EC-Council

EC-Council Certified Security Analyst (ECSA)

Prerequisites: 

Completion of EC-Council Certified Ethical Hacker course.

Class Description: 

The EC-Council Certified Security Analyst course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report. The ECSA program takes the tools and techniques you learned in the Certified Ethical Hacker (CEH) course and elevates your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology

Who Should Attend?: 
  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment Professionals

EC-Council Computer Hacking Forensic Investigator (CHFI)

Prerequisites: 
  • IT/forensics professionals with basic knowledge on IT/cyber security, computer forensics, and incident response
  • Prior completion of Certified Ethical Hacker (CEH) training would be an advantage
Class Description: 

EC-Council's Computer Hacking Forensic Investigator (CHFI) certification course outlines a detailed, methodological approach to computer forensic and evidence analysis, including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence. This course provides the necessary skills to perform effective digital forensic investigations and covers the major tools and theories used by cyber forensic experts today.

Who Should Attend?: 

The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.

EC-Council Network Security Administrator (ENSA)

Prerequisites: 

It is strongly recommended that you have hands-on experience and working knowledge in the networking and security fields.

Class Description: 

The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information.

Who Should Attend?: 

This course will significantly benefit System Administrators, System Engineers, Firewall Administrators, Network Managers, IT Managers, IT Professionals, and anyone who is interested in network security technologies.

EC-Council Certified Security Specialist (ECSS)

Prerequisites: 

It is strongly recommended that you have a working knowledge about the networking and information system security issues.

Class Description: 

EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. The course will benefit the students who are interested in learning fundamentals of information security, network security, and computer forensics.

Who Should Attend?: 

This course will significantly benefit individuals who are entering into the world of computer security.

EC-Council Certified Network Defender (CND)

Prerequisites: 

It is strongly recommended that you have a working knowledge about the networking and information system security issues.

Class Description: 

This course provides a comprehensive review of network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration.

Who Should Attend?: 

This course will significantly benefit individuals who are entering into the world of computer security.

EC-Council Certified Chief Information Security Officer (CCISO)

Prerequisites: 

Five years of experience in three of the five domains is required:
 
The five CCISO Domains are:

  1. Domain 1: Governance (Policy, Legal, and Compliance)
  2. Domain 2: IS Management Controls and Audit Management
  3. Domain 3: Management of Projects, Technology, and Operations
  4. Domain 4: Information Security Core Concepts
  5. Domain 5: Strategic Planning and Finance
Class Description: 

The Certified Chief Information Security Officer program is the first of its kind certification that recognizes an individual’s accumulated skills in developing and executing an information security management strategy in alignment with organizational goals. CCISO equips information security leaders with the most effective toolset to defend organizations from cyber-attacks. To rise to the role of the CISO, strong technical knowledge, and experience is more imperative now than ever before but it must be accompanied by the ability to communicate in business value. CCISOs understand that their information security decisions often have a direct impact on their organization’s operational cost, efficiency, and agility. As organizations introduce new technologies, CCISOs will develop and communicate a strategy to avoid the potential risks stemming from their implementation to the organization’s operations. 

Application Process:

In order to qualify to take the CCISO Exam, applicants must fill out the CCISO Exam Eligibility Application found here. Applications should be emailed to cciso@eccouncil.org. If the applicant is attempting the exam without taking EC-Council Authorized Training, five years of experience in each of the five CCISO Domains is required (experience can be overlapping) and a $100 application fee is due with the application. If an applicant has purchased EC-Council Authorized Training, there is no application fee due and only five years of experience in three of the five domains is required. Application processing time varies due to the fact that part of the process involves reaching out to verifiers indicated by the applicants as able to verify their experience. In order to speed up this process, applicants can assist the application processing team by reaching out to their verifiers to ensure they have received the required forms from EC-Council and understand what is required. Applications from students in EC-Council Authorized Training are prioritized and expedited in order to ensure testing can occur at the time of the class if the student desires.

 

Who Should Attend?: 

This class is designed for professionals who:

  • Aspire to attain the highest regarded title within the information security profession – CISO
  • Already serve as an official CISO
  • Or perform CISO functions in their organization without the official title

EC-Council Certified Ethical Hacker (CEH)

Prerequisites: 

Candidate should have at least two years of information technology experience, a strong working knowledge of TCP/IP, and a basic familiarity with Linux or strong working support knowledge of Microsoft XP or Vista.

Class Description: 

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures. Unlike other strictly theoretical training, you will be immersed in interactive sessions with hands-on labs after each topic. You can explore your newly gained knowledge right away in your classroom by pentesting, hacking and securing your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current, essential security systems. You will first begin with understanding how perimeter defenses work and then move into scanning and attacking networks, of course, no real network is harmed. You will also learn how intruders escalate privileges and what steps can be taken to secure a system. You will also gain knowledge about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. When you leave this intensive 5 day class you will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Who Should Attend?: 

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.

Subscribe to RSS - EC-Council