Computer Hacker Professional Package (incl. CEH, CHFI, CISM, CISA, CISSP) 365 dagen toegang.

Type product
Logo van GetCertified Opleidingen B.V.

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Beschrijving

Master the skills of hacking and penetration to help improve corporate IT security with this comprehensive bundle of courses.

This course includes all the materials and exercises required to obtain the following industry-recognised qualifications:

  • Certified Ethical Hacker.
  • Computer Hacking Forensics Investigator.
  • Certified Information Security Manager (CISM).
  • Certified Information Systems Auditor (CISA).
  • Certified Information Systems Security Professional (CISSP).

As such the course is best suited to:

  • Network engineers and IT security professionals who need to understand hacking techniques so that they can better protect resources.
  • Network engineers and IT security professiona…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Master the skills of hacking and penetration to help improve corporate IT security with this comprehensive bundle of courses.

This course includes all the materials and exercises required to obtain the following industry-recognised qualifications:

  • Certified Ethical Hacker.
  • Computer Hacking Forensics Investigator.
  • Certified Information Security Manager (CISM).
  • Certified Information Systems Auditor (CISA).
  • Certified Information Systems Security Professional (CISSP).

As such the course is best suited to:

  • Network engineers and IT security professionals who need to understand hacking techniques so that they can better protect resources.
  • Network engineers and IT security professionals responsible for investigating network perimeter breaches and data theft incidents.
  • IT professionals who need to earn the certification to prove their experience in the field of network security.
  • IT and network security professionals who need an industry-recognised qualification to prove their knowledge and experience.
  • Any individual interested in making a career move into an IT security role.

KEY LEARNING POINTS

Each course included in the package consists of many modules that will ensure students are able to master each qualification.

The course consists of 19 modules that cover topics like:

  • Using enumeration to catalogue system resources and potential routes to breach.
  • Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks
  • The role of social engineering to steal confidential information directly from employees
  • Using sniffers and session hijacking to mask illegal access to system resources
  • Web-based attacks that can take online systems down.
  • How wireless network security can be breached.
  • How hackers avoid protective measures like IDS, firewalls and honeypots.
  • Using cryptography and steganography to protect data.
  • How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate

Moving on, students will work on the Computer Hacking Forensic Investigator qualification. The course begins with a look at the action required immediately after an attack has been identified including:

  • How to carry out an investigation according to industry best practice principles and legal guidelines.
  • Searching and seizing resources as required for the investigation.
  • How to handle digital evidence to maintain legal standards
  • What the first responder needs to do as soon as a breach is identified to prevent loss of evidence or failing to meet legal evidence requirements.

Students will then look at the in-depth procedures involved in investigating a hacking:

  • Acquiring and duplicating data to preserve evidence and facilitate further investigation
  • Using Access Data’s Forensic Toolkit (FTK), EnCase and special steps to review data whilst leaving all evidence intact.
  • Understanding steganography and how such techniques can be used to mask data theft
  • Password recovery techniques and how to circumvent basic technologies employed to hide criminal activity.

Students will work on the Certified Information Security Manager (CISM) qualification, by mastering subjects like:

  • Information Security management.
  • How To Develop An Information Security Strategy
  • Risk Assessment Methodologies
  • How To Implement An Info Risk Assessment Process
  • Conversation Of Strategies Into Implementation Plans
  • Integrating Enterprise Business Objectives And Info Security Policies
  • Security Stakeholder Education Process
  • Components Of Incident Response

Students will then work on achieving the Certified Information Systems Auditor (CISA) qualification, by mastering subjects like:

  • Internal Control Classifications.
  • IT Strategy
  • Information Systems Maintenance Practices
  • Media Disposal Process
  • How To Evaluate Service Level Management Practices
  • Network Security Devices And Network Components
  • Business Continuity And Disaster Recovery Regulations

When students work on the Certified Information Systems Security Professional (CISSP) qualification, they will learn about:

  • Accounts And Identity Management
  • Technical Penetration Testing
  • Layers Of Protection
  • Connectivity Interfaces And Applications
  • Digital Signature Overview
  • How to Apply Integrity Controls
  • Types of Encryption
  • Software OS and Design
  • Data Backup and Control
  • Policy and Program Management

ADVANTAGES OF THIS COURSE

This comprehensive package contains everything students need to reach the highest levels of IT security professionalism and attain not one, but five industry-recognised qualifications. Using this knowledge students will benefit from:

  • A deeper understanding of network security, backed by the skills to improve their own systems.
  • A comprehensive suite of skills that ensures they are more productive and efficient at work.
  • The necessary knowledge to take on new responsibilities and secure promotions within the IT security team.
  • Well-regarded practical skills that are in-demand worldwide, creating many new employment opportunities.

The Computer Hacker Professional Package is an extremely cost-effective way for learners to acquire all the practical skills and knowledge. This course contains everything needed to join the world’s elite IT security specialists.

  • Units of Study

Certified Ethical Hacker

  • Intro to course
  • Footprinting & Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Viruses & Worms
  • Denial of Service
  • Social Engineering
  • Sniffers
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls & Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

Computer Hacking Forensic Investigator

  • Computer Forensics Introduction
  • Forensics Investigation Process
  • Searching and Seizing
  • Digital Evidence
  • First Responder Procedures
  • Forensics Lab
  • Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Using Access Data FTK
  • Using EnCase
  • Steganography
  • Password Crackers
  • Log Correlation
  • Network Forensics
  • Wireless Attacks
  • Web Attacks
  • Email Crimes
  • Mobile Investigation
  • Investigative Reports
  • Expert Witness

Certified Information Security Manager (CISM)

  • Information Security Governance
  • Risk Management
  • Information Security Program
  • Information Security Program Implementation
  • Information Security Program Management
  • Incident Management and Response

Certified Information Systems Auditor (CISA)

  • Lesson 1
  • Lesson 2
  • Lesson 3
  • Lesson 4
  • Lesson 5
  • Lesson 6
  • Lesson 7

Certified Information Systems Security Pro (CISSP)

  • Module 1
  • Module 2
  • Module 3
  • Module 4
  • Module 5
  • Module 6
  • Module 7
  • Module 8
  • Module 9
  • Module 10
  • Module 11

GetCertified Opleidingen heeft meer dan 600 up to date opleidingen online voor de ICT professional inclusief meestal 24/7 live hulp en live labs.  

GetCertified Opleidingen is een erkend instituut voor beroepsopleidingen daarom hoeven wij geen BTW te berekenen dus... 21% meer opleiding voor je budget!

In ons instituut in Arnhem kan je ook terecht voor flexibele en praktijkgerichte Microsoft Office cursussen zoals Word, Excel, Outlook, Access, PowerPoint, Windows en secretariele opleidingen voor bedrijven, instellingen en overheid. Alle opleidingen starten dagelijks en gaan altijd door.

Blijf op de hoogte van nieuwe ervaringen

Er zijn nog geen ervaringen.

Deel je ervaring

Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Vraag nu gratis en vrijblijvend informatie aan:

Aanhef
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)
We slaan je gegevens op, en delen ze met GetCertified Opleidingen B.V., om je via e-mail en evt. telefoon verder te helpen. Meer info vind je in ons privacybeleid.