Tactical, Operational & Strategic Analysis of Markets, Competitors & Industries
INTRODUCTION:
The development of technologies always has impacts, in positive or negative ways, on businesses, cultures, economies and even on countries. Information Technology is one of the most effective tools with rapid development characteristics for itself as well as businesses around the globe. Cyber Security is one of the best branch or modern tool of Information Technology with respect to security concerns and risk management factors. Information technology is highly integrated into our everyday lives. As a society, we have gone digital. We play, learn, socialize, communicate, and do business online. While cyberspace brings significant benefits, our ever increasing reliance on it, causing or creating new and significant vulnerabilities.
Voice of Green Hat, brought an innovative research based certificate in cyber security along with a number of other cutting edge certifications. This research based certificate is called ECCS. Executive certificate in Cyber Security provides a number of research based in skills, highly brained storm strategy to tackle the problems and multidimensional techniques to countermeasure the cyber-attacks and hacking in the cyber space. Not only this, ECCS also covers intermediate skills for digital forensic investigation, risk management and competitive intelligence to understand the attacker’s approaches as well as having deep understanding with today’s Cyber War scenario. This certificate contains five modules of Cyber security & Law; Ethical Hacking & Countermeasure; Digital Forensic Investigation; Competitive Intelligence and Important Demanded Skills.
This revised certificate also leads towards the specialization such as “Social Media”, “Cloud & Robotic Security”, “Competitive Intelligence”, "Digital Forensic Investigation" and “Web Applications Penetration Test Engineer.
CURRICULUM:
Module ECCS 01:Cyber Security & Laws
A. Introduction to Cyber World, Cyber Security, Internet Security, Computer Security
B. Cyber Laws in Malaysia, Pakistan, USA, Japan, UK, Australia, Germany, Singapore
C. Cyber Crimes, Law Sections and Penalties
Module ECCS 02:Ethical Hacking & Countermeasures
A. Introduction to Ethical Hacking, Virtualizaion and Cloud Computing
B. Foot printing, Scanning, Enumeration
C. System Hacking , Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking
D. Hacking Web Servers , Web Application Vulnerabilities ,Web-based Password Cracking Techniques
E. SQL Injection, Hacking Wireless Networks , Virus and Worms
F. Physical Security
G. Linux Hacking, Evading IDS, Firewalls, and Honey pots, Buffer Overflows
H. Cryptography, Penetration Testing
Module ECCS 03: Computer Forensic Investigation
A. Introduction to Computer Forensics Investigation
B. Data Recovery Software Tools
C. Password Recovery Tools Kits Software
Module ECCS 04: Competitive Intelligence
A. Introduction to competitive Intelligence (CI)
B. Ethics of CI
C. Competitive Intelligence and Espionage
Module ECCS 05: Important Market Demanded Skills
A. Basic Skills of Web Programming
B. Basic Skills of Networking for Windows/ Cisco
C. Basic Skills of Cloud Computing and Application
D. Troubleshooting with Windows, Cisco and Linux etc.
Specialization: (On demand only)
1- Social Media
2- Digital Forensic Investigation
3- Cloud & Robotics Security
4- Competitive Intelligence
5- Web Application Penetration Test Engineer
Student may request to enhance and test his/her knowledge in the specialized disciplines only in Social Media, Cloud & Robotic Security, Digital Forensic Investigation, Competitive Intelligence and Webs Application Penetration Test Engineer only
Learning Outcomes:
Target Audience:
ECCS Executive Certificate in Cyber Security - ECCS Malaysia
You may also see these links for more information
https://www.slideshare.net/ZiaullahMirza/eccs-student-admission-han...
OR
Contact at
You might be interested in the next few IntelCollab webinars:
© 2024 Created by Arik Johnson. Powered by
You need to be a member of Competitive Intelligence to add comments!
Join Competitive Intelligence