EC-Council Network Security Administrator (ENSA)
FEIT-02

Duration: 5 days
Course description:
The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies.

Who would benefit:
System Administrators, System Engineers, Firewall Administrators, Network Managers, IT Managers, IT Professionals and anyone who is interested in network security technologies


Network Protocols
Protocol Analysis
Hardening Physical Security
Network Security
Security Standards Organizations
Security Standards
Security Policy
IEEE Standards
Network Security Threats
Intrusion Detection System (IDS)

EC-Council Certified Security Analyst (ECSA)
FEIT-03

Duration: 5 days
Course description:
This program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. You will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose.



Who would benefit:
Network Security Professionals


The Need for Security Analysis
Advanced Googling
TCP/IP Packet Analysis
Advanced Sniffing Techniques
Vulnerability Analysis with Nessus
Advanced Wireless Testing
Designing a DMZ

Computer Hacking Forensic Investigator (CHFI)
FEIT-04

Duration: 5 days
Course description:
The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques.

Who would benefit:
Police and other law enforcement personnel,Defense and Military personnel,e-Business Security professionals,Systems administrators.


Computer Investigation Process
First Responder Procedure
CSIRT
Computer Forensics Lab
Understanding File Systems and Hard Disks
Understanding Digital Media Devices
Windows, Linux and Macintosh Boot Processes
Windows Forensics
Linux Forensics
Data Acquisition and Duplication
Computer Forensic Tools


< Page 1[/button] [divider style="divider1" backtotop="yes" top_margin="20" bottom_margin="20"]