Exam Name: EC-Council Certified Security Specialist (ECSS)
Exam Code: ECSS
EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.
Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.
EC-Council ECSS Exam Summary:
Exam Name
|
EC-Council Certified Security Specialist (ECSS)
|
Exam Code
|
ECSS
|
Exam Price
|
$249 (USD)
|
Duration
|
180 mins
|
Number of Questions
|
100
|
Passing Score
|
70%
|
Books / Training
|
|
Sample Questions
|
|
Practice Exam
|
EC-Council ECSS v9 Exam Syllabus Topics:
Topic | Details |
Network Defense Essentials | - Network Security Fundamentals - Identification, Authentication, and Authorization - Network Security Controls: Administrative Controls - Network Security Controls: Physical Controls - Network Security Controls: Technical Controls - Virtualization and Cloud Computing - Wireless Network Security - Mobile Device Security - IoT Device Security - Cryptography and the Public Key Infrastructure - Data Security - Network Traffic Monitoring |
Ethical Hacking Essentials | - Information Security Fundamentals - Ethical Hacking Fundamentals - Information Security Threats and Vulnerability Assessment - Password Cracking Techniques and Countermeasures - Social Engineering Techniques and Countermeasures - Network Level Attacks and Countermeasures - Web Application Attacks and Countermeasures - Wireless Attacks and Countermeasures - Mobile Attacks and Countermeasures - IOT & OT Attacks and Countermeasures - Cloud Computing Threats and Countermeasures - Penetration Testing Fundamentals |
Digital Forensics Essentials | - Computer Forensics Fundamentals - Computer Forensics Investigation Process - Understanding Hard Disks and File Systems - Data Acquisition and Duplication - Defeating Anti-forensics Techniques - Windows Forensics - Linux and Mac Forensics - Network Forensics - Investigating Web Attacks - Dark Web Forensics - Investigating Email Crimes - Malware Forensics |
0 comments:
Post a Comment