print
Course Name
Cyber Security & Forensics Certificate Series

Contact Hours: 50

Course Description

Computer and network systems across the globe are systematically being attacked by rampant hacking. Hacking is now a wide spread practice, leaving companies at all levels vulnerable. In order to stop hackers from completing their goals, you must first think like a hacker. As the old moniker goes; you must think like a thief to catch a thief. Students will gain an understanding of how defense functions work and then continue into scanning and attacking networks. The theory of this course bundle is to gain the skills to think like the black hat hackers do and then apply the information to structure preventative measures through penetration testing and network vulnerability assessments. The course bundle is designed to prepare of advance students in the positions of security engineers, security officers, network administrator and security auditors to name a few.

 

Courses in the Series:  

CHFI Computer Hacking Forensic Investigator

CEH Certified Ethical Hacker

 

Computer Hacking Forensic Investigator

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

 

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.


Outcome

Upon successful completion, this series will provide the online resources to help prepare for the CHFI 312-49 exam and EC-Council Certified Ethical Hacker exam 312-50.


Assessment

Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Quizzes & Exam Simulators - The custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.  This will allow you to gauge your effectiveness before moving to the next module in your course. These courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

Target Audience - This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.


Outline
To receive a complete and comprehensive course outline write to courseinfo@jeronline.com and include the complete course title.

Internet Connectivity Requirements:
Cable and DSL internet connections are recommended. Hardware Requirements: Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended. 256MB RAM minimum. 1 GB RAM recommended. 800x600 video resolution minimum. 1025x768 recommended. Speakers/Headphones to listen to Dialogue steaming audio sessions. A microphone to speak in Dialogue streaming audio sessions. Operating System Requirements: Windows Vista, 7, 8, 8.1 Mac OSX 10 or higher. OpenSUSE Linux 9.2 or higher. Web Browser Requirements: Google Chrome is recommended. Firefox 13.x or greater. Internet Explorer 6.x or greater. Safari 3.2.2 or greater. Software Requirements: Adobe Flash Player 6 or greater. Oracle Java 7 or greater. Adobe Reader 7 or greater. Web Browser Settings: Accept Cookies. Disable Pop-up Blocker.