Security Consultant Engineer

Security Consultant Engineer

Description

Security Consultant Engineer Certification ensure that the candidates can understand the threats and risks to information and information resources, identify best practices that can be used to protect them, and learn to diversify their protection strategy. They will also be able to develop, design and implement best practices and techniques for environment in which operates.

  • SCEC is 1 year training in information security for amateurs and professionals to make you an expert in the field of Security Consulting.
  • This Certification is ideal for those wanting to differentiate themselves from candidates with an undergraduate degree only, as well as those already in industry wishing to advance their skills in this constantly evolving area.
  • Many companies are actively recruiting security specialists and this Certification course will prepare graduates for senior technical and management positions in many industry sectors.
TRAINING
  • The SCEC training is designed to make you an expert in the domain of security consulting.
  • While most certification programs are geared towards purely technical know-how, the SCEC also arms you with the necessary consulting skills in order to help you make your mark in this exciting field.
  • SCEC covers a wide variety of topics, starting right from the basics, and then leading up to compliance standards.
  • SCEC includes the basic fundamentals as well as advanced concepts.
  • You will be given comprehensive and highly useful study material on all the sessions.
  • The best part about the SCEC is the fact that you get hands-on practical training (Labs).
COURSE

Candidates could prepare for the exam by taking the Training Course:  Security Consultant Engineer Bootcamp.

COURSE CONTENTS
MODULE TOPICS
Foundations
  • Data Communication
  • Types of Networks
  • ISO OSI Model
  • IP Address
  • Ports
  • Networking Protocols
  • Hardware/Software related to Networking
  • Networking Essentials
  • Basics of Operating Systems/Databases/Networks
Introduction to Information Security
  • Identification, Authentication and Authorization
  • Security Principles and Models
  • Data protection principles
  • Introduction to Information Systems
TCP/IP Fundamentals
  • Introduction to TCP/IP
  • Features of TCP/IP
  • Protocol Standards
  • TCP/IP Protocol Architecture
Operating System Security
  • Security Fundamentals
  • Windows
  • UNIX
  • Solaris
  • Linux
  • Hp-Ux
Database Security
  • Oracle
  • MS SQL
  • Sybase
  • Other(s)
Web Application Security
  • Security Fundamentals
  • Introduction and Case Studies
  • Web Application Vulnerabilities
  • Secure Coding Techniques
  • Security testing and assessments
  • Threat Modeling
Network Security
  • Security Fundamentals
  • Attack Types and Encryption
  • Protocol Layers and Security
  • Firewalls
  • Operating System Security
  • Assessing and Reducing Risk
  • Security Auditing
  • Auditing and the Control Phase
  • Attack Detection and Response
  • Auditing and Log Analysis
  • Penetration tests
  • Traffic analyses
  • Certification support
Ethical Hacking
  • Network Cartography
  • Footprinting and Fingerprinting
  • Vulnerability Assessment
  • Exploitation
  • Metasploit Framework
  • Social Engineering
  • Honey Pots
  • Password Cracking
  • Cryptography
  • Wireless Hacking
Advanced Ethical Hacking
  • Esoteric Hacking
  • RFID and Bluetooth Hacking
  • Writing Exploits
  • Reverse Engineering
  • Advanced Metasploit
  • Botnets
Physical Security
  • Facility Requirement
  • Perimeter Security
  • Fire Protection
  • Fire Suppression
  • Power Protection
  • General Environmental Protection
  • Equipment Failure Protection
BENEFITS
  • The SCEC is the only completely hands-on, real-world oriented security certification.
  • It is a course designed by security professionals, and for security professionals.
  • The best in the business personally mentor you.
  • You are trained by a group of professionals who have worked on prestigious international projects, presented at the leading security conferences around the world, and written numerous books and articles.
  • The course comprehensively covers all the main aspects of security from the basics to compliance standards making you one of the most sought after security professionals
  • The content is updated very regularly in accordance to the requirements of this dynamic industry.
  • There are many opportunities available for students with our consulting arm
  • We will conduct exams with practical’s and theory
  • Experts will set up these exams
REQUIREMENTS
  • 1 proctored exam.
  • Between 200 and 400 questions.
  • Time limit of 4h+4h.
  • Maximum Score 1000 points. Minimum Score to be approved 800 points.
RENEW

Certifications must be renewed every 5 years.

WordPress Appliance - Powered by TurnKey Linux