Certified Ethical Hacker(CEH v12)
The C|EH v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity.
a. Basic Terminology
b. Security Framework
c. Security Governance
a. Role of business heads in Cyber Security
b. Necessity of Cyber Security posture/ Control
c. Data Privacy and Compliance
a. Risks
b. Understanding Measurement
c. Key Metrics, Reporting Structure
d. Mitigation
a. Risk Assessment and Business Impact Analysis
b. Business Continuity Strategy
c. Business Continuity Plans (BCPs)
5) Cyber Security Framework
b. Security Controls and Framework
c. Regulatory Compliance
d. Continuous Monitoring and Improvement
e. Cybersecurity Culture and Accountability
a. Threat Landscape Awareness
b. Zero Trust Architecture
c. Cyber Resilience
d. Threat Intelligence and Information Sharing
The C|EH v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity.
This course will cover all these techniques and more you will learn tools and methods to conduct computer investigations using cutting-edge digital forensics...
Diploma in Cyber Security (DCS) is 6 months training program offered by ICSS. This course curriculum has been developed by and Subject Matter Experts SMEs and insights from industry experts in the domain of cybersecurity.