EC-Council Certified Security Specialist (ECSS)

EC-Council Certified Security Specialist (ECSS)
Brochure
  • Description
  • Course Learning Objectives

Course Description

EC-Council Certified Security Specialist (ECSS)

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.

Key Outcomes

- It facilitates your entry into the world of Information Security

- It provides professional understanding about the concepts of Information Security, Network Security, and Computer Forensics

- It provides best practices to improve organizational security posture

- It enhances your skills as a Security Specialist and increases your employability

Exam Information 

Exam Title: EC-Council Certified Security Specialist

Exam Code: ECSS

Number of Questions: 50

Duration: 2 hours

Availability: ECC Exam Portal

Test Format: Multiple Choice

Passing Score: 70%

Course Learning Objectives

  1. Information Security Fundamentals
  2. Networking Fundamentals
  3. Secure Network Protocols
  4. Information Security Threats and Attacks
  5. Social Engineering
  6. Hacking Cycle
  7. Identification, Authentication, and Authorization
  8. Cryptography 
  9. Firewalls  
  10. Intrusion Detection System
  11. Data Backup
  12. Virtual Private Network
  13. Wireless Network Security
  14. Web Security
  15. Ethical Hacking and Pen Testing
  16. Incident Response
  17. Computer Forensics Fundamentals
  18. Digital Evidence
  19. Understanding File Systems
  20. Windows Forensics
  21. Network Forensics and Investigating Network Traffic
  22. Steganography
  23. Analyzing Logs
  24. E-mail Crime and Computer Forensics
  25. Writing Investigative Report

This website uses cookies to ensure you get the best experience on our website.