Certified Incident Handler (ECIH)

Certified Incident Handler (ECIH)

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Modules

  • Module 1:Introduction to Incident Handling and Response
  • Module 2: incident Handling and Response Process
  • Module 3: Forensics Readiness and First Response
  • Module 4: Handling and Responding to Malware Incidents
  • Module 5: Handling and Responding to Email Security Incidents
  • Module 6: Handling and Responding Network Security Incidents
  • Module 7: Handling and Responding to Web Application Security incidents
  • Module 8: Handling and Responding to Cloud Security Incidents
  • Module 9: Handling and Responding to Insider Threats

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Certified Network Defender

Certified Network Defender

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Module 1-10

  • Module 1: Network Attack and Défense Strategies
  • Module 2: Administrative Network Security
  • Module 3: Technical Network Security
  • Module 4: Network Perimeter Security
  • Module 5: Endpoint Security-WindowsSystems
  • Module 6: Endpoint Security-Linux Devices
  • Module 7: Endpoint Security-Mobile Devices
  • Module 8: Endpoint Security-IoT Devices
  • Module 9: Administrative Application Security
  • Module 10: Data Security

Module 11-20

  • Module 11: Enterprise Virtual Network Security
  • Module 12: Enterprise Cloud Network Security
  • Module 13: Enterprise Wireless Network Security
  • Module 14: Network Traffic Monitoring and Analysis
  • Module 15: Network Logs Monitoring and Analysis
  • Module 16: Incident Response and Forensic Investigation
  • Module 17: Business Continuity and Disaster Recovery
  • Module 18: Risk Anticipation with Risk Management
  • Module 19: Administrative Application Security
  • Module 20: Threat Prediction with Cyber Threat Intelligence

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]

Certified Ethical Hacking v12

Certified Ethical Hacking v12

Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Module 1-5

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Foot Printing and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Enumeration
  • Module 5: Vulnerability Analysis
  • Module 6: System Hacking
  • Module 7: Malware Threats
  • Module 8: Sniffing
  • Module 9: Social Engineering
  • Module 10: Denial-of-Service

Module 11-20

  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT and OT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]