ESSOKA CYBERSECURITY DIVISION
  • Home
    • CYBERWIKI
    • STATISTICS
  • ECSD SERVICES
    • OUR CYBER TEAM
    • INDUSTRY SOLUTIONS >
      • All GFI Solutions
      • Checkpoint Solutions
      • Kaspersky
  • EC-COUNCIL
    • CERTIFICATIONS
    • ECSD ATC
    • iWeek (Live Online Classes)
    • CODRED
    • Ohphish
  • SECURITY
  • Portfolio
    • POLICY FRAMEWORK >
      • ANTIC
      • Cyberlaws in different countries
    • EDUCATION >
      • ACCREDITED TRAINING >
        • CSCU
        • CEHV9
        • CHFI
    • PARTNER4AFRICA CYBER PROJECT
    • Cyber4Africa (C4A) Project Details
  • Philosophy
  • Français
    • PIRATE INFORMATIQUE CERTIFIÉ
    • ENQUÊTEUR DE LA CRIMINALISTIQUE INFORMATIQUE
    • SERVICES
  • Contact
    • Blog and Mail >
      • RSS Feed
    • ECSD ADMIN

ESSOKA CYBERSECURITY SERVICES


​Take control and remain in control of your information resources. 

We offer offensive Cybersecurity training that will empower companies and individuals on how to protect their information assets (CSCU), identify and protect all Information technology infrastructure from cyber-attack (CEH) by identifying threats and effectively resolving high risk operating standards: services that will exploit vulnerabilities and provide counter measures to cybercrime; Services on how to investigate (CHFI) cybercrime with concrete legally acceptable digital evidence. Essoka Cybersecurity training programs and services are licensed by EC-Council, the world's leading Cybersecurity Tuition Provider. We also offer industry security solutions through partnerships with GFI Software, Checkpoint and Kaspersky. 

  1.   Modulated Services per CSCU
  • Cybersecurity Personal, and Corporate Training Programs for the knowledge  workers...read more

  2.   Modulated Services per Offensive Cybersecurity
  • Our penetration testing and counter measure services:
  • Incident management and penetration testing
  • Footprinting and Reconnaissance and countermeasures
  • Network scanning and scanning countermeasures
  • Enumeration and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks
  • Types of Trojans, Trojan analysis, and Trojan countermeasures
  • Virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing and scanning countermeasures
  • Social Engineering, identify theft, and social engineering countermeasures
  • DoS/DDoS attack, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking and countermeasures
  • Types of webserver attacks, attack methodology, and countermeasures
  • Types of web application attacks, web application hacking methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wireless security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Cloud Hacking: Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

​   3.   Modulated Services per CHFI
  • Computer Forensics Investigation (AccessData FTK, EnCase)
  • Digital Evidence
  • First Responder Procedures
  • Data Acquisition and Duplication
  • Disaster Recovery:  Recovering Deleted Files and Deleted Partitions
  • System Hacking: Steganography and Image File Forensics
  • Password Cracking: Application Password Crackers, Log Capturing and Event Correlation
  • Wireless Hacking: Investigating Network Traffic, Investigating Wireless Attacks, Investigating Web Attacks
  • Mobile Hacking:  Mobile Forensics.

4.   ECSD Cybersecurity Team: 
           Essoka Cybersecurity Division (ECSD) services are furnished by a cyber team  overly qualified in personal-business
           organizational development and internationally certified in the following areas;
  • Vulnerability Assessment and Penetration Testing (VAPT): Certified Network Defender (CND), Certified Ethical Hacker (CEH Master), Certified Penetration Testing Professional (CPENT), Licensed Penetration Tester (LPT)
  • Cyber Forensics: Certified Network Defender (CND), Certified Ethical Hacker (CEH Master), Certified Threat Intelligence Analyst (CTIA), EC-Council Certified Incident Handler (ECIH), Computer Hacking Forensic Investigator (CHFI). 
  • Network Defense and Operations: Certified Network Defender (CND), Certified SOC Analyst (CSA), Certified Threat Intelligence Analyst (CTIA), EC-Council Certified Incident Handler (ECIH), EC-Council Disaster Recovery Professional (EDRP), Advanced Network Defense (CAST 614)
  • Software Security: Certified Network Defender (CND), Certified Ethical Hacker (CEH Master), Certified Application Security Engineer .Net (CASE .Net), Certified Application Security Engineer Java (CASE Java),  EC-Council Certified Security Analyst (ECSA), Licensed Penetration Tester (LPT Master). 










  
© 2015-2024 Essoka Cybersecurity Division (ECSD), A Postindustrial Entity of Essoka Corporation , - A BTH Education Group International Corporation Development (ICD)  Protégé.
2024 C4A Affiliates:
Standardization of Digital Literacy 2024 - Information Security Literacy for Africa 2024  - Cyber4Africa Technocracy Program.
  • Home
    • CYBERWIKI
    • STATISTICS
  • ECSD SERVICES
    • OUR CYBER TEAM
    • INDUSTRY SOLUTIONS >
      • All GFI Solutions
      • Checkpoint Solutions
      • Kaspersky
  • EC-COUNCIL
    • CERTIFICATIONS
    • ECSD ATC
    • iWeek (Live Online Classes)
    • CODRED
    • Ohphish
  • SECURITY
  • Portfolio
    • POLICY FRAMEWORK >
      • ANTIC
      • Cyberlaws in different countries
    • EDUCATION >
      • ACCREDITED TRAINING >
        • CSCU
        • CEHV9
        • CHFI
    • PARTNER4AFRICA CYBER PROJECT
    • Cyber4Africa (C4A) Project Details
  • Philosophy
  • Français
    • PIRATE INFORMATIQUE CERTIFIÉ
    • ENQUÊTEUR DE LA CRIMINALISTIQUE INFORMATIQUE
    • SERVICES
  • Contact
    • Blog and Mail >
      • RSS Feed
    • ECSD ADMIN