EC-Council official courses

Page 1

Semos Education Training & Certification Programs


Bul. Kuzman Josifovski Pitu br. 19 lok.6, 1000 Skopje, Macedonia phone: +389 (0)2 31 30 900  | e-mail: kursevi@semos.com.mk www.semosedu.com.mk www.facebook.com/semos.edu


Semos Education

Semos Education is the first and the biggest computer education center in Macedonia with 16 educational programs, over 173 diverse courses, 50 certified trainers and over 45.000 satisfied customers. For over 18 years, we share IT knowledge and experience and believe that the learning process is experience which can cause powerful transformation in the individual as well as the companies. We organize a wide range of trainings, designed for various end users with a different level of computer technology knowledge: IT Professionals (Microsoft: Web programmers, Database administrators, Server administrators; Cisco: Network Associates, Network Professionals; Oracle and Java: Associates and Professionals; EC-Council: Ethical Hackers, Forensic Investigators, Security Analysts, Penetration Testers; Vmware Certified Professionals) Official Autodesk Training

Customized Training (MS Office, Adobe, Graphisoft, ITIL, Project Management, Programming, iOS and Android Applications) Children Computer Training in 20 levels (age 8-16)

How to contact us? Semos Education Bul. Kuzman Josifovski Pitu br. 19 lok.6 1000 Skopje, Macedonia phone:

+389 (0)2 31 30 900

e-mail: kursevi@semos.com.mk www.semosedu.com.mk www.facebook.com/semos.edu

College for Graphic and Web Design – one year student programs

www.semosedu.com.mk

1


EC Council Accredited Training Semos Computers Education Center as an Authorized Training Centre (ATC) of International Council of E-Commerce Consultants (EC-Council) organization certifies individuals in various e-business and security skills. EC-Council is the owner and developer of the world famous Certified Ethical Hacker course, Computer Hacking Forensics Investigator program, License Penetration Tester program and various

other programs offered in over 60 countries around the globe. The president and the management of EC-Council awarded Semos Education with Best Newcomer of the Year 2010 award. The EC-Council Awards presentation ceremony was held on Oct 13, during the Hacker Halted Conference in Miami.

What is Ethical Hacking? Because of the increasing danger of cyber attack on a daily basis, government and private organizations are already engaging so called “white hat hackers”, “good hackers” or simply “ethical hackers”. Unlike the hackers with malicious intents, the role of the ethical hacker is to help in dealing and prevention using the proven formula – “To catch a thief you must think like a thief”. The goal of the ethical hacker is to find the flaws and rest of the vulnerabilities of the systems, in order to increase the general security of the information systems. Hacking is a criminal act but if it’s made by demand and in arrangement with the owner, it is completely legal and can be treated as Ethical Hacking.

www.semosedu.com.mk

89


CEH v7 - Ethical Hacking and Countermeasures

90

Course Description

Legal Agreement

Who Should Attend

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

www.semosedu.com.mk

Students need to pass Certified Ethical Hacker exam 312-50 via online Prometric exam system in order to receive CEH certification.


Course Outline Version 7 CEHv7 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class. Introduction to Ethical Hacking

Session Hijacking

Footprinting and Reconnaissance

Hacking Webservers

Scanning Networks

Hacking Web Applications

Enumeration

SQL Injection

System Hacking

Hacking Wireless Networks

Trojans and Backdoors

Evading IDS, Firewalls and Honeypots

Viruses and Worms

Buffer Overflows

Sniffers

Cryptography

Social Engineering

Penetration Testing

Denial of Service

Learn more at: www.eccouncil.org/courses/certified_ethical_hacker.aspx

www.semosedu.com.mk

91


ECSA/LPT Certified Security Analyst

Course Description

Certification

Who Should Attend

ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only indepth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.

Pass exam 412-79 to achieve EC-Council Certified Security Analyst (ECSA) certification. Benefits ECSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field. Greater industry acceptance as seasoned security professional. Learn to analyze the outcomes from using security tools and security testing techniques. Requirement for the LPT certification.

Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.

Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure.

92

www.semosedu.com.mk

It is strongly recommended that you attend the EH class before enrolling into CHFI program.


Course Outline The Need for Security Analysis Advanced Googling TCP/IP Packet Analysis Advanced Sniffing Techniques Vulnerability Analysis with Nessus Advanced Wireless Testing Designing a DMZ Snort Analysis Log Analysis Advanced Exploits and Tools Penetration Testing Methodologies Customers and Legal Agreements Rules of Engagement

Penetration Testing Planning and Scheduling Pre Penetration Testing Checklist Information Gathering Vulnerability Analysis External Penetration Testing Internal Network Penetration Testing Routers and Switches Penetration Testing Firewall Penetration Testing IDS Penetration Testing Wireless Network Penetration Testing Denial of Service Penetration Testing Password Cracking Penetration Testing

Learn more at: www.eccouncil.org/courses/ec-council_certified_security_analyst.aspx

www.semosedu.com.mk

93


CHFI - Computer Hacking Forensic Investigator

94

Course Description

Prerequisites

Who Should Attend

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. The need for businesses to become more efficient and integrated with one another, has given way to a new type of criminal, the “cybercriminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.

It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers.

www.semosedu.com.mk

Students need to pass CHFI exam 312-49 via online Prometric exam system in order to receive CHFI certification


Course Outline Some of the 64 modules presented on the course: Application Password Crackers

Router Forensics

Network Forensics and Investigating Logs

Tracking E-mails and Investigating E-mail Crimes

Investigating Network Traffic Investigating Wireless Attacks Investigating Web Attacks Investigating Corporate Espionage Investigating Trademark and Copyright Infringement Investigating sexually harassment incidents Investigating Internet Crimes

Computer Investigation Process Windows Forensics Linux Forensics Computer Forensic Tools Recovering Deleted Files and Deleted partitions Image Files Forensics Steganography

Learn more at: www.eccouncil.org/Computer-Hacking-Forensic-Investigator/index.html

www.semosedu.com.mk

95


CSCU - Certified Secure Computer User

96

Course Description

Certification

Who Should Attend

The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identitytheft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.

Students will be prepared for EC-Council’s CSCU exam 112-12. This certification is an excellent complement to educational offerings in the domain of security and networking. Educational institutions can provide greater value to students by providing them not only with one of the most updated courseware available today but with a certification that empower their students in the corporate world. The courseware comes complete with labs and exercises to allow the student to gain actual skills.

This course is specifically designed for todays’ computer users who uses the internet and the www extensively to work, study and play.

www.semosedu.com.mk


Course Outline Foundations of Security

Securing Online Transactions

Securing Operating Systems

Securing Email Communications

Protecting Systems Using Antiviruses

Social Engineering and Identity Theft

Data Encryption

Security on Social Networking Sites

Data Backup and Disaster Recovery

Information Security and Legal

Internet Security

Compliance

Securing Network Connections

Securing Mobile Devices

Learn more at: www.eccouncil.org/courses/entry_level_certifications/ certified_secure_computer_user.aspx

www.semosedu.com.mk

97


Price lists Ethical Hacking Courses #

98

Exam

Courses

Classes

Price (EUR)

1

312-50

CEH v7 - Ethical Hacking and Countermeasures

40

1590

2

412-79

ECSA/LPT - EC Council Certified Security Analyst

40

1590

3

312-49

CHFI - Computer Hacking Forensic Investigator

40

1590

4

112-12

CSCU - Certified Secure Computer User

16

250

www.semosedu.com.mk



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.