The University of Texas at El Paso

Cybersecurity & Forensics Certificate Series

Course Name

Cybersecurity & Forensics Certificate Series

Contact Hours: 50 (an estimated time frame devoted to a course of study from start to finish that can vary from student to student)

Course Description

Computer and network systems across the globe are systematically being attacked by rampant hacking. Hacking is now a wide spread practice, leaving companies at all levels vulnerable. In order to stop hackers from completing their goals, you must first think like a hacker. As the old moniker goes; you must think like a thief to catch a thief. Students will gain an understanding of how defense functions work and then continue into scanning and attacking networks. The theory of this course bundle is to gain the skills to think like the black hat hackers do and then apply the information to structure preventative measures through penetration testing and network vulnerability assessments. The course bundle is designed to prepare of advance students in the positions of security engineers, security officers, network administrator and security auditors to name a few.

 

Courses in the Series: 

 

Ethical Hacking V10

The Ethical Hacking v10 course covers ethical hacking of networks and system penetration testing. This course covers all of the exam objectives for the EC-Council exam ECC 312-50 version 10 exam. Students are taken step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows and Kali Linux-based. You have access and instructions on setting up a full virtual environment to allow you to gain practical hands-on experience during the course. A broad range of examples used by hackers is covered.

 

Forensic Investigator in Computer Hacking

Gain knowledge in the specific security discipline of computer forensics from a vendor-neutral perspective. This course will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

 

The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.

Please note: Course of study may be completed earlier than indicated.

Outcome

Upon successful completion, students will be able to:

  • Perform incident response and forensics
  • Perform electronic evidence collections
  • Perform digital forensic acquisitions
  • Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.
  • Examine and analyze text, graphics, multimedia, and digital images
  • Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
  • Recover information and electronic data from computer hard drives and other data storage devices
  • Follow strict data and evidence handling procedures
  • Maintain audit trail (i.e., chain of custody) and evidence integrity
  • Work on technical examination, analysis and reporting of computer-based evidence
  • And much more!

Assessment

Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Outline

To receive a complete and comprehensive course outline write to courseinfo@jeronline.com and include both the complete course number and course title.

Books

All training is delivered online; no additional purchase required.