EC-Council Security|5 - Slechts 2 dagen

Zeven redenen waarom u met uw Security 5 cursus voor Firebrand Training moet kiezen

Ontdek Hoe We Je Helpen Om Snel Nieuwe Skills Aan Te Leren

  1. U zult in slechts 2 dagen Security 5 gecertificeerd zijn. Met ons bent u in recordtijd Security 5 getraind
  2. Onze Security 5 cursus is all-inclusive. Een eenmalige contributie bekostigt alle cursusmaterialen, examens, accommodaties en maaltijden. Geen verborgen prijstoeslagen
  3. Slaag de eerste keer voor Security 5 of volg de training nogmaals. Dit is onze garantie. Wij zijn er zeker van dat u de eerste keer zult slagen voor uw Security 5 cursus. Mocht dit niet het geval zijn, dan kunt u binnen het jaar terugkomen en enkel voor de accommodatie en examens te betalen. De rest is gratis
  4. U zult meer Security 5 leren. Een dag met een traditionele training aanbieder duurt over het algemeen van 9 uur 's ochtends tot 17 uur in de middag, met een lange lunchpauze. Met Firebrand Training kunt u rekenen op minstens 12 uur leren per dag met uw instructeur
  5. U zult Security 5 snellerde theorie beheersen. De kans bestaat dat u een andere manier van leren heeft dan uw omgeving. Wij combineren visuele, auditieve en tastbare leerstijlen, dit zorgt voor een snellere en eenvoudigere manier van leren
  6. U zult Security 5 studeren met de beste. We hebben het Q-For kwaliteit label, dat onze standaarden en professionaliteit in de training markt erkent. Naast het winnen van nog vele andere prijzen, hebben we meer dan 30,000 professional getraind en gecertificeerd en we zijn partners met alle grote namen in deze tak van het bedrijfsleven
  7. U zult meer doen dan alleen Security 5 de cursusstof bestuderen. We maken gebruik van laboratoria, case-studies en oefentests, om ervoor te zorgen dat u uw nieuwe kennis in uw werkomgeving kan toepassen. Onze instructeurs gebruiken demonstraties en hun eigen ervaringen om de dag interessant en boeiend te houden

Denkt u klaar te zijn voor de cursus? Neem een GRATIS oefentest om uw kennis vast te stellen!

Wanneer wilt u deelnemen aan een versnelde opleiding?

Start datum

Eind datum

Status

Locatie

Nu boeken

24/2/2014 (Maandag)

25/2/2014 (Dinsdag)

Beëindigde cursus

-

 

30/6/2014 (Maandag)

1/7/2014 (Dinsdag)

Wachtlijst

Landelijk

 

11/8/2014 (Maandag)

12/8/2014 (Dinsdag)

Beperkte beschikbaarheid

Landelijk

 

22/9/2014 (Maandag)

23/9/2014 (Dinsdag)

Open

Landelijk

 

3/11/2014 (Maandag)

4/11/2014 (Dinsdag)

Open

Landelijk

 

15/12/2014 (Maandag)

16/12/2014 (Dinsdag)

Open

Landelijk

 

We hebben meer dan 30.000 studenten in tien jaar getrained. We hebben ze allemaal gevraagd onze versnelde opleidingen te evalueren. De laatste keer dat we onze resultaten analyseerden, bleek 96.22% ons te beoordelen als ‘boven verwachting’

"Any student that has no understanding of security, would really benfit from a this course and an excellent trainer who really enjoys the subject. "
S.K. - EC-Council Security|5 (2 Dagen) (7/11/2011 t/m 8/11/2011)

"The staff at Firebrand Training were very friendly and helpful. Accommodation was excellent."
Anon.. - EC-Council Security|5 (2 Dagen) (7/11/2011 t/m 8/11/2011)

"Course material was made enjoyable and accessible and the preparation for the exam was excellent."
N.B. - EC-Council Security|5 (2 Dagen) (7/11/2011 t/m 8/11/2011)

"Venue and training centre are well suited for learning. The training itself was easy to follow and understand. "
Primrose Staplehurst, HMRC. - EC-Council Security|5 (2 Dagen) (7/3/2011 t/m 8/3/2011)

"I enjoyed the training and found it all very useful both and my home and working environment. "
Annoniem - EC-Council Security|5 (2 Dagen) (7/3/2011 t/m 8/3/2011)

"The instructor is extremely knowledgeable in the subject and kept my interest throughout the course. It is an intensive course but you do learn a lot within the 2 days."
A. D, HMRC. - EC-Council Security|5 (2 Dagen) (7/3/2011 t/m 8/3/2011)

"This course was intensive for the User "
P. E. - EC-Council Security|5 (2 Dagen) (7/3/2011 t/m 8/3/2011)

"Prima cursus, snel en erg goed!"
Raymond vanderAa. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Great teacher, perfect location. Learned a lot with high speed, it is really a challange. You will need to be well prepared and gain experience before attending."
Marco Tilburg, Query ITechnologies. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Effectief snel leren, met de nodige humor."
Raymond van der Aa. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (6/1/2014 t/m 10/1/2014)

The goal of this 2 day accelerated course is to teach non-technical students the basic knowledge of Computer Security and Computer Networks so that they are aware of actual hacker frauds like Identity Theft, Viruses, Trojans and Phishing.

We will arm you with knowledge that can complement the system administrator's security safeguards and the chief security officer's security architecture for the corporation.

Those holding the EC Security|5 Certificate have learned how to guard their own or their companies information assets.

Our Security|5 Certification Program

  • Allows you to achieve your certifications in a fraction of the time of 'traditional training' while delivering industry-leading exam passing percentages
  • Helps students grasp complex technical concepts more easily by identifying and catering to individual student learning styles through a mixed visual, auditory and kinaesthetic-tactual delivery system
  • Enhances retention by employing accelerated learning techniques focused on committing information to long-term memory

Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 450 training centres across 70 countries.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Having proof of your skills and knowledge gives you the edge over other candidates when applying for a job. Here are some additional benefits of earning Security|5:

  • Independent validation of achievement of a level of competency accepted and valued by the industry
  • Proven understanding of common frauds like Identity Theft, Phishing, email hoaxes, viruses and backdoors
  • Increased knowledge, leading to increased job satisfaction
  • Better career perspective with better IT knowledge
  • Proof of transferable skills and a solid credential, which make you more marketable

What Security|5 Can do for Your Company

Certification provides companies with skilled employees, leading to:

  • Less security risks through better trained employees
  • Higher awareness of frauds like social engineering
  • Increased productivity as certified professionals are able to perform at accepted industry standards

Who Should Earn a Security|5 Certification?

  • Office knowledge workers
  • Home users
  • Any non-IT person using computers in their office

Increase your value on the job market

  • Security|5 is a globally recognized certification
  • Security|5 is the ideal starting point for anyone interested in learning computer networking and security basics

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Course Materials

Students attending this blended-learning program will receive a robust set of course materials that caters to each of the three primary individual learning-intake styles (auditory, visual, and kinaesthetic-tactual) - critical for a sucessful accelerated learning experience.

Daily lectures and review sessions are supplemented by a combination of Proprietary Lab Manual and Program Courseware - developed to address the unique demands of accelerated learners.

Course program

Foundations of Security

  • Essential terminology
  • Defining security
  • Need for security
  • Cyber crime
  • Information Security statistics
  • IS triangle
  • Security myths
  • How to harden security

Basic Security Procedures

  • Why do I need to worry about my computer's security?
  • Introduction
  • Hardening of Operating System
  • Updating the system and configuring the updates
  • Disable unnecessary services
  • Strong password creation
  • Deployment of antivirus and firewall
  • Disable guest account access
  • Make Private folders
  • Security settings in MS Office applications

Desktop Security

  • What is file sharing?
  • Types of file sharing
  • How to share folder?
  • Configuring shared folder permissions
  • Hiding files and folders
  • File sharing tips
  • File downloading tips
  • How to backup data and restore?
  • How to encrypt and decrypt files?
  • How to kill suspect processes?

Administering Windows Securely

  • How to use the event viewer?
  • How to enable auditing in windows?
  • How to read logs on your system?
  • How to close ports?
  • Overview of the windows registry
  • How to restore the registry?
  • How to close a port?
  • Common internal commands
  • How to find services and ports they listen on?

Recognizing Security Threats and attacks

  • Phishing and its countermeasures
  • Virus
  • Trojan Horse
  • Worms
  • Spyware
  • Adware
  • Keylogger
  • Social engineering
  • Denial of Service
  • Spamming
  • Port Scanning
  • Password cracking
  • Basic security measures

Secure Internet Access

  • Basic browser security settings
  • How to restrict site access
  • Removing site from security zone
  • Secure website detection
  • Secure site and browser properties
  • Tools: Internet Filtering Software
  • Configuring Internet content access
  • Activating Content Advisor
  • How to deal with cookies
  • Using P2P networks securely
  • Choosing appropriate browser settings
  • Wireless network security features

Working on the Internet

  • Precepts of Security
  • Knowing Encryption
  • Digital Certificate
  • Digital Signature
  • Working with e-mail (web based)
  • Working with e-mail (mail client)
  • Working with File Transfer - FTP
  • Working with File Transfer - Web Folders

Knowing Online Payment Systems

  • Working with Credit Cards
  • Working with Instant Messengers
  • Working across File Sharing Networks
  • Working on Dial-in Networks
  • Working with Portable Devices
  • Working with Wireless Devices
  • Working with USB devices
  • Working with Media Files
  • Working with 3rd party software

Incident Response

  • What is Incident Response?
  • Incidents and responses:
  • Trojan attack
  • Boot sector virus attack
  • Corrupted registry
  • Automatic running of CD-ROM (autorun.inf)

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

The Security|5 program certifies individuals in the security discipline. To achieve the Security|5 certification, candidates must pass exam 112-12 Security Foundations which will be hold on the 2nd day in the afternoon.

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

EC-Council official courseware

  • EC-Council - Security|5 courseware kit

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Students who are successful in the Security|5 Certification Firebrand Training should possess basic computing skills such as browsing the web and checking e-mails.

Belangstelling? Zie onze prijzen of bel ons op 024-8457770