Lista Cursuri Disponibile – EC-Council Cyber Security
iLearn is EC Council’s online, self-paced option which means that all of the same modules taught in the live course are recorded and presented in a streaming video format. A certification candidate can set their own learning pace by pausing the lectures and returning to their studies as their schedule permits!
This all-inclusive training program provides the benefits of classroom training at your own pace.
Base package includes:
• Instructor-led, streaming video training modules – 1 year access
• Official EC-Council e-courseware – 1 year access
• iLabs, virtual lab platform – 6 months access
• Certification Exam Voucher
• Certificate of Attendance
See more information about "Certified Secure Computer User (CSCU)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: CSCU provides individuals with the necessary knowledge and skills to protect their information assets.
This course covers fundamentals of various computer and network security threats such as identity theft, credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks, and social engineering.
Associated exams: 112-12
Vedeti mai multe informatii despre "EC-Council Certified Encryption Specialist (ECES)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description : The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Functions, DES, and AES.
Associated exams: 212-81
See more information about "Certified Network Defender (CND)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks.
The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations.
Associated exams: 321-38
See more information about "Certified Ethical Hacker (CEH)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: CEH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization.
The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.
Associated exams: 312-50
See more information about "EC Council Certified Security Analyst (ECSA)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and write a penetration testing report.
This program takes the tools and techniques covered in C|EH to next level by utilizing EC-Council’s published penetration testing methodology.
Associated exams: 412-79
See more information about "EC-Council Certified Incident Handler (ECIH)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
The comprehensive training program will make students proficient in handling as well as responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.
Associated exams: 212-89
See more information about "Computer Hacking Forensic Investigator (CHFI)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to acquire hands-on experience.
The program provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. Moreover, CHFI provides firm grasp on the domains of digital forensics.
Associated exams: 312-49
See more information about "Advanced Network Defense (CAST 614)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: CAST 614 is an advanced course offering you the opportunity to deep dive into the crucial practical aspects of enterprise network security.
It covers fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy for a fortified perimeter is denied, the course moves on to defending against the sophisticated malware that is on the rise today, and the importance of live memory analysis and real time monitoring.
Associated exams: CAST 614 – Advanced Network Defense
See more information about "EC-Council Disaster Recovery Professional (EDRP)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of an organization, implementation of a plan, and recovering from a disaster.
Associated exams: 312-76
See more information about "Certified Chief Information Security Officer (CCISO)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: The CCISO certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital for leading a highly successful IS program.
The CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
Associated exams: 712-50
See more information about "Advanced Penetration Testing (CAST 611)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: This program is meticulously designed to demonstrate the advanced concepts including that of scanning against defenses, pivoting between networks, deploying proxy chains and using web shells.
The “virtual cyber ranges” bring 100% practicality into the training sessions and are designed to provide professional skills that demonstrate how professional pentesters determine the attack surface of targets within required time frames and complexities and gain access to the machines and escalate privileges.
The practical environment ranges progress in difficulty and reflect enterprise network architectures. This environment includes defenses and challenges which candidates of the LPT program must defeat and overcome. This is not done through a typical FLAT network! As candidates progress through the various range levels, each encounter will present the top defenses of today and they will learn the latest best practices, tips and tricks, and even evasion techniques.
Associated exams: CAST 611
See more information about "Certified Secure Programmer.Net (ECSP.Net)": SESSIONS / DESCRIPTION / ASSOCIATED EXAMS
Short description: This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications.
.Net is widely used by almost all organizations as the leading framework to build web applications.
The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development lifecycle to improve the overall quality of products and applications.
EC-Council Certified Secure Programmer lays the foundation required by all application developers and development organizations to produce applications with greater stability and fewer security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.
Associated exams: 312-93