IT Security Training & Certifications
Courses are organised in morning or evening sessions.
Security professionals
Arrangements are flexible so that professionals do not have
Site administrators
to be absent from work for many consecutive days. Some
Network engineers
Network designers
Certified Ethical Hacker (CEH): 35 hours
Network administrators
Advanced Penetration Testing (CAST 611): 21 hours
Network managers
Certified Information Systems Auditor (CISA): 40 hours
Systems engineers
Cisco Certified Network Associate Security (CCNA
IT/IS auditors
IS/IT consultants
Non-IT auditors
of the main courses offered are:
Security): 40 hours
Responding to the increasing importance of security issues in today’s IT market, AKTINA offers a rich portfolio of IT security related courses and certifications. These have been carefully selected to respond to the demand for skills and qualifications in business and the public sector.
Depending on the certification provider, exams may be
arranged after each course or on other specified dates, AKTINA has partnered with renowned vendor-neutral IT certification providers to offer courses which are both approved and lead to valuable qualifications. It also
Morning or evening sessions
delivers specific vendor-related courses of major IT
Flexible arrangements
market players like Cisco and Microsoft that have a strong
based on demand
security component.
under the provider’s direct supervision or via Pearson VUE of which AKTINA is an Authorised Test Center:
Certified Ethical Hacker (CEH), by EC-Council
Center for Advanced Security & Testing (CAST) 611 Advanced Penetration Testing, by EC-Council
Offering IT technical courses sine 1991, AKTINA is on the move … now with world-class IT security training and certification solutions.
Certified Information Systems Auditor (CISA), by ISACA
Implementing Cisco Network Security (IINS) exam
leading to CCNA Security certification, by Cisco
Key issues plaguing the information security world, incident management process and penetration testing
Various types of footprinting, footprinting tools and countermeasures
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
System hacking methodology, steganography, steganalysis attacks and covering tracks
Different types of Trojans, Trojan analysis and Trojan countermeasures
Working of viruses, virus analysis, computer worms, malware analysis procedure and countermeasures
Packet sniffing techniques and how to defend against sniffing
will need to become one, but an ethical one!
Social Engineering techniques, identify theft and social engineering countermeasures
Being an Accredited Training Center (ATC) by the
DoS/DDoS attack techniques, botnets, DDoS attack tools and DoS/DDoS countermeasures
Session hijacking techniques and countermeasures
Different types of web application attacks, web application hacking methodology and countermeasures
SQL injection attacks and injection detection tools
Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines and tools
Firewall, IDS and honeypot evasion techniques, evasion tools and countermeasures
Various cloud computing concepts, threats, attacks and security techniques and tools
Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks and cryptanalysis tools
Various types of penetration testing, security audit, vulnerability assessment and penetration testing roadmap
The Certified Ethical Hacker (CEH) program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you
EC-Council, AKTINA offers the related course which provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. Because “to beat a hacker, you
need to think like a hacker”! The course will immerse you into the hacker mind set so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in the organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five
phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access and covering your tracks.
Different types of webserver attacks, attack methodology and countermeasures
Wireless Encryption, wireless hacking methodology, wireless hacking tools and wi-fi security tools
Security professionals
Site administrators
Auditors
Number of Questions: 125
Test Duration: 4 Hours Test Format: Multiple Choice
C AS T is a highly Technical and Advanced Security Training Program developed exclusively for the top Information Security
CAST programs are designed and developed by
Professionals
EC-Council in collaboration with well-respected subjectmatter experts and Industry practitioners. All of these
C A S T consists of a set of
Advanced Security Training courses are only conducted
independent Security Training
by appointed EC-Council Trainers, some of whom are
Specializations, all of them offering
authors of the respective courses. Theories are limited to
dynamic, up-to-date features and
the bare essentials and the bulk of the training session
are subject to constant evolution
will be focused on a participant’s individualised
C A S T content is designed to be
involvement in “getting their hands dirty”.
aligned with the most effective
and perplexing threat prevention CAST offers programs that will cover important domains
strategies and remediation policies
such as advanced penetration testing training, malware
C A S T offers a hands-on training experience with tools and fighting techniques derived from real-life scenarios of combating IT security incidents
EC-Council is the world leader in IT Security Courses Information Security, Network Security, Computer
analysis, advanced social engineering, cryptography, digital forensics deep dive, web application security, among others.
Security and Internet Security Certification and Training. EC-Council’s Certified Ethical Hacker (CEH) set the standard for what the world has come to expect from ethical hacking IT Security courses. As Information Technology Security becomes more and
Ideal Candidates for CAST are:
more complex, IT certifications need to address the
ever changing challenges. This is why EC-Council has
Those who already have fundamental credentials in
introduced CAST - Center for Advanced Security
Information Security and need
Training, which offers higher-level and more
to enhance and upgrade their current level to the maximum
sophisticated IT security certifications.
InfoSec Certification Degree
Recognising its prominent position in the market,
EC-Council offers
EC-Council has chosen AKTINA to implement the new
Those who want to acquire
CAST programs in addition to its mainstream
proven Advanced Security Training and enjoy the most exclusive privileges and monetary rewards in their professional career
certifications. Our courses follow strictly the EC-Council
CAST specifications to provide comprehensive content coverage and prepare students for the related exam.
Targets the major and attack-prone fields of data mining and external party invasions
Cultivates innovative problem-solving mindset by using reverse engineering approach
Offers a set of independent, highly specialised and diversified training modules
EC-Council’s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced Security Training for information security professionals. CAST programs stand out from
others through their extreme hands-on approach. These highly technical, lab intensive Advanced Security Training courses will allow a participant to combat real life scenarios. 611 - Advanced Penetration Testing is the flagship CAST course which will teach you how to do a professional
Scanning with the Nmap tool, autoscan, Netifera and sslscan Scanning and Scripting with Hping3 Building a Target Database
Enumeration
Using the nmap scripting engine
IT managers
IT auditors
Government & intelligence
Enumerating SMB OS Fingerprinting
Vulnerability Sites
typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques. The format you will use has been used to train 1000s penetration testers globally, it is proven and effective!
agencies interested in real
Vulnerability Analysis with OpenVAS Vulnerability Analysis with Nessus
world attack and defense in
Firewalls and Vulnerability Scanners
today’s complex and highly
Vulnerability Analysis of Web Apps
secure IT environments
Vulnerability Scanning with W3AF, Webshag, Skipfish, Vega, Proxystrike and Owasp-zap
Exploitation
Exploit Sites Manual Exploitation Exploitation with Metasploit Exploiting with Armitage Exploitation with SET
Data Analysis and Reporting
professionals Penetration testers
The ranges progresses in difficulty and reflect an
Information security
Vulnerability Analysis
Enumerating Targets and SNMP
Post Exploitation
a test ... the findings and the report!
defeat and challenges to overcome. This is not your
Scanning
security test and produce the most important thing from
enterprise level architecture. There will be defences to
Information gathering and OSINT
Conduct local assessment
Number of Questions: 60
Compiling Data in MagicTree & Dradis
Test Duration: 2 Hours
Developing a Professional Report
Test Format: Multiple Choice
Reviewing findings and creating report information
Open book, note and access
Reviewing sample reports
to range is allowed
Creating a custom report
Advanced Techniques
Scanning against defenses Exploitation through defenses Source port configuration Detecting Load Balancing
Detecting Web Application Firewalls Evading Detection Exploit writing
Practical Phases
The course focuses on security principles and technologies using Cisco security products to provide examples. It allows students to understand common security concepts and deploy basic security techniques utilising a
Network designers
Network administrators
network infrastructure. Throughout the course students
Network engineers
will gain valuable hands on experience.
Network managers
Systems engineers
variety of popular security appliances within a "real-life"
After completing this course, students will be able to meet
these overall objectives:
CCNA Routing & Switching is one of the most popular certifications in the IT market. Cisco Certified Network Associate Security (CCNA Security) is a complementary qualification which validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security
Describe common network security concepts
Secure routing and switching infrastructure
Deploy basic authentication, authorization and accounting services
Deploy basic firewalling services
Deploy basic site-to-site and remote access VPN services
Describe the use of more advanced security services such as intrusion protection, content security and identity management
infrastructure, recognise threats and vulnerabilities to networks and mitigate security threats.
Number of Questions: 60-70
Test Duration: 1 ½ hours
Test Format: Multiple choice,
leading to the CCNA Security certification. It tests the
drag and drop, filling in and
candidate's knowledge of secure network
simulation
infrastructure, understanding core security concepts,
Course Introduction
managing secure access, VPN encryption, firewalls,
Network Security Concepts
intrusion prevention, web & email content security and
Secure Network Devices
endpoint security. The exam validates skills for
Layer 2 Security
installation, troubleshooting and monitoring of a
Firewalls
Virtual Private Networks
Implementing Cisco Network Security (IINS) is the exam
secure network to maintain integrity, confidentiality and availability of data and devices.
Candidates should possess as a pre-requisite any valid CCNA Routing and Switching, CCENT or CCIE certification.
The course reflects the job practice which is split into 5 Domains:
Domain 1 - The Process of Auditing Information Systems (21%)
IS/IT auditors
(16%)
IS/IT consultants
Domain 3 - Information Systems Acquisition,
IS/IT audit managers
Development and Implementation (18%)
Security professionals
Non-IT auditors
Number of Questions: 150
Test Duration: 4 Hours
Domain 2 - Governance and Management of IT
Domain 4 - Information Systems Operations, Maintenance and Service Management (20%)
Domain 5 - Protection of Information Assets (25%)
Enhance your career by earning ISACA’s Certified Information Systems Auditor (CISA), world-renowned as the standard of achievement for those who audit, control, monitor and assess information technology and business systems. Boost your credentials and gain a competitive
The CISA Certification offers many advantages:
edge by attending the AKTINA course and passing the
exam required for this prestigious qualification.
issues and customise practices to support trust in and value from information systems. The CISA designation is
vulnerabilities, report on compliance and institute controls within the enterprise.
challenges of a modern enterprise
Is globally recognised as the mark of excellence for the IS audit professional Combines the achievement of passing a educational experience, providing you with credibility
assurance and security professionals. Being CISA-certified
and demonstrates you are capable to assess
Demonstrates that you have gained and maintained
comprehensive exam with recognition of work and
a globally recognised certification for IS audit control,
showcases your audit experience, skills and knowledge
Quantifies and markets your expertise the level of knowledge required to meet the dynamic
Enterprises demand IS audit professionals who possess
the knowledge and expertise to help them identify critical
Confirms your knowledge and experience
in the marketplace Increases your value to your organisation Gives you a competitive advantage over peers when seeking job growth Helps you achieve a high professional standard through ISACA’s requirements for continuing education and ethical conduct
Test Format: Multiple Choice
ΑΚΤΙΝΑ has been providing IT training solutions since 1991. Its courses address the needs of IT professionals, developers and end-users. It offers a diverse training portfolio for the major software vendors like Microsoft, Cisco, Oracle and VMware as well as vendor-neutral IT certifications of providers like EC-Council and ISACA.
Certified Professionals stand apart AKTINA offers flexible solutions ranging from group sessions to one-on
from other IT personnel as they
-one coaching and a variety of learning options which allow students to
are capable of demonstrating
learn in a manner that best suits their organisation’s objectives,
undeniable technical expertise to
schedule and budget.
employers, clients and the IT
community. We have a variety of technical certifications which are
Effective training can be a key to your success. If you wish to expand
invaluable in today’s highly
your IT skills, AKTINA has the right tools to help you achieve your goals. And if you want to pursue an IT certification, AKTINA delivers many
competitive IT work
packages which will enhance your career prospects.
environment.
Systems engineers
Network administrators
Database administrators
Software engineers
Programmers
Web developers
Support professionals
Project managers
IT managers
IT/IS auditors
MICROSOFT
CISCO
ORACLE
VMWARE
LINUX
PMI
ITIL
ADOBE
Tel: +357.22818101