IT Security Training & Certifications

Courses are organised in morning or evening sessions.



Security professionals

Arrangements are flexible so that professionals do not have



Site administrators

to be absent from work for many consecutive days. Some



Network engineers



Network designers



Certified Ethical Hacker (CEH): 35 hours



Network administrators



Advanced Penetration Testing (CAST 611): 21 hours



Network managers



Certified Information Systems Auditor (CISA): 40 hours



Systems engineers



Cisco Certified Network Associate Security (CCNA



IT/IS auditors



IS/IT consultants



Non-IT auditors

of the main courses offered are:

Security): 40 hours

Responding to the increasing importance of security issues in today’s IT market, AKTINA offers a rich portfolio of IT security related courses and certifications. These have been carefully selected to respond to the demand for skills and qualifications in business and the public sector.

Depending on the certification provider, exams may be

arranged after each course or on other specified dates, AKTINA has partnered with renowned vendor-neutral IT certification providers to offer courses which are both approved and lead to valuable qualifications. It also



Morning or evening sessions

delivers specific vendor-related courses of major IT



Flexible arrangements

market players like Cisco and Microsoft that have a strong

based on demand

security component.

under the provider’s direct supervision or via Pearson VUE of which AKTINA is an Authorised Test Center:



Certified Ethical Hacker (CEH), by EC-Council



Center for Advanced Security & Testing (CAST) 611 Advanced Penetration Testing, by EC-Council

 Offering IT technical courses sine 1991, AKTINA is on the move … now with world-class IT security training and certification solutions.

Certified Information Systems Auditor (CISA), by ISACA



Implementing Cisco Network Security (IINS) exam

leading to CCNA Security certification, by Cisco



Key issues plaguing the information security world, incident management process and penetration testing



Various types of footprinting, footprinting tools and countermeasures



Network scanning techniques and scanning countermeasures



Enumeration techniques and enumeration countermeasures



System hacking methodology, steganography, steganalysis attacks and covering tracks



Different types of Trojans, Trojan analysis and Trojan countermeasures



Working of viruses, virus analysis, computer worms, malware analysis procedure and countermeasures



Packet sniffing techniques and how to defend against sniffing

will need to become one, but an ethical one!



Social Engineering techniques, identify theft and social engineering countermeasures

Being an Accredited Training Center (ATC) by the



DoS/DDoS attack techniques, botnets, DDoS attack tools and DoS/DDoS countermeasures

 

Session hijacking techniques and countermeasures



Different types of web application attacks, web application hacking methodology and countermeasures

 

SQL injection attacks and injection detection tools



Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines and tools



Firewall, IDS and honeypot evasion techniques, evasion tools and countermeasures



Various cloud computing concepts, threats, attacks and security techniques and tools



Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks and cryptanalysis tools



Various types of penetration testing, security audit, vulnerability assessment and penetration testing roadmap

The Certified Ethical Hacker (CEH) program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you

EC-Council, AKTINA offers the related course which provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organisation. Because “to beat a hacker, you

need to think like a hacker”! The course will immerse you into the hacker mind set so that you will be able to defend against future attacks. The security mindset in any organisation must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in the organisation; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five

phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access and covering your tracks.

Different types of webserver attacks, attack methodology and countermeasures

Wireless Encryption, wireless hacking methodology, wireless hacking tools and wi-fi security tools



Security professionals



Site administrators



Auditors



Number of Questions: 125



Test Duration: 4 Hours Test Format: Multiple Choice

C AS T is a highly Technical and Advanced Security Training Program developed exclusively for the top Information Security

CAST programs are designed and developed by

Professionals

EC-Council in collaboration with well-respected subjectmatter experts and Industry practitioners. All of these

C A S T consists of a set of

Advanced Security Training courses are only conducted

independent Security Training

by appointed EC-Council Trainers, some of whom are

Specializations, all of them offering

authors of the respective courses. Theories are limited to

dynamic, up-to-date features and

the bare essentials and the bulk of the training session

are subject to constant evolution

will be focused on a participant’s individualised

C A S T content is designed to be

involvement in “getting their hands dirty”.

aligned with the most effective

and perplexing threat prevention CAST offers programs that will cover important domains

strategies and remediation policies

such as advanced penetration testing training, malware

C A S T offers a hands-on training experience with tools and fighting techniques derived from real-life scenarios of combating IT security incidents

EC-Council is the world leader in IT Security Courses Information Security, Network Security, Computer

analysis, advanced social engineering, cryptography, digital forensics deep dive, web application security, among others.

Security and Internet Security Certification and Training. EC-Council’s Certified Ethical Hacker (CEH) set the standard for what the world has come to expect from ethical hacking IT Security courses. As Information Technology Security becomes more and

Ideal Candidates for CAST are:

more complex, IT certifications need to address the



ever changing challenges. This is why EC-Council has

Those who already have fundamental credentials in

introduced CAST - Center for Advanced Security

Information Security and need

Training, which offers higher-level and more

to enhance and upgrade their current level to the maximum



sophisticated IT security certifications.

InfoSec Certification Degree

Recognising its prominent position in the market,

EC-Council offers

EC-Council has chosen AKTINA to implement the new

Those who want to acquire

CAST programs in addition to its mainstream

proven Advanced Security Training and enjoy the most exclusive privileges and monetary rewards in their professional career

certifications. Our courses follow strictly the EC-Council

CAST specifications to provide comprehensive content coverage and prepare students for the related exam.



Targets the major and attack-prone fields of data mining and external party invasions



Cultivates innovative problem-solving mindset by using reverse engineering approach



Offers a set of independent, highly specialised and diversified training modules

 





EC-Council’s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced Security Training for information security professionals. CAST programs stand out from



others through their extreme hands-on approach. These highly technical, lab intensive Advanced Security Training courses will allow a participant to combat real life scenarios. 611 - Advanced Penetration Testing is the flagship CAST course which will teach you how to do a professional

  

Scanning with the Nmap tool, autoscan, Netifera and sslscan Scanning and Scripting with Hping3 Building a Target Database

Enumeration

   

Using the nmap scripting engine



IT managers



IT auditors



Government & intelligence

Enumerating SMB OS Fingerprinting

Vulnerability Sites

typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques. The format you will use has been used to train 1000s penetration testers globally, it is proven and effective!



agencies interested in real

Vulnerability Analysis with OpenVAS Vulnerability Analysis with Nessus

world attack and defense in

Firewalls and Vulnerability Scanners

today’s complex and highly

Vulnerability Analysis of Web Apps

secure IT environments

Vulnerability Scanning with W3AF, Webshag, Skipfish, Vega, Proxystrike and Owasp-zap

Exploitation

    

Exploit Sites Manual Exploitation Exploitation with Metasploit Exploiting with Armitage Exploitation with SET

Data Analysis and Reporting



professionals Penetration testers



The ranges progresses in difficulty and reflect an

Information security



Vulnerability Analysis

     



Enumerating Targets and SNMP

Post Exploitation

a test ... the findings and the report!

defeat and challenges to overcome. This is not your

Scanning



security test and produce the most important thing from

enterprise level architecture. There will be defences to

Information gathering and OSINT

     

Conduct local assessment



Number of Questions: 60

Compiling Data in MagicTree & Dradis



Test Duration: 2 Hours

Developing a Professional Report



Test Format: Multiple Choice

Reviewing findings and creating report information

Open book, note and access

Reviewing sample reports

to range is allowed

Creating a custom report

Advanced Techniques

      

Scanning against defenses Exploitation through defenses Source port configuration Detecting Load Balancing

Detecting Web Application Firewalls Evading Detection Exploit writing

Practical Phases

The course focuses on security principles and technologies using Cisco security products to provide examples. It allows students to understand common security concepts and deploy basic security techniques utilising a



Network designers



Network administrators

network infrastructure. Throughout the course students



Network engineers

will gain valuable hands on experience.



Network managers



Systems engineers

variety of popular security appliances within a "real-life"

After completing this course, students will be able to meet

these overall objectives:

CCNA Routing & Switching is one of the most popular certifications in the IT market. Cisco Certified Network Associate Security (CCNA Security) is a complementary qualification which validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security



Describe common network security concepts



Secure routing and switching infrastructure



Deploy basic authentication, authorization and accounting services



Deploy basic firewalling services



Deploy basic site-to-site and remote access VPN services



Describe the use of more advanced security services such as intrusion protection, content security and identity management

infrastructure, recognise threats and vulnerabilities to networks and mitigate security threats.



Number of Questions: 60-70



Test Duration: 1 ½ hours



Test Format: Multiple choice,

leading to the CCNA Security certification. It tests the

drag and drop, filling in and

candidate's knowledge of secure network

simulation

infrastructure, understanding core security concepts,



Course Introduction

managing secure access, VPN encryption, firewalls,



Network Security Concepts

intrusion prevention, web & email content security and



Secure Network Devices

endpoint security. The exam validates skills for



Layer 2 Security

installation, troubleshooting and monitoring of a



Firewalls



Virtual Private Networks

Implementing Cisco Network Security (IINS) is the exam

secure network to maintain integrity, confidentiality and availability of data and devices.

Candidates should possess as a pre-requisite any valid CCNA Routing and Switching, CCENT or CCIE certification.

The course reflects the job practice which is split into 5 Domains:



Domain 1 - The Process of Auditing Information Systems (21%)

  



IS/IT auditors

(16%)



IS/IT consultants

Domain 3 - Information Systems Acquisition,



IS/IT audit managers

Development and Implementation (18%)



Security professionals



Non-IT auditors



Number of Questions: 150



Test Duration: 4 Hours

Domain 2 - Governance and Management of IT

Domain 4 - Information Systems Operations, Maintenance and Service Management (20%)



Domain 5 - Protection of Information Assets (25%)

Enhance your career by earning ISACA’s Certified Information Systems Auditor (CISA), world-renowned as the standard of achievement for those who audit, control, monitor and assess information technology and business systems. Boost your credentials and gain a competitive

The CISA Certification offers many advantages:

edge by attending the AKTINA course and passing the

  

exam required for this prestigious qualification.

issues and customise practices to support trust in and value from information systems. The CISA designation is

 

vulnerabilities, report on compliance and institute controls within the enterprise.

challenges of a modern enterprise

Is globally recognised as the mark of excellence for the IS audit professional Combines the achievement of passing a educational experience, providing you with credibility

assurance and security professionals. Being CISA-certified

and demonstrates you are capable to assess

Demonstrates that you have gained and maintained

comprehensive exam with recognition of work and

a globally recognised certification for IS audit control,

showcases your audit experience, skills and knowledge

Quantifies and markets your expertise the level of knowledge required to meet the dynamic

Enterprises demand IS audit professionals who possess

the knowledge and expertise to help them identify critical

Confirms your knowledge and experience

  

in the marketplace Increases your value to your organisation Gives you a competitive advantage over peers when seeking job growth Helps you achieve a high professional standard through ISACA’s requirements for continuing education and ethical conduct

Test Format: Multiple Choice

ΑΚΤΙΝΑ has been providing IT training solutions since 1991. Its courses address the needs of IT professionals, developers and end-users. It offers a diverse training portfolio for the major software vendors like Microsoft, Cisco, Oracle and VMware as well as vendor-neutral IT certifications of providers like EC-Council and ISACA.

Certified Professionals stand apart AKTINA offers flexible solutions ranging from group sessions to one-on

from other IT personnel as they

-one coaching and a variety of learning options which allow students to

are capable of demonstrating

learn in a manner that best suits their organisation’s objectives,

undeniable technical expertise to

schedule and budget.

employers, clients and the IT

community. We have a variety of technical certifications which are

Effective training can be a key to your success. If you wish to expand

invaluable in today’s highly

your IT skills, AKTINA has the right tools to help you achieve your goals. And if you want to pursue an IT certification, AKTINA delivers many

competitive IT work

packages which will enhance your career prospects.

environment.



Systems engineers



Network administrators



Database administrators



Software engineers



Programmers



Web developers



Support professionals



Project managers



IT managers



IT/IS auditors



MICROSOFT



CISCO



ORACLE



VMWARE



LINUX



PMI



ITIL



ADOBE

Tel: +357.22818101