COURSE NAME

Certified Security Specialist v9

Certified Security Specialist v9 Course Overview

Certified Security Specialist (CSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.

The importance of information security

Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.

Course Outline

This course prepares an individual to sit for ECSS exam This certification is an excellent complement to educational offerings in the domain of security and networking. Educational institutions can provide greater value to students by providing them not only with one of the most updated courses available today, but also a certification that empowers students in the corporate world.

  • Number of Questions: 50
  • Test Duration: 2 Hours
  • Test Format: Multiple Choice

In order to maintain the high integrity of our certifications exams, Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

  • Module 01: Information Security Fundamentals
  • Module 02: Networking Fundamentals
  • Module 03: Secure Network Protocols
  • Module 04: Information Security Threats and Module 05: Attacks
  • Module 05: Social Engineering
  • Module 06: Hacking Cycle
  • Module 07: Identification, Authentication
  • Module 08: Authorization
  • Module 09: Cryptography
  • Module 10: Firewalls
  • Module 11: Intrusion Detection System
  • Module 12: Data Backup
  • Module 13: Virtual Private Network
  • Module 14: Wireless Network Security
  • Module 15: Web Security
  • Module 16: Ethical Hacking and Pen Testing
  • Module 17: Incident Response
  • Module 18: Computer Forensics Fundamentals
  • Module 19: Digital Evidence
  • Module 20: Understanding File Systems
  • Module 21: Windows Forensics
  • Module 22: Network Traffic
  • Module 23: Steganography
  • Module 24: Analyzing Logs
  • Module 25: E-mail Crime and Computer Forensics
  • Module 26: Writing Investigative Report
Course Registration
Online & Offline courses

Start instantly and learn at your own schedule.

Flexible Schedule

Set and maintain flexible deadlines.

International Certificate

Earn a Certificate upon completion