CERTIFIED SECURITY SPECIALIST (ECSS)
40 hours training
Course Overview
Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the conÂdentiality, integrity, and availability of information and information processing.
In communications, information security also covers trustworthy authentication of messages that covers identiÂcation of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.
Course Objectives
– Key issues plaguing the information security, network security, and computer forensics
– Social engineering techniques, identify theft, and social engineering countermeasures
– Fundamentals of networks and various components of the OSI and TCP/IP model
– Different stages of the hacking cycle
– Various network security protocols
– Identification, authentication, and authorization concepts
Course Prerequisites
No Prerequisite