ECSS Exam Information and Guideline
EC-Council Certified Security Specialist
Below are complete topics detail with latest syllabus and course outline, that will help you good knowledge about exam objectives and topics that you have to prepare. These contents are covered in questions and answers pool of exam.
Exam Title :
EC-Council Certified Security Specialist (ECSS)
Exam ID :
ECSS
Exam Duration :
120 mins
Questions in Exam :
50
Passing Score :
70%
Exam Center :
Pearson VUE OR ECC Exam Center
Real Questions :
EC-Council ECSS Real Questions
VCE Practice Test :
EC-Council ECSS Certification VCE Practice Test
Information Security and Networking Fundamentals 9%
- Overview of Information Security Fundamentals
- Understanding Information Security Laws and Regulations
- Overview of Networking Fundamentals
- Overview of OSI and TCP/IP Model
- Understanding Basic Network Security Procedures and Policies
- Overview of Secure Network Protocols
Information Security Threats and Attacks 21%
- Understanding Various Stages of Hacking Cycle
- Understanding Internal Threats (Sniffing, ARP Spoofing, etc.)
- Understanding External Threats (Malware Attacks, Password Cracking, DoS, Session Hijacking, etc.)
- Overview of Different Social Engineering Techniques
- Understanding Various Firewall and IDS Evasion Techniques
- Understanding Various Wireless and VPN Threats
- Understanding Various Web Applications and Network Threats
- Understanding Email Crime
Information Security Controls 23%
- Overview of Identification, Authentication, and Authorization
- Overview of Cryptography and Encryption Algorithms
- Understanding Different Firewall Technologies
- Overview of Intrusion Detection System (IDS)
- Introduction to Data Backup
- Securing Organization Against Various Information Security Attacks
Wireless Network, VPN, and Web Application Security 17%
- Overview of Wireless Networks and Topology
- Understanding Different Types of Wireless Encryption
- Securing Wireless Networks
- Understanding VPN and Protocols Used to Secure VPN
- Introduction to Web Applications and Securing Web Application Against Web Attacks
Ethical Hacking and Pen Testing 1%
- Introduction to Ethical Hacking
- Introduction to Penetration Testing
Incident Response and Computer Forensics Fundamentals 6%
- Overview of Incident Handling and Response Process
- Understand Different Computer Security Incidents and Computer Crimes
- Overview of Computer Forensics Fundamentals
- Understanding Computer Forensics Investigation Methodology
Digital Evidence and File Systems 4%
- Understanding Digital Evidence and Examination Process
- Collecting Digital Evidence from Electronic Devices
- Overview of Different File Systems (Windows, Linux, Mac OS X, and CD-ROM / DVD File Systems)
Windows and Network Forensics 10%
- Understanding Network Forensics Analysis Mechanism
- Understanding Windows Forensics (Collecting Volatile and Non-volatile Information)
- Collecting Metadata and Events Data
- Introduction to Steganography
- Understanding Different Types of Steganography based on Cover Medium
Logs and Email Crime Forensics 6%
- Examining Various Security Logs
- Overview of Event Correlation
- Overview of Email Technology
- Investigating Email Crime and Violation
Investigation Report 3%
- Writing Computer Forensics Report
- Understanding Best Practices for Writing Forensics Report