Training
EC-Council Training Courses
Network Defense Essentials (N|DE)
The Network Defense Essentials program covers the fundamental concepts of network defense and security.
N|DE equips students with the knowledge and skills required to identify the increasing network security threats that impact the security posture of organizations around the globe. Participants also learn to implement general security controls to protect the underlying network infrastructure from unauthorized access, modification, destruction, or disclosure.
Ethical Hacking Essentials (E|HE)
The Ethical Hacking Essentials program covers the fundamental concepts of information security and ethical hacking. E|HE equips students with the knowledge and skills to identify information security threats and attack vectors, including password cracking, social engineering, sniffing, and implementing general security controls.
Certified Cybersecurity Technician (C|CT)
The C|CT is an entry-level cybersecurity program engineered by EC-Council, the creator of the Certified Ethical Hacker (CIEH) certification, to address the global need and demand for cybersecurity technicians with strong foundational skills.
CICT is focused on hands-on practice, with more than 50% of training time dedicated to labs.
Certified Cloud Security Engineer (C|CSE)
EC-Council's Certified Cloud Security Engineer (CCSE) program is a hands-on learning course curated by cloud security professionals in collaboration with subject matter experts across the globe.
This specialized course combines vendor-neutral and vendor-specific cloud security concepts mapped to real time cloud security job roles.
Certified Network Defender (C|ND)
CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks.
Certified Ethical Hacker (C|EH)
C|EH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization.
The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations.
Digital Forensics Essentials (D|FE)
EC-Council’s Digital Forensics Essentials or D|FE certification is part of the Essentials Series and
offers foundational learning on digital forensics and investigation phases. D|FE modules are
mapped to industry skills and are designed to prepare students for entry-level cybersecurity
roles. It recognizes the competency and expertise in digital forensics and information security skills, equipping candidates to bring value to their workplace and organization.
Certified Threat Intelligence Analyst (C|TIA)
C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the threat intelligence project to building a report to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.
This program addresses all the stages involved in the Threat Intelligence Life Cycle.
This attention to a realistic and futuristic approach makes C|TIA one of the
most comprehensive threat intelligence certifications on the market today.
Certified SOC Analyst (C|SA)
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entrylevel and intermediate level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry.The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team.
Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.
Certified Penetration Tester (C|PENT)
Introducing the most extensive and advanced penetration testing program on the planer. The dynamic pen testing course culminates in a brand new 24-hr practical exam, hosted on the new EC-Council
Cyber Range platform, CyberQ. CPENT provides the capability to assess a pen tester's skills across a broad spectrum of "network zones," with each zone representing a distinct type of testing. The pen testing
challenges shall truly test a candidate's ability to think-on-their-feet and perform real world maneuvers. Candidates challenging the CPENT Program must overcome their assessment challenges which are
created in various zones, which is unlike any other Penetration Testing program available in the market today.
EC-Council Certified Security Analyst (EC|SA)
ECSA is a globally accepted hacking and penetration testing program that covers the testing
of modern infrastructures, operating systems, and application environments while teaching
the students how to document and write a penetration testing report.
This program takes the tools and techniques covered in C|EH to next level by utilizing
EC-Council’s published penetration testing methodology.
EC-Council Certified Incident Handler (ECIH)
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
The comprehensive training program will make students proficient in handling as well as responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats
Computer Hacking and Forensic Investigator (CHFI)
CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to acquire hands-on experience.
The program provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. Moreover, CHFI provides firm grasp on the domains of digital forensics.
EC-Council Disaster Recovery Professional (EDRP)
The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization.
It also provides the networking professional a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of an organization, implementation of a plan, and recovering from a disaster
Certified Chief Information Security Officer (C|CISO)
The C|CISO certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
Bringing together all the components required for a C-Level positions, the C|CISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital for leading a highly successful IS program.
The C|CISO Training Program can be the key to a successful transition to the highest ranks of information security management.