EC-Council

The Certified Ethical Hacker (CEH) certification is one of the most recognized and recommended by employers for cybersecurity and cyber defense specialists. It is one of the most in-demand certifications to enhance the security level of IT infrastructures and service providers. Since the first version of the training in 2003, the CEH program has always been recognized as a standard in the cybersecurity community. Version 13 of the CEH continues this path and introduces the latest hacking techniques with the most advanced tools and exploits used by today’s cybersecurity professionals. The five steps of ethical hacking and the course’s mission remain the same: to acquire knowledge of network attacks to provide an adequate countermeasure to hackers.

Our CEH computer security training will provide you with knowledge of the five phases of hacking, attack vectors, and preventive countermeasures. This rigorous training will help you recognize how a hacker operates to better protect your networks and defend your company against cyber criminals. Understanding a system’s weaknesses and vulnerabilities helps organizations maintain security controls and minimize the risk of incidents. The CEH has been designed to incorporate a practical environment and a systematic methodology across offensive security domains, giving you the opportunity to work on improving your knowledge and ethical hacking skills.

Expand
Price: $4495
Duration: 5 days / 35 hours

The Certified Network Defender (CNDv3) course is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and white papers for additional learning.

Expand
Price: $4495
Duration: 5 days / 35 hours

The EC-Council Certified Cloud Security Engineer (CCSE) course is organized by cloud security professionals in association with renowned experts to offer a blend of both vendor-neutral and vendor-specific cloud security concepts.

Vendor-neutral concepts focus on cloud security practices, technologies, frameworks, and principles. In contrast, vendor-specific materials provide the practical skills necessary to configure specific platforms such as Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP). This offers candidates a well-balanced mix of theoretical and practical skills. Additionally, advanced topics also cover modules on securing cloud infrastructure by implementing regulations and standards to maintain security. The EC-Council cloud security course is tailored to the real-time roles and responsibilities of cloud security professionals and is ideal for both beginners and experienced cybersecurity professionals.

Expand
Price: $4495
Duration: 5 days / 35 hours

Organizations face constant threats from malicious actors seeking to exploit vulnerabilities in their networks and systems. The Certified Penetration Testing Professional (CPENT) certification demonstrates advanced expertise in ethical hacking and penetration testing.

The EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to conduct penetration tests in an enterprise network environment that is being attacked, exploited, bypassed, and defended. The CPENT training will upgrade your knowledge on intrusion assessments of IoT and OT systems, developing your own exploits and tools, conducting advanced assessment tests, techniques for accessing secure networks, and customizing scripts and exploits to infiltrate the most secure segments of your network.

Expand
Price: $4495
Duration: 5 days / 35 hours

The Certified SOC Analyst (CSAv2) program is the first step towards joining a Security Operations Center (SOC). It is designed for current and aspiring Level I and Level II SOC analysts to acquire skills in performing entry-level and intermediate operations.

CSA is a training and certification program that helps candidates gain in-demand technical skills through instruction from some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through comprehensive and meticulous knowledge with enhanced-level capabilities to contribute dynamically to a SOC team. As an intense 3-day program, it covers the fundamentals of SOC operations in depth, followed by knowledge on log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, candidates will learn to manage various SOC processes and collaborate with the CSIRT when necessary.

Expand
Duration: 3 days / 21 hours

The ECIH program focuses on a structured approach to executing the Incident Handling and Response (IH&R) process. The IH&R process includes steps such as incident management and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence collection and analysis, incident containment, system recovery, and incident eradication. This systematic incident handling and response process educates responders on how to react to various types of security incidents.

Cybersecurity professionals interested in a career in incident management and response need comprehensive training on IH&R concepts as well as real-world scenarios. The ECIH program includes hands-on learning provided through iLabs, online labs as part of the training program.

Expand
Duration: 2 days / 14 hours

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography.

Participants will learn the basics of symmetric and modern key cryptography, including details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced include an overview of algorithms such as Blowfish, Twofish, and Skipjack; hashing algorithms, including MD5, MD6, SHA, Gost, RIPMD 256, and others; asymmetric cryptography, including in-depth descriptions of RSA, Elgamal, Elliptic Curve, and DSA; and significant concepts such as diffusion, confusion, and Kerckhoffs’s principle. Participants will also receive practical applications of the following: how to set up a VPN, encrypt a drive, and hands-on experience with steganography.

Expand
Duration: 3 days / 21 hours

The EC-Council CCT certification immerses students in a well-structured knowledge transfer. The training includes critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and advance to the skill development phase within the classroom itself. By the end of the program, CCT-certified professionals will have a solid foundation in cybersecurity principles and techniques, along with practical exposure to tasks required in real-world jobs.

Expand
Duration: 5 days / 35 hours

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts from around the world to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach to creating effective threat intelligence.

In the constantly evolving threat landscape, C|TIA is an essential program for those who face cyber threats daily. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the programs aligns with and adheres to threat intelligence frameworks published by government and industry.

Expand
Duration: 3 days / 21 hours

The CHFI training provides participants with knowledge in digital forensics from a vendor-neutral perspective on tools and techniques. The CHFI program is the most comprehensive for exploring scenarios in a forensic investigation and enables participants to acquire practical knowledge to become familiar with the most important principles and the tools required to conduct a complete and legally recognized investigation.

The CHFI certification will provide participants (law enforcement personnel, network administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, etc.) with the skills required to conduct the digital investigation process.

The CHFI represents a methodological approach to forensics, including data search and seizure, chain of custody, acquisition, preservation, analysis, and reporting of data evidence.

Expand
Duration: 5 days / 35 hours

Organizations increasingly recognize the central role of a Chief Information Security Officer (CISO) in protecting sensitive information and ensuring robust cybersecurity measures. The EC-Council’s Certified Chief Information Security Officer (CCISO) program stands out as a comprehensive and advanced certification designed for seasoned information security professionals aspiring to executive roles.

Information security professionals benefit from the prestigious Certified CISO training by EC-Council, achieving a higher and industry-recognized level of certification. A group of security executives, along with the CCISO Advisory Board, participated in creating the certification course program. The members include course authors, exam authors, and other individuals dedicated to quality assurance as well as trainers. Each segment of this program has been developed by the most experienced individuals in the field, aiming to impart knowledge to leaders in the information security domain to successfully implement an information security program within their organization.

Expand
Duration: 5 days / 35 hours

Threats are evolving rapidly, and securing software development processes has become paramount. The EC-Council Certified DevSecOps Engineer (ECDEv2) emerges as an innovative certification designed for professionals aiming to integrate security seamlessly into the DevOps lifecycle.

The EC-Council Certified DevSecOps Engineer (ECDEv2) training is a comprehensive DevSecOps certification program, instructor-led, for professionals seeking to acquire essential knowledge and skills in designing, developing, and maintaining secure applications and infrastructures. This course combines both theoretical knowledge and the practical implementation of DevSecOps in your on-premises and cloud environments (AWS and Azure). The course covers the integration and automation of all major DevSecOps tools, processes, and methodologies widely used to help organizations quickly create secure applications in a DevOps environment.

Expand
Duration: 3 days / 21 hours

EC-Council Disaster Recovery Professional (EDRP) is a comprehensive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans.

It instructs professionals on various methods of identifying vulnerabilities and taking countermeasures against these vulnerabilities. Professionals will learn how to secure their data by implementing policies and procedures and how to recover and restore their organization’s critical data following a disaster.

EDRP provides professionals with a solid understanding of business continuity and disaster recovery principles, including conducting business impact analyses, risk assessments, policy and procedure development, and plan implementation.

Expand
Duration: 5 days / 35 hours