Training & Events
-
-
CompTIA Penetration Testing (PenTest+)
-
Certified Ethical Hacker (CEH)
Master the methodology behind ethical hacking and prepare for the Certified Ethical Hacker exam. Learn how to scan, test, hack, and secure target systems by reverse-engineering attacks. Identify and defend against vulnerabilities in your network and systems.
Flexible Online Training
-
Certified Penetration Tester (CPENT)
Learn to perform an effective penetration test in EC Council’s live cyber range and take your pen testing skills to the next level.
-
Industrial Control Systems (ICS) and Supervisory Control & Data Acquisition (SCADA)
This hands-on course will get you “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against ICSs.
-
Certified Application Security Engineer (CASE) .NET
Create secure applications, focusing on the Secure Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.
-
Certified Application Security Engineer (CASE) Java
Create secure applications in Java, focusing on the Secure Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.
-
Certified Incident Handler (ECIH)
Detect, manage, and respond holistically to critical incidents, so that you can reduce the impact of the incident on your institution’s budget and reputation.
-
Certified SOC Analyst (CSA)
Learn to use SIEM solutions and predictive capabilities using threat intelligence. Explore the practical aspect of SIEM using the up-to-date tools and methods.
-
Certified Ethical Hacker (CEH)
Master the methodology behind ethical hacking and prepare for the Certified Ethical Hacker exam through labs that mimic real-life scenarios.
-
Certified Network Defender (CND)
Protect, detect, and respond to network attacks, through hands-on labs that have been based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE).
-
Disaster Recovery Professional (EDRP)
Identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for your organization through a cohesive understanding of business continuity and disaster recovery principles.
-
Certified Hacking Forensic Investigator (CHFI)
Conduct computer investigations using digital forensics technologies to detect hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.
-
Certified Chief Information Security Officer (CCISO)
Connect technical knowledge with the management skills required to transition to the highest ranks of information security management.