CISSP - Certified Information Systems Security Professional
An independent information security certification governed by the International Information Systems Security Certification Consortium, also known as (ISC)².
CEH - Certified Ethical Hacker
A professional designation for hackers that perform legitimate services for IT companies and other organizations. Ethical Hacking is often referred to as the process of penetrating one’s own computer/s or computers to which one has official permission to do so as to determine if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures before an actual compromise to the system takes place.
ECSA - EC-counsel Certified Security Analyst
An advanced ethical hacking certification that complements the Certified Ethical Hacker (CEH) certification by validating the analytical phase of ethical hacking. An ECSA is a step ahead of a CEH by being able to analyze the outcome of hacking tools and technologies.
LPT - Licensed Penetration Tester
Penetration Testing is a process of exploiting known vulnerabilities in a network. Most if not all government agencies around the globe test their network perimeter defense mechanisms continuously to ensure safe cyber boundaries. Cyber attacks did exist a decade ago but they did not create financial mayhem or threatened a nation’s economy to the level in which it is being seen today. Today, as organizations are increasingly becoming networked, information is being exchanged electronically at the speed of thought. Routine tasks rely on computing power for accessing, providing, and storing information. Today an organization’s lackadaisical information security posture may have a negative effect on its profitability or even it’s existence.
CHFI - Certified Hacking Forensic Investigator
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery, The tools and techniques covered in EC-Council’sCHFI program will prepare the student to conduct computer investigations using groundbreaking digital forensics technologies.
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.
Network+ - CompTIA Network Plus
A vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless devices.
Security+ - CompTIA Security Plus
A certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.