{"id":1237,"date":"2021-10-30T17:28:13","date_gmt":"2021-10-30T11:58:13","guid":{"rendered":"https:\/\/www.symbizsolutions.com\/academy\/?page_id=1237"},"modified":"2022-03-17T14:08:05","modified_gmt":"2022-03-17T08:38:05","slug":"rocheston-certified-cyber-security-training","status":"publish","type":"page","link":"https:\/\/symbizsolutions.com\/academy\/rocheston-certified-cyber-security-training\/","title":{"rendered":"Rocheston Certified Cyber Security Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1237\" class=\"elementor elementor-1237\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c5cf5b6 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"4c5cf5b6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-260b9c7\" data-id=\"260b9c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-376a34e7 elementor-widget elementor-widget-heading\" data-id=\"376a34e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rocheston Certified Cyber Security Engineer Level 1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-46599f93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46599f93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-67313f9f\" data-id=\"67313f9f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2afe7060 elementor-widget elementor-widget-heading\" data-id=\"2afe7060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-480298c3 elementor-widget elementor-widget-text-editor\" data-id=\"480298c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The RCCE\u00ae Level 1 course will delve into the basics of cybersecurity along with hands-on labs. You will gain an insight into hacking technologies and tools. Cyber Security course Level 1 covers the foundation of hacking technologies. For instance, it looks at Web application attacks, Trojans and Malware, Denial of Service attacks, metasploit, firewalls, cryptography, cracking passwords, hacking the cloud etc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62681251 elementor-widget elementor-widget-heading\" data-id=\"62681251\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What\u2019s unique about the course?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17ab2efc elementor-widget elementor-widget-text-editor\" data-id=\"17ab2efc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Rocheston Ros\u00e9 OS (Consists of all lab materials)<\/li><li>Training Videos<\/li><li>RCCE\u00ae Sample Test<\/li><li>Whitepapers<\/li><li>Online Support<\/li><li>6-month subscription to Cyberclass\u00ae access with course and Rose updates<\/li><li>Trainer will be an Authorized Rocheston Trainer.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5625d24c elementor-widget elementor-widget-heading\" data-id=\"5625d24c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Duration: 32 hours<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f3cbdfc elementor-widget elementor-widget-heading\" data-id=\"2f3cbdfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mode: Online Session<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d00d587 elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"7d00d587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2091\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-2091\" aria-expanded=\"false\">Outline<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2092\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2092\" aria-expanded=\"false\">Who can Join<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2093\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2093\" aria-expanded=\"false\">Course Outcome<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-2094\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2094\" aria-expanded=\"false\">Instructor<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-2091\" aria-expanded=\"false\">Outline<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2091\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2091\" tabindex=\"0\" hidden=\"false\"><div><p><strong>Outline of Cybersecurity Course Singapore\u00a0\u00a0<\/strong><\/p><\/div><ul><li>Cybersecurity threats, attacks and defenses<\/li><li>Information gathering and network scanning<\/li><li>Cyber Vulnerabilities<\/li><li>Web Application Attacks<\/li><li>Web shells, Spywares and Backdoors<\/li><li>Denial of Service Attacks<\/li><li>Packet Sniffers and Network Analyzers<\/li><li>Password Cracking<\/li><li>Wireless Hacking<\/li><li>Firewalls and IDS<\/li><li>Hacking Frameworks<\/li><li>Cryptography<\/li><li>Malware attacks<\/li><li>Phishing Attacks<\/li><li>Hacking Facebook, Twitter, WhatsApp and Others<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2092\" aria-expanded=\"false\">Who can Join<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2092\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2092\" tabindex=\"0\" hidden=\"hidden\"><div class=\"ul-li-content-clp\"><ul><li>Have two years IT work experience<\/li><li>Basic familiarity of Linux and\/or Unix.<\/li><li>Knowledge of TCP\/IP networking<\/li><li>Knowledge of Windows Server<\/li><\/ul><\/div><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2093\" aria-expanded=\"false\">Course Outcome<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2093\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2093\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Utilize vulnerabilities to identify if unauthorized activity is possible.<\/li><li>Carry out effective penetration test.<\/li><li>Understand advanced cybersecurity solutions.<\/li><li>RCCE Level 1 imparts specialist knowledge on persistent privacy problems, malware vulnerabilities, cybersecurity vulnerabilities, insecure networks, penetration testing and many other problems.<\/li><li>Understand the types of cybersecurity threats and attacks artificial intelligence, cloud computing and different types of scripting languages.<\/li><li>Maintain private servers \u2013 a sure-fire way of having completely encrypted communication.<\/li><li>Test business infrastructure, and the state of the server if the web connection is terminated.<\/li><li>Protect yourself from remote exploits by testing for vulnerabilities within your existing devices and infrastructure.<\/li><li>Cyber Security Certification will be provided<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-2094\" aria-expanded=\"false\">Instructor<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2094\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2094\" tabindex=\"0\" hidden=\"hidden\"><p>Trainer will be an Authorized Rocheston Trainer\u00a0<\/p><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2dfdcc77\" data-id=\"2dfdcc77\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bb47dc4 elementor-widget elementor-widget-heading\" data-id=\"5bb47dc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Related Course<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-261aa723 elementor-widget elementor-widget-text-editor\" data-id=\"261aa723\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li><a href=\"https:\/\/www.symbizsolutions.com\/academy\/rocheston-certified-cyber-security-specialist\/\" style=\"text-decoration: none;\">Rocheston Certified Cyber Security Specialist<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20c35ce9 elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"20c35ce9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-shrink\" href=\"https:\/\/www.symbizsolutions.com\/academy\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">jOIN now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Rocheston Certified Cyber Security Engineer Level 1 About the Course The RCCE\u00ae Level 1 course will delve into the basics of cybersecurity along with hands-on labs. You will gain an insight into hacking technologies and tools. Cyber Security course Level 1 covers the foundation of hacking technologies. For instance, it looks at Web application attacks, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1237","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/1237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/comments?post=1237"}],"version-history":[{"count":25,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/1237\/revisions"}],"predecessor-version":[{"id":2443,"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/pages\/1237\/revisions\/2443"}],"wp:attachment":[{"href":"https:\/\/symbizsolutions.com\/academy\/wp-json\/wp\/v2\/media?parent=1237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}