Information Security Engineer

Information Security Engineer

Description

 Information Security Engineer Certification ensure that the candidates can understand the threats and risks to information and information resources, identify best practices that can be used to protect them, and learn to diversify protection strategy.

The target professionals of this certification are Managers, Information Security Officers, and System Administrators who need an overview of risk management and defense in depth techniques.

  • ISEC is 1 year training in information security for professionals to make you an expert in the field of Information Security.
  • This Certification is ideal for those wanting to differentiate themselves from candidates with an undergraduate degree only, as well as those already in industry wishing to advance their skills in this constantly evolving area.
  • Many companies are actively recruiting security specialists and this Certification course will prepare graduates for senior technical and management positions in many industry sectors.
TRAINING
  • The ISEC training is designed to make you an expert in the domain of information security.
  • While most certification programs are geared towards purely technical know-how, the ISEC also arms you with the necessary consulting skills in order to help you make your mark in this exciting field.
  • ISEC covers a wide variety of topics, starting right from the basics, and then leading up to compliance standards, and even forensics and cyber crime investigations.
  • ISEC includes the basic fundamentals as well as advanced concepts.
  • You will be given comprehensive and highly useful study material on all the sessions.
  • The best part about the ISEC is the fact that you get hands-on practical training on live projects.
COURSE

Candidates could prepare for the exam by taking the Training Course:Information Security Engineer Bootcamp.

COURSE CONTENTS
MODULE TOPICS
Foundations
  • Data Communication
  • Types of Networks
  • ISO OSI Model
  • IP Address
  • Ports
  • Networking Protocols
  • Hardware/Software related to Networking
  • Networking Essentials and Advanced Techniques
  • Operating Systems/Databases/Networks
Introduction to Information Security
  • The CIA Triad
  • Identification, Authentication and Authorization
  • Security Principles and Models
  • Data protection principles
TCP/IP Fundamentals
  • Introduction to TCP/IP
  • Features of TCP/IP
  • Protocol Standards
  • TCP/IP Protocol Architecture
Network Security
  • Secure Network design
  • DMZ
  • VLANs
  • Firewalls
  • IDS / IPS
  • Wireless LAN Security
  • VPNs
  • Telecommunications
  • Types and Sources of Network Threats
Operating System Security
  • Security Fundamentals
  • Windows
  • UNIX
  • Solaris
  • Linux
  • HP-UX
Database Security
  • Oracle
  • MS SQL
  • Sybase
  • Other(s)
Web Application Security
  • Security Fundamentals
  • Introduction and Case Studies
  • Web Application Vulnerabilities
  • Secure Coding Techniques
  • Security testing and assessments
  • Threat Modeling
Cloud Computing
  • Basics
Wireless Security
  • Advanced Techniques and Configurations
Ethical Hacking
  • Network Cartography
  • Footprinting and Fingerprinting
  • Vulnerability Assessment
  • Exploitation
  • Metasploit Framework
  • Social Engineering
  • Honey Pots
  • Password Cracking
  • Cryptography
  • Wireless Hacking
Advanced Ethical Hacking
  • Esoteric Hacking
  • RFID and Bluetooth Hacking
  • Writing Exploits
  • Reverse Engineering
  • Advanced Metasploit
  • Botnets
Digital Forensics
  • Hacking Incidents
  • Defining Forensics Process
  • Digital Forensics Essentials – The six A’s
  • Preserving the Chain of Custody
  • Disk Based Forensics
  • Network Based Forensics
  • Encase and advanced digital forensics techniques.
  • European IT Act 2010 and Other Cyber Laws
Compliance standards
  • Implementing and Information Security Management System
  • Risk Assessments (NIST & OCTAVE)
  • ISO 27001
  • ISO 20000
  • BS 25999
  • PCI DSS
  • ITIL framework
  • COBIT framework
Physical Securitys
  • Facility Requirement
  • Perimeter Security
  • Fire Protection
  • Fire Suppression
  • Power Protection
  • General Environmental Protection
  • Equipment Failure Protection
BENEFITS
  • The ISEC is the only completely hands-on, real-world oriented security certification.
  • It is a course designed by security professionals, and for security professionals.
  • The best in the business personally mentor you.
  • You are trained by a group of professionals who have worked on prestigious international projects, presented at the leading security conferences around the world, and written numerous books and articles.
  • The course comprehensively covers all the main aspects of information security from the basics to compliance standards making you one of the most sought after IS professionals
  • The content is updated very regularly in accordance to the requirements of this dynamic industry.
  • There is 100% job guarantee for students who qualify
  • There are many opportunities available for students with our consulting arm
  • We will conduct exams with practical’s and theory
  • Experts will set up these exams
REQUIREMENTS
  • 1 proctored exam.
  • Between 200 and 400 questions.
  • Time limit of 4h+4h.
  • Maximum Score 1000 points. Minimum Score to be approved 800 points.
RENEW

Certifications must be renewed every 5 years.

WordPress Appliance - Powered by TurnKey Linux