Semos Education Training & Certification Programs
Bul. Kuzman Josifovski Pitu br. 19 lok.6, 1000 Skopje, Macedonia phone: +389 (0)2 31 30 900 | e-mail: kursevi@semos.com.mk www.semosedu.com.mk www.facebook.com/semos.edu
Semos Education
Semos Education is the first and the biggest computer education center in Macedonia with 16 educational programs, over 173 diverse courses, 50 certified trainers and over 45.000 satisfied customers. For over 18 years, we share IT knowledge and experience and believe that the learning process is experience which can cause powerful transformation in the individual as well as the companies. We organize a wide range of trainings, designed for various end users with a different level of computer technology knowledge: IT Professionals (Microsoft: Web programmers, Database administrators, Server administrators; Cisco: Network Associates, Network Professionals; Oracle and Java: Associates and Professionals; EC-Council: Ethical Hackers, Forensic Investigators, Security Analysts, Penetration Testers; Vmware Certified Professionals) Official Autodesk Training
Customized Training (MS Office, Adobe, Graphisoft, ITIL, Project Management, Programming, iOS and Android Applications) Children Computer Training in 20 levels (age 8-16)
How to contact us? Semos Education Bul. Kuzman Josifovski Pitu br. 19 lok.6 1000 Skopje, Macedonia phone:
+389 (0)2 31 30 900
e-mail: kursevi@semos.com.mk www.semosedu.com.mk www.facebook.com/semos.edu
College for Graphic and Web Design – one year student programs
www.semosedu.com.mk
1
EC Council Accredited Training Semos Computers Education Center as an Authorized Training Centre (ATC) of International Council of E-Commerce Consultants (EC-Council) organization certifies individuals in various e-business and security skills. EC-Council is the owner and developer of the world famous Certified Ethical Hacker course, Computer Hacking Forensics Investigator program, License Penetration Tester program and various
other programs offered in over 60 countries around the globe. The president and the management of EC-Council awarded Semos Education with Best Newcomer of the Year 2010 award. The EC-Council Awards presentation ceremony was held on Oct 13, during the Hacker Halted Conference in Miami.
What is Ethical Hacking? Because of the increasing danger of cyber attack on a daily basis, government and private organizations are already engaging so called “white hat hackers”, “good hackers” or simply “ethical hackers”. Unlike the hackers with malicious intents, the role of the ethical hacker is to help in dealing and prevention using the proven formula – “To catch a thief you must think like a thief”. The goal of the ethical hacker is to find the flaws and rest of the vulnerabilities of the systems, in order to increase the general security of the information systems. Hacking is a criminal act but if it’s made by demand and in arrangement with the owner, it is completely legal and can be treated as Ethical Hacking.
www.semosedu.com.mk
89
CEH v7 - Ethical Hacking and Countermeasures
90
Course Description
Legal Agreement
Who Should Attend
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
www.semosedu.com.mk
Students need to pass Certified Ethical Hacker exam 312-50 via online Prometric exam system in order to receive CEH certification.
Course Outline Version 7 CEHv7 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class. Introduction to Ethical Hacking
Session Hijacking
Footprinting and Reconnaissance
Hacking Webservers
Scanning Networks
Hacking Web Applications
Enumeration
SQL Injection
System Hacking
Hacking Wireless Networks
Trojans and Backdoors
Evading IDS, Firewalls and Honeypots
Viruses and Worms
Buffer Overflows
Sniffers
Cryptography
Social Engineering
Penetration Testing
Denial of Service
Learn more at: www.eccouncil.org/courses/certified_ethical_hacker.aspx
www.semosedu.com.mk
91
ECSA/LPT Certified Security Analyst
Course Description
Certification
Who Should Attend
ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only indepth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.
Pass exam 412-79 to achieve EC-Council Certified Security Analyst (ECSA) certification. Benefits ECSA is for experienced hands in the industry and is backed by a curriculum designed by the best in the field. Greater industry acceptance as seasoned security professional. Learn to analyze the outcomes from using security tools and security testing techniques. Requirement for the LPT certification.
Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.
Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure.
92
www.semosedu.com.mk
It is strongly recommended that you attend the EH class before enrolling into CHFI program.
Course Outline The Need for Security Analysis Advanced Googling TCP/IP Packet Analysis Advanced Sniffing Techniques Vulnerability Analysis with Nessus Advanced Wireless Testing Designing a DMZ Snort Analysis Log Analysis Advanced Exploits and Tools Penetration Testing Methodologies Customers and Legal Agreements Rules of Engagement
Penetration Testing Planning and Scheduling Pre Penetration Testing Checklist Information Gathering Vulnerability Analysis External Penetration Testing Internal Network Penetration Testing Routers and Switches Penetration Testing Firewall Penetration Testing IDS Penetration Testing Wireless Network Penetration Testing Denial of Service Penetration Testing Password Cracking Penetration Testing
Learn more at: www.eccouncil.org/courses/ec-council_certified_security_analyst.aspx
www.semosedu.com.mk
93
CHFI - Computer Hacking Forensic Investigator
94
Course Description
Prerequisites
Who Should Attend
The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. The need for businesses to become more efficient and integrated with one another, has given way to a new type of criminal, the “cybercriminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers.
www.semosedu.com.mk
Students need to pass CHFI exam 312-49 via online Prometric exam system in order to receive CHFI certification
Course Outline Some of the 64 modules presented on the course: Application Password Crackers
Router Forensics
Network Forensics and Investigating Logs
Tracking E-mails and Investigating E-mail Crimes
Investigating Network Traffic Investigating Wireless Attacks Investigating Web Attacks Investigating Corporate Espionage Investigating Trademark and Copyright Infringement Investigating sexually harassment incidents Investigating Internet Crimes
Computer Investigation Process Windows Forensics Linux Forensics Computer Forensic Tools Recovering Deleted Files and Deleted partitions Image Files Forensics Steganography
Learn more at: www.eccouncil.org/Computer-Hacking-Forensic-Investigator/index.html
www.semosedu.com.mk
95
CSCU - Certified Secure Computer User
96
Course Description
Certification
Who Should Attend
The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identitytheft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.
Students will be prepared for EC-Council’s CSCU exam 112-12. This certification is an excellent complement to educational offerings in the domain of security and networking. Educational institutions can provide greater value to students by providing them not only with one of the most updated courseware available today but with a certification that empower their students in the corporate world. The courseware comes complete with labs and exercises to allow the student to gain actual skills.
This course is specifically designed for todays’ computer users who uses the internet and the www extensively to work, study and play.
www.semosedu.com.mk
Course Outline Foundations of Security
Securing Online Transactions
Securing Operating Systems
Securing Email Communications
Protecting Systems Using Antiviruses
Social Engineering and Identity Theft
Data Encryption
Security on Social Networking Sites
Data Backup and Disaster Recovery
Information Security and Legal
Internet Security
Compliance
Securing Network Connections
Securing Mobile Devices
Learn more at: www.eccouncil.org/courses/entry_level_certifications/ certified_secure_computer_user.aspx
www.semosedu.com.mk
97
Price lists Ethical Hacking Courses #
98
Exam
Courses
Classes
Price (EUR)
1
312-50
CEH v7 - Ethical Hacking and Countermeasures
40
1590
2
412-79
ECSA/LPT - EC Council Certified Security Analyst
40
1590
3
312-49
CHFI - Computer Hacking Forensic Investigator
40
1590
4
112-12
CSCU - Certified Secure Computer User
16
250
www.semosedu.com.mk