Ethical Hacking Associate (EHA)
- Information Security Fundamentals
- Networking Fundamentals
- Secure Network Protocols
- Information Security Threats and Attacks
- Social Engineering
- Hacking Cycle
- Identification, Authentication, and Authorization
- Cryptography
- Firewalls
- Intrusion Detection System
- Data Backup
- Virtual Private Network
- Wireless Network Security
- Web Security
- Ethical Hacking and Pen Testing
Cyber Forensics Associate (CFA)
- Computer Forensics Fundamentals
- Incident Response
- Digital Evidence
- Understanding File Systems
- Windows Forensics
- Network Forensics and Investigating Network Traffic
- Stenography
- Analyzing Logs
- E-mail Crime and Computer Forensics
- Writing Investigation Report
You must be logged in to post a comment.