EC-Council Certified Security Specialist (ECSS) + Exam voucher
- Course Code ECSS
- Duration 5 days
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Class Connect HD
Connect to a class in HD
-
Company Event
Event at company
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopEC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.
EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
Course Schedule
Top-
- Delivery Format: Public Classroom
- Date: 20-24 April, 2026 | 9:00 AM to 4:30 PM
- Location: 2-Brussel Center (Koloniënstraat 11) (W. Europe )
- Language: English
-
- Delivery Format: Public Classroom
- Date: 19-23 October, 2026 | 9:00 AM to 4:30 PM
- Location: 2-Brussel Center (Koloniënstraat 11) (W. Europe )
- Language: English
Target Audience
TopCourse Objectives
Top- Key issues plaguing the information security, network security, and computer forensics
- Fundamentals of networks and various components of the OSI and TCP/IP model
- Various network security protocols
- Various types of information security threats and attacks, and their countermeasures
- Social engineering techniques, identify theft, and social engineering countermeasures
- Different stages of hacking cycle
- Identification, authentication, and authorization concepts
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypo
- Fundamentals of IDS and IDS evasion techniques
- Data backup techniques and VPN security
Course Content
Top- Information Security Fundamentals
- Networking Fundamentals
- Secure Network Protocols
- Information Security Threats and Attacks
- Social Engineering
- Identification, Authentication, and Authorization
- Cryptography
- Firewalls
- Intrusion Detection System
- Data Backup
- Virtual Private Network
- Wireless Network Security
- Web Security
- Ethical Hacking and Pen Testing
- Incident response
- Computer Forensics Fundamentals
- Digital evidence
- Understanding File Systems
- Windows forensics
- Network Forensics and Investigating Network Traffic
- Steganography
- Analyzing logs
- E-mail Crime and Computer Forensics
- Writing Investigative Report
Test Certification
TopEducational institutions can provide greater value to students by providing them not only with one of the most updated courses available today, but also a certification that empowers students in the corporate world.