Hotline: 1800 PROGRESO (1800 776 4737)


Certified Security Sentinel (CSS)
 
The Certified Security Sentinel certification course is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and countermeasures associated with these attacks. The weakest link in any companies' security program is a poorly trained employee. Don’t let this be you. Once a student understands what can happen, they will know what to look for. And with that understanding, be able to keep the information they have been entrusted with as safe as possible.
 
The social engineering portion of the class is designed to teach the participants the skills used by social engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking, and cyber-terrorism are all phrases that describe crimes that use over-the-wire technology to attack, steal, and terrorize their victims. The key to most of these over-the-wire attacks being successful is information they receive through social engineering. Does it work? Can smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering: “I was so successful with that attack that I rarely had to resort to a technical attack.” If you're afraid of having your identity, credit card credentials, or business information compromised, then this is the training you have been looking for.
 
The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure information. One of the most valuable skill sets of a C)SS is that they understand how to train others on security as well.
 
 
Objectives
Upon completion, students will:
  • Understand security best practices on how to keep information secure
  • Have knowledge to identify a security breach
  • Be ready to sit for the C)SS Exam
 
Course Pre-Requisites
None – This is an entry level course
 
Who Should Attend
  • Anyone
  • End User
  • Company Employee
  • Basic Computer User
 
Course Outline
Module 1: Basic Security: How to secure a computer for personal internet use
Module 2: User Awareness 
Module 3: Implementation Countermeasures
Module 4: Essential Security Awareness
Module 5: Using the Internet at Work
Module 6: Accessing the Company's Network Through Your Assigned Computer
Module 7: Accessing the Corporate Network Remotely
Module 8: Social Engineering
Module 9: Understanding and Manipulating our Target
Module 10: Researching Our Target
Module 11: Methods of Deception
 
For more information on course modules, please refer to our brochure.
 
Funding
Productivity and Innovation Credit (PIC) scheme
*Enjoy up to 400% tax deduction or 60% cash payout under the Productivity and Innovation Credit (PIC) scheme for Staff Training.
Find out more here!
 
Terms and conditions apply. Please contact IRAS for assistance or clarification on PIC.

 

Download Course Brochure Download Registration Form Course Schedule
Related Courses
Information Systems Security Officer (CISSO)
The C)ISSO is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on...
Penetration Testing Engineer (CPTE)
The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning,...
Certified Penetration Testing Consultant (CPTC) - Live Virtual Training
The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against...
Certified Disaster Recovery Engineer (CDRE) - Live Virtual Training
The Certified Disaster Recovery Engineer certification course will prepare individuals to help their business handle the unexpected, while...
Certified Digital Forensics Examiner (CDFE) - Live Virtual Training
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies in...
Certified Network Forensics Examiner (CNFE) - Live Virtual Training
The Certified Network Forensics Examiner will take your digital forensic skill set to the next level by navigating through over twenty modules of...
Certified Secure Web Application Engineer (CSWAE) - Live Virtual Training
The Certified Secure Web Application Engineer course is designed to equip students with the knowledge and tools needed to identify and defend...
Certified Incident Handling Engineer (CIHE) - Live Virtual Training
The Certified Incident Handling Engineer course is designed to help incident handlers, system administrators, and general security engineers...
Certified Wireless Security Engineer (CWSE)
The Certified Wireless Security Engineer is prepared to identify those risk that wireless networks present for a business and to create and...
Certified Vulnerability Assessor (CVA)
The Certified Vulnerability Assessor training help students understand the importance of vulnerability assessments.
Certified Security Leadership Officer (CSLO) - Live Virtual Training
The Certified Security Leadership Officer course is designed to give management an essential understanding of current security issues, best...
Certified Professional Ethical Hacker (CPEH) - Live Virtual Training
The Certified Professional Ethical Hacker course is the introductory training to mile2’s line of penetration testing courses and certifications.
Certified Virtual Machine Engineer (CVME 5.5)
The Certified Virtual Machine Engineer course is designed for those who need to understand virtualization and the impacts it can have on an...
Certified Information Security Management Systems - Lead Auditor (CISMS-LA) - Live Virtual Training
The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of...
Certified Information Security Management Systems Lead Implementer (CISMS-LI) - Live Virtual Training
The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through...
Fundamentals of Cybersecurity Incident Handling
Basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work.
Secure Coding Bootcamp
Combination of lecture, security testing and code review. You will learn the most common threats against applications and how to design and code...
Protect Yourself and Your Organization From Cyber Threats (Workshop)
In this series of technology security workshops, we aim to provide critical information and best practices on how to detect  & response to the...
 
Your Name
Contact No
E-mail
Subject
Message
Text Limit :
Security Code
 
10
824
96