About Course

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of Network Defense, Ethical Hacking, and Digital Forensics. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of Network Defense, Ethical Hacking, and Digital Forensics. This program provides the solid fundamental knowledge required for a career in information security.

ECSS EMPOWERS INDIVIDUALS TO:

  • Gain Foundational Knowledge in Cybersecurity
  • Practice Essentials Skills such as how to defend networks and investigate them
  • Challenge Industry recognized exams and earn cybersecurity credentials to build and further your career

WHY IS ECSS IMPORTANT?

  • It facilitates your entry into the world of Information Security.
  • It provides professional understanding about the concepts of Network Defense, Ethical Hacking, and Digital Forensics.
  • It provides best practices to improve organizational security posture.
  • It enhances your skills as a Security Specialist and increases your employability.

Exam Details

  • EXAM TITLE: EC-COUNCIL CERTIFIED SECURITY SPECIALIST
  • Number of Questions: 100
  • Exam Availability: EC-Council Exam Portal
  • Test Duration: 3 hours
  • Test Format: Multiple Choice
  • Passing Score: 70%

Show More

What Will You Learn?

  • Network Security Fundamentals
  • Identification, Authentication and Authorization
  • Network Security Controls – Administrative Controls
  • Network Security Controls – Physical Controls
  • Network Security Controls – Technical Controls
  • Virtualization and Cloud Computing
  • Wireless Network Security
  • Mobile Device Security
  • IoT Device Security
  • Cryptography and PKI
  • Data Security
  • Network Traffic Monitoring
  • Information Security Fundamentals
  • Ethical Hacking Fundamentals
  • Information Security Threats and Vulnerability Assessment
  • Password Cracking Techniques and Countermeasures
  • Social Engineering Techniques and Countermeasures
  • Network Level Attacks and Countermeasures
  • Web Application Attacks and Countermeasures
  • Wireless Attacks and Countermeasures
  • Mobile Attacks and Countermeasures
  • IoT and OT Attacks and Countermeasures
  • Cloud Computing Threats and Countermeasures
  • Penetration Testing Fundamentals
  • Computer Forensics Fundamentals
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-forensics Techniques
  • Windows Forensics
  • Linux and Mac Forensics
  • Network Forensics
  • Investigating Web Attacks
  • Dark Web Forensics
  • Investigating Email Crimes
  • Malware Forensics

Course Content

Module 01: Network Security Fundamentals

  • Understand Fundamentals of Network Security
  • Discuss Essential Network Security Protocols

Module 02: Identification, Authentication and Authorization

Module 03: Network Security Controls – Administrative Controls

Module 04: Network Security Controls – Physical Controls

Module 05: Network Security Controls – Technical Controls

Module 06: Virtualization and Cloud Computing

Module 07: Wireless Network Security

Module 08: Mobile Device Security

Module 09: IoT Device Security

Module 10: Cryptography and PKI

Module 11: Data Security

Module 12: Network Traffic Monitoring

Module 13: Information Security Fundamentals

Module 14: Ethical Hacking Fundamentals

Module 15: Information Security Threats and Vulnerability Assessment

Module 16: Password Cracking Techniques and Countermeasures

Module 17: Social Engineering Techniques and Countermeasures

Module 18: Network Level Attacks and Countermeasures

Module 19: Web Application Attacks and Countermeasures

Module 20: Wireless Attacks and Countermeasures

Module 21: Mobile Attacks and Countermeasures

Module 22: IoT and OT Attacks and Countermeasures

Module 23: Cloud Computing Threats and Countermeasures

Module 24: Penetration Testing Fundamentals

Module 25: Computer Forensics Fundamentals

Module 26: Computer Forensics Investigation Process

Module 27: Understanding Hard Disks and File Systems

Module 28: Data Acquisition and Duplication

Module 29: Defeating Anti-forensics Techniques

Module 30: Windows Forensics

Module 31: Linux and Mac Forensics

Module 32: Network Forensics

Module 33: Investigating Web Attacks

Module 34: Dark Web Forensics

Module 35: Investigating Email Crimes

Module 36: Malware Forensics

Student Ratings & Reviews

5.0
Total 1 Rating
5
1 Rating
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
5 months ago
The Certified Security Specialist course was exactly what I needed to advance my career in cybersecurity. The in-depth coverage of network security, cryptography, and ethical hacking provided me with practical skills that I could immediately apply in my role. I highly recommend this course for anyone serious about a career in cybersecurity.