Trainings
Certified Ethical Hacker CEH v12
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. CEH V12 provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.
Fundamentals of Ethical Hacking – FD EH
Ethical Hacking Fundamentals (E|HF) is an entry-level security program covering the fundamental concepts of information security. It equips students with the skills required to identify the increasing information security threats which reflect on the security posture of the organization and implement general security controls. This program gives a holistic overview of the key components of information security. It provides a solid fundamental knowledge required for a career in information security. The E|HF is designed for those interested in learning the various fundamentals of information security.
Fundamentals of Network Security - FD NS
Network Security Fundamentals (N|SF) is an entry-level security program covering the fundamental concepts of network security. It enables students with the skills to identify information security threats that reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of network security. It provides a solid fundamental knowledge required for a career in network security. This course is designed for those interested in learning the various fundamentals of network security.
Fundamentals of Computer Forensics -FD CF
Computer Forensics Fundamentals (C|FF) is an entry-level security program covering the fundamental concepts of information security. Through this program, students can build skills to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program gives a holistic overview of the key components of computer forensics. It provides a solid fundamental knowledge required for a career in computer forensics. The Computer Forensics Fundamentals course significantly benefits students interested in learning the fundamentals of computer forensics.
EC-Council Security Specialist -ECSS
EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Information security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.
EC-Council Certified Encryption Specialist -ECES
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:
-
Overview of other algorithms such as Blowfish, Twofish, and Skipjack
-
Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
-
Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
-
Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.
Participants will also be provided with a practical application of the following:
-
How to set up a VPN
-
Encrypt a drive
-
Hands-on experience with steganography
-
Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.
Certified SOC Analyst -CSA
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.
Certified Threat Intelligence Analyst -CTIA
Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. C|TIA is a method-driven Threat Intelligence program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.
Disaster Recovery -EDRP
The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain business continuity and disaster recovery plan.
Certified Application Security Engineer (.NET/JAVA) - CASE.NET/CASE JAVA
The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike other application security training, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post-development phases of application development.
EC-Council Certified Security Analyst (ECSA)
The EC-Council Certified Security Analyst (ECSA) certification is a security credential like no other. The ECSA program offers a seamless learning progress, continuing where the CEH program left off. Unlike most other pen-testing programs that only follow a generic kill chain methodology; the ECSA presents a set of distinguishable comprehensive methodologies that are able to cover different pentesting requirements across different verticals. This ECSA penetration testing course provides you with a real world, hands-on penetration testing experience while you prepare to take the ESCA exam. Elevate your ethical hacking skills by utilizing EC-Council’s published penetration testing methodology.
CCISO-Ec-Council iweek Training
EC-Council iWeek is an online (synchronous) training platform where an EC-Council instructor trains the class live, over the internet.
ECSA-Ec-Council iweek Training
EC-Council iWeek is an online (synchronous) training platform where an EC-Council instructor trains the class live, over the internet.
CEH-Ec-Council iweek Training
EC-Council iWeek is an online (synchronous) training platform where an EC-Council instructor trains the class live, over the internet.
Certified Secure Computer User - CSCU
The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.
EC-Council Certified Incident Handler -ECIH
The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. After attending this course, they will be able to create incident handling and response policies as well as deal with various types of computer security incidents. The IT incident management training program will enable students to be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats. In addition, students will learn about computer forensics and its role in handling and responding to incidents. The course also covers incident response teams, incident management training methods, and incident recovery techniques in detail. The ECIH certification will provide professionals with greater industry acceptance as the seasoned incident handler.
Computer Hacking Forensic Investigator- CHFI
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered in EC-Council’s CHFI program will prepare the student to conduct computer investigations using groundbreaking digital forensics technologies. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.
Certified Network Defender Certification- CND
The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network. Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. A CND will get the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyze the subject material. In addition, network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.
CND is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).