
EC-Council
EC-Council Certified Security Specialist v9

ECSS Course Overview
EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.
Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.

Why take ECSS?
It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
- It facilitates your entry into the world of Information Security
- It provides professional understanding about the concepts of Information Security, Network Security, and Computer Forensics.
- It provides best practices to improve organizational security posture.
- It enhances your skills as a Security Specialist and increases your employability.
Who is it for?
ECSS is designed for anyone who want to enhance their skills and make career in information security, network security, and computer forensics fields.
Learning Objectives for ECSS v9 Training Course
- Key issues plaguing the information security, network security and computer forensics
- Fundamentals of networks and various components of the OSI and TCP/IP model
- Various network security protocols
- Various types of information security threats and attacks, and their countermeasures
- Social engineering techniques, identify theft, and social engineering countermeasures
- Different stages of hacking cycle
- Identification, authentication, and authorization concepts
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks and cryptanalysis tools
- Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot
- Fundamentals of IDS and IDS evasion techniques
- Data backup techniques and VPN security
- Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security
- Different types of web server and web application attacks, and countermeasures
- Fundamentals of ethical hacking and pen testing
- Incident handling and response process
- Cyber-crime and computer forensics investigation methodology
- Different types of digital evidence and digital evidence examination process
- Different type of file systems and their comparison (based on limit and features)
- Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism
- Steganography and its techniques
- Different types of log capturing, time synchronization, and log capturing tools
- E-mails tracking and e-mail crimes investigation
Writing investigation report
Module 1: Information Security Fundamentals
Module 2: Networking Fundamentals
Module 3: Secure Network Protocols
Module 4: Information Security Threats and Attacks
Module 5: Social Engineering
Module 6: Hacking Cycle
Module 7: Identification, Authentication, and Authorization
Module 8: Cryptography
Module 9: Firewalls
Module 10: Intrusion Detection System
Module 11: Data Backup
Module 12: Virtual Private Network
Module 13: Wireless Network Security
Module 14: Web Security
Module 15: Ethical Hacking and Pen Testing
Module 16: Incident Response
Module 17: Computer Forensics Fundamentals
Module 18: Digital Evidence
Module 19: Understanding File Systems
Module 20: Windows Forensics
Module 21: Network Forensics and Investigating Network Traffic
Module 22: Steganography
Module 23: Analyzing Logs
Module 24: E-mail Crime and Computer Forensics
Module 25: Writing Investigative Report
Exam Codes | ECSS (ECC EXAM) |
Number of Questions | 50 questions per exam |
Type of Questions | Multiple choice |
Length of Test | 2 Hours / 120 Minutes |
Testing Provider | ECC EXAM PORTAL |
Passing Score | 70% |

EC-Council Certified Chief Information Security Officer v3

EC-Council Certified Threat Intelligence Analyst v1

EC-Council Certified Penetration Testing Professional v1

EC-Council Computer Hacking Forensic Investigator v9
Course Highlights
Contact
- Unit 15B Penthouse Atherton Place, Tomas Morato, Corner Don A. Roces Ave, Quezon City, 1103 Metro Manila
- +(632) 7905 8718
- sales@teched.com.ph
Brochures
Testimonials
Training at TechED has been amazing. The instructor has provided us with so much in depth knowledge regarding the course including course material which are detailed and a lot of iLabs for hands on experience. Would recommend for anyone looking to study.
Francis C.
Network Security Administrator, Manufacturing Sector
The instructor is exceptionally knowledgeable and provided valuable additional content and labs.
Erick Z.
Cybersecurity Director, BPO Industry
Considering the difficult times we live in with COVID-19, the online training delivery as well as the staff were superb.
The course really keyed in all the topics of the exam. The material slides, documentation, labs was well written and presented. The instructor really knew his stuff and you could tell he was passionate about the subject.
Christian L.
IT Manager, Health Sector
TechED's training was excellent. The trainer was able to explain all the material and extra on top of that which I think will help me with future training and in my work environment. I would highly recommend it to anyone wishing to further their knowledge in a quick and easy way.
Mike S.
US Military
The Cybersecurity Trainings and Instructor provided by TechED are a must for anyone working in the field. It provides a wealth of useful information that might be useful when you get back to work.
Richard J.
Cybersecurity Specialist, US DOD Contractor