requirements. Training modules address: 1) Understanding Application Security, Threats, and Attacks, 2) Requirements Gathering, 3) Application Design and Architecture, 4) Coding Practices for Input Validation, 5) Coding Practices for Authentication and Authorization, 6) Coding Practices for Cryptography, 7) Coding Practices for Session Management, 8) Coding Practices for Error Handling, 9) Static and Dynamic Application Security Testing (SAST & DAST), and 10) Secure Deployment and Maintenance.

Register today:

Much career success, Lawrence Wilson – Cybersecurity Certification Center

Saturday, May 9, 2020

Certified Hacking Forensic Investigator Training – EC Council (CHFI - Exam 312-49)

InfoSec & Cyber colleagues, computer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery. The purpose of the CHFI credential is to validate the candidate’s skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law. Training modules cover: 1) Computer Forensics in Today’s World, 2) Computer Forensics Investigation Process, 3) Understanding Hard Disks and File Systems, 4) Operating System Forensics, 5) Defeating Anti-Forensics Techniques, 6) Data Acquisition and Duplication, 6) Network Forensics, 7) Investigating Web Attacks, 8) Database Forensics, 9) Cloud Forensics, 10) Malware Forensics, 11) Investigating Email Crimes, 11) Mobile Forensics, and finally 12) Investigative Reports. The 312-49 Exam has 150 multiple choice questions over 4 hours.

Register today at:  https://tinyurl.com/y92v79nf

Much career success, Lawrence Wilson – Cybersecurity Certification Center