EC-Council Certified Security Specialist (ECSS)



Exam Name: EC-Council Certified Security Specialist (ECSS)

Exam Code: ECSS

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.

Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.



EC-Council ECSS Exam Summary:


Exam Name
EC-Council Certified Security Specialist (ECSS)
Exam Code  
ECSS
Exam Price  
$249 (USD)
Duration 
180 mins 
Number of Questions  
100
Passing Score  
70%
Books / Training  
Sample Questions  
Practice Exam  

EC-Council ECSS v9 Exam Syllabus Topics:


Topic Details
Network Defense Essentials - Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- IoT Device Security
- Cryptography and the Public Key Infrastructure
- Data Security
- Network Traffic Monitoring
Ethical Hacking Essentials - Information Security Fundamentals
- Ethical Hacking Fundamentals
- Information Security Threats and Vulnerability Assessment
- Password Cracking Techniques and Countermeasures
- Social Engineering Techniques and Countermeasures
- Network Level Attacks and Countermeasures
- Web Application Attacks and Countermeasures
- Wireless Attacks and Countermeasures
- Mobile Attacks and Countermeasures
- IOT & OT Attacks and Countermeasures
- Cloud Computing Threats and Countermeasures
- Penetration Testing Fundamentals 
Digital Forensics Essentials - Computer Forensics Fundamentals
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Investigating Email Crimes
- Malware Forensics 

0 comments:

Post a Comment