Back
Showing 1-17 of 17 results
ECDE -logo

Certified DevSecOps Engineer (ECDE) – EC-Council

July 28, 2023
0

https://d1unbiy77dgq3n.cloudfront.net/ECDE/How+to+Become+a+Certified+ECDE.mp4 EDRP provides professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster. Program Objectives Who is …

Certified Chief Information Security Officer (CCISO) logo

Certified Chief Information Security Officer (CCISO) – EC-Council

October 19, 2022
0

https://d1unbiy77dgq3n.cloudfront.net/CCISO/CCISO+Testimonial+Video+comp.mp4 EC-Council’s Certified Chief Information Security Officer (CCISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance …

Certified Encryption Specialist (ECES) logo

Certified Encryption Specialist (ECES) – EC-Council

October 19, 2022
0

Secure organizations employ multiple levels of encryption – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption – server/desktop, network link encryption, web server encryption, tape backup encryption, and many more. Some of the most recent attacks that have had serious consequences share one thing in common – they all had either none or little effective encryption. This …

Certified Secure Computer User (CSCU) logo

Certified Secure Computer User (CSCU) – EC-Council

October 19, 2022
0

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, …

Certified Blockchain Professional (CBP) logo

Certified Blockchain Professional (CBP) – EC-Council

October 19, 2022
0

Introducing the first Blockchain Professional Training and Blockchain Certification Program to set the global standard in Blockchain Technology. The Certified Blockchain Professional (CBP) Course was developed to help professionals gain the knowledge they need in Blockchain technology to understand its impact on business and beyond. The Certified Blockchain Professional is fully vendor-agnostic and practical, focusing on the current state of blockchain technology as well as …

Certified Threat Intelligence Analyst (CTIA) logo

Certified Threat Intelligence Analyst (CTIA) – EC-Council

October 18, 2022
0

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Program Objectives Prerequisites Exam Details Recommended Experience Program Objectives Certified Threat …

Certified SOC Analyst (CSA) logo

Certified SOC Analyst (CSA) – EC-Council

October 18, 2022
0

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced …

Certified Incident Handler (ECIH) logo

Certified Incident Handler (ECIH) – EC-Council

October 18, 2022
0

Know More This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe. It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post-breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective. Following …

Mobile Ethical Hacking logo

EC-Council Mobile Ethical Hacking

October 18, 2022
0

Program Objectives Exam Details Program Objectives Lab Setup Mobile Backdoors Android Studio Fundamentals Java Fundamentals iOS Development Fundamentals Rooting and Jailbreaking Reverse Engineering: Android Reverse Engineering: iOS Cloud Hacking: Firebase Security Banking App Hacking In-network Attacks for Mobile Devices Upon completion of the mobile ethical hacking course you will able to: Communicate mobile device security threats and the risks Describe mobile applications and device Security …

Disaster Recovery Professional (EDRP) – EC-Council

October 18, 2022
0

EDRP provides professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster. Program Objectives Prerequisites Exam Details …

Certified Security Analyst (ECSA) logo

Certified Security Analyst (ECSA): Penetration Testing – EC-Council

October 18, 2022
0

Know More The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning Program Objectives Prerequisites Exam Details Recommended Experience Program …

Certified Penetration Tester(CPENT) logo

Certified Penetration Tester(CPENT) – EC-Council

October 18, 2022
0

This training program teaches participants how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. For those who have only been working in flat networks, CPENT’s live practice range will teach participants to take their skills to the next level by teaching the methods of how to pentest IoT systems, OT systems, how to write …

Certified Application Security Engineer | CASE .NET logo

Certified Application Security Engineer | CASE .NET – EC-Council

October 18, 2022
0

The Certified Application Security Engineer (CASE .NET) credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally. …

Certified Application Security Engineer | CASE .JAVA

Certified Application Security Engineer | CASE .JAVA – EC-Council

October 18, 2022
0

The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally.It is designed to be a …

Computer Hacking Forensic Investigator (CHFI) logo

Computer Hacking Forensic Investigator (CHFI) – EC-Council

October 18, 2022
0

Know More EC-Council’s Computer Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will …

ceh logo

Certified Ethical Hacker (CEH-V12) – EC-Council

October 18, 2022
0

Know More https://d1unbiy77dgq3n.cloudfront.net/CEH/C_EHv12+.mp4 CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend against future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.CEH …

Certified Network Defender (CND) logo

EC-Council Certified Network Defender (CND)

October 17, 2022
0

Know More Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. …