2 Courses and Certifications

EC-Council Computer Security And Networks Courses & Certifications

Quick View
Career Category
Specialization
Job Role
Skills

Offered by

Certificate

Certified Chief Information Security Officer (CCISO) Certification Training

The Certified Chief Information Security Officer (CCISO) Certification Training by Infosec Train is developed to provide in-depth knowledge of the information security field. During the course, you will gain the required skills to face real-world challenges of the domain. The Certified Chief Information Security Officer (CCISO) online programme includes 40 hours of content. You will explore important concepts such as project management, contract management, executive strategy, policy setting, audit management, and contact management.

The Certified Chief Information Security Officer (CCISO) certification course follows a blended learning delivery model. You can also choose a customised schedule by opting for either an online or 1-on-1 learning method. The programme covers five important CCISO domains.

During Infosec Train’s Certified Chief Information Security Officer (CCISO) Certification Training, you will learn how to implement information security management principles from the viewpoint of top-level management. Also, you will get an understanding of the Chief Information Security Officer’s day-to-day responsibilities.

...Read More
Skills Covered:
Knowledge of Cyber Security

Offered by

Certificate

Certified Encryption Specialist (ECES) Training & Certification

The Encryption Specialist (ECES) certification course will help you comprehend the fundamental aspects of cryptography. This training is specifically designed to train you for EC-Council’s Certified Encryption Specialist (ECES) certification. Over the course duration, you will learn the core concepts of symmetric cryptography and futuristic keys in-depth. The Encryption Specialist (ECES) syllabus will also cover topics like Kerkchoff’s principle, encrypting a drive, cryptographic algorithms, setting up a VPN, and implementing steganography.

Besides the fundamentals, you’ll also study the various algorithms like Blowfish, Twofish, Skipjack, and hashing algorithms like MD5, SHA, MD6, Gost, and RIPMD 256. By the end of the Encryption Specialist (ECES) training, you’ll be well-versed in both symmetric and asymmetric cryptography.

In addition to theoretical sessions, the training will also cover practical sessions where you’ll work with encryption technologies. Moreover, after you have finished the Encryption Specialist (ECES) programme by Infosec Train, you’ll be well-prepared to ace the certification exam.

...Read More
Skills Covered:
Knowledge of Cryptography

Articles

Popular Articles

Latest Articles

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
  • 150M+ Students
  • 30,000+ Colleges
  • 500+ Exams
  • 1500+ E-books
  • Economic Times
  • Financial Express
  • Firstpost
  • Livemint