Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.
In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.
Module 01: Computer Network and Defense Fundamentals.
Module 02: Network Security Threats, Vulnerabilities, and Attacks.
Module 03: Network Security Controls, Protocols, and Devices.
Module 04: Network Security Policy Design and Implementation.
Module 05: Physical Security.
Module 06: Host Security.
Module 07: Secure Firewall Configuration and Management.
Module 08: Secure IDS Configuration and Management.
Module 09: Secure VPN Configuration and Management.
Module 10: Wireless Network Defense.
Module 11: Network Traffic Monitoring and Analysis.
Module 12: Network Risk and Vulnerability Management.
Module 13: Data Backup and Recovery.
Module 14: Network Incident Response and Management.
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Certified Network Defense (CND)
CND Brochure: Certified Network Defense (CND) |
CND Course Outline
Brochure: CND Course Outline |
Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.
As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5 day hands on class by our Certified EC-Council Instructor.
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Duration: 5 Days (9:00 AM – 5:00 PM)
Eligibility Criteria:
In order to be eligible to attempt EC-Council CEH, certification examination, candidate may opt to:
Attend Official Training:
If a candidate have completed an official EC-Council training either at an Accredited Training Center, via the iClass platform, or at an approved academic institution, the candidate is eligible to attempt the relevant EC-Council exam without going through the application process. For more information click HERE
Attempt Exam without Official Training:
In order to be considered for the EC-Council CEH exam without attending official training, candidate must have at least 2 years of work experience in the Information Security domain and remit a non-refundable eligibility application fee of USD 100.00 along with their application form. For more information click HERE
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Ethical Hacking Course
Brochure: Ethical Hacking Course(CEH) |
Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.
As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5 day hands on class by our Certified EC-Council Instructor.
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
The C|EH (Practical) is a 6 hours practical exam built to exacting specifications by subject matter experts in the Ethical Hacking field. Professionals that possess the C|EH credential are be able to sit for exam that will test their limits in unearthing vulnerabilities across major operating systems, databases, and networks. To those who meet and exceed the skills level set, they will earn the new industry required certification – the C|EH (Practical) certification.
C|EH (Practical) is available only as an online and fully proctored exam because we insist that that is the only way quality can be assured. EC-Council is the first in the world to offer a fully online, remote proctored practical exam in the world!
The overall benefit of a practical exam that is fully proctored anywhere in the world will provide organizations with a skills-validated and trusted credential when employing cybersecurity professionals. With its global availability, organizations can now quickly train, test and deploy a cyber-ready workforce effectively.
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Duration: 5 Days (9:00 AM – 5:00 PM)
Eligibility Criteria:
In order to be eligible to attempt EC-Council CEH, certification examination, candidate may opt to:
Attend Official Training:
If a candidate have completed an official EC-Council training either at an Accredited Training Center, via the iClass platform, or at an approved academic institution, the candidate is eligible to attempt the relevant EC-Council exam without going through the application process. For more information click HERE
Attempt Exam without Official Training:
In order to be considered for the EC-Council CEH exam without attending official training, candidate must have at least 2 years of work experience in the Information Security domain and remit a non-refundable eligibility application fee of USD 100.00 along with their application form. For more information click HERE
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Ethical Hacking Course
Brochure: Ethical Hacking Course(C|EH) |
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
C|TIA allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for threat intelligence
Number of Questions: 50
Duration: 2 hours
Availability: EC-Council Exam Portal
Test Format: Multiple Choice
Passing Score: 70%
Eligibility Criteria
To be eligible to challenge the C|TIA Exam, the candidate must either:
Below you can view or download for free our training courses brochures in PDF |
Certified Threat Intelligence Analyst (C|TIA) |
Course Outline
Brochure: C|TIA Course Outline |
The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning.
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Security Analyst
Brochure: Security Analyst |
There is no predefined eligibility criteria for those interested in attempting the ECSA (Practical) exam. You can purchase the exam dashboard code here
Clause: Age Requirements and Policies Concerning Minors
The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 18 years old.
In order to proceed with the exam the below steps will need to be completed:
Note:The exam dashboard code is valid for 1 year from date of receipt.
The trust that the industry places in our credentials is very important to us. We see it as our duty to ensure that the holders of this credential are proven, “hands on”, penetration testers who are able to perform in the real world to solve real world challenges.
As such, the ECSA (Practical) is designed as a hands-on exam that will test the skills of the penetration tester BEYOND just their knowledge.
This exam is an online, proctored, practical exam that can last up to 12 hours.
We know that travelling to an exam center can be difficult for many. As such, we are pleased to announce that you can take the ECSA (Practical) exam from the comfort of your home, but you need to be prepared to be proctored by a dedicated EC-Council Proctor certification team under strict supervision.
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
ECSA
Brochure: ECSA |
The LPT (Master) is the world’s first fully online, remotely proctored LPT (Master) practical exam, which challenges the candidates through a grueling 18 hours of performance based, hands-on exam categorized into three practical exams for six-hour duration each, which will test your perseverance and focus by forcing you to outdo yourself with each new challenge. The exam requires the candidates to demonstrate a methodical approach to test and validate security defenses. The LPT (Master) exam is developed with close collaboration with SMEs and practitioners around the world after a thorough job role, job task, and skills-gap analysis.
Module 01 Introduction to Vulnerability Assessment and Penetration Testing
Module 02 Information Gathering Methodology
Module 03 Scanning and Enumeration
Module 04 Identify Vulnerabilities
Module 05 Exploitation
Module 06 Post Exploitation
Module 07 Advanced Tips and Techniques
Module 08 Preparing a Report
Module 09 Practice Ranges
Real world, performance based assessment:
The successful candidates need to demonstrate a mastery of the skills required to conduct a full black box penetration test that simulates a complex network of a multi-national organization in real time. The exam environment via EC-Council’s cloud based cyber range, iLabs, has multiple networks with different militarized and de-militarized zones. You will follow the entire process of “Cyber kill chain”, taking you from reconnaissance, scanning, enumeration, gaining access, maintaining access, then exploiting vulnerabilities that you will have to seek out in a network that only a true penetration tester will be able to break.
Methodical Approach:
To build on the technical skills taught in the Certified Ethical Hacking course, the repeatable and documentable methodology provided in the EC Council security analyst program , the EC-Council LPT (Master) course emphasizes application of this methodical approach to penetration testing. The LPT (Master) practical exam thoroughly tests the application of the penetration testing process and lifecycle knowledge and the skills required in an examination that even our reviewers have called “extremely challenging”.
Penetration test report:
Many have described report writing as one of least preferred, yet arguably one of the most critical parts of any penetration testing engagement. While so many cyber security courses are offered globally to cover various subjects in the penetration testing realm, hardly any are dedicated to this very important skill, especially almost since half of all time spent at any penetration testing engagement can revolve around writing and reporting the core findings of the engagement to the client.
The key skill also lies in communicating a highly technical finding in an elaborate penetration test engagement to someone to the senior management and the board of directors can be very challenging and frustrating at times. Mastery of communication, research and report writing is required to make sense of technically complex topics like specific vulnerabilities and their resulting exploits in a meaningful manner to make educated decisions to improve the security posture of the organization. The candidates are required to submit a comprehensive report of their findings, methodology used, corroborative screenshots, scripts, custom exploits, or any other method they have used to penetrate the network within 45 days after completing the three challenges. The submitted report should be very clear, so that we should be able to compromise the target again by following the report.
EC-Council launches the first ever remotely proctored online Pen-Testing Exam as a mechanism to ensure the authenticity of the test taker. This not only adds credibility to the overall title but also eliminates external influences that can change the exam outcome. While this test does not limit the test taker to explore his research skills and take advantage of documented resources available, it keeps a check on the individual capability of dealing with the challenges by himself.
There is no predefined eligibility criteria for those interested in attempting the LPT (Master) exam. You can purchase the exam dashboard code here.
Clause: Age Requirements and Policies Concerning Minors
The age requirement for attending the training or attempting the exam is restricted to any candidate that is at least 18 years old.
In order to proceed with the exam the below steps will need to be completed:
Note:The exam dashboard code is valid for 1 year from date of receipt.
The certification is valid for 2 years from the date of approval and members must then renew annually.
For renewals, members will need to remit USD250 per annum which can be done at our online store.
LPT (master) certification falls under the ECE Policy. Members must ensure that they meet the ECE requirement.
Should you have any queries, please do not hesitate to write in to lpt@eccouncil.org.
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Licensed Penetration Tester (Master)
Brochure: LPT (Master) Brochure |
The incident handling skills taught in E|CIH are complementary to the job roles below as well as many other cybersecurity jobs:
E|CIH is a specialist-level program that caters to mid-level to high-level cybersecurity professionals. In order to increase your chances of success, it is recommended that you have at least 1 year of experience in the cybersecurity domain.
E|CIH members are ambitious security professionals who work in Fortune 500 organizations globally.
E|CIH allows cybersecurity professionals to demonstrate their mastery of the knowledge and skills required for Incident Handling
Exam Title | EC-Council Certified Incident Handler |
Exam Code | 212-89 |
Number of Questions | 100 |
Duration | 3 hours |
Availability | EC-Council Exam Portal |
Test Format | Multiple Choice |
Passing Score | 70% |
Eligibility Criteria
To be eligible to sit the E|CIH Exam, the candidate must either:
Attend official E|CIH training through any of EC-Council’s Authorized Training Centers (ATCs) or attend EC-Council’s live online training via iWeek or join our self-study program through iLearn (see https://iclass.eccouncil.org).
OR
Candidates with a minimum of 1 year of work experience in the domain that would like to apply to take the exam directly without attending training are required to pay the USD100 Eligibility Application Fee. This fee is included in your training fee should you choose to attend training.
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Masterclass
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Incident Handler
Brochure: Incident Handler |
Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors.
In the event of a cyber-attack or incident, it is critical investigations be carried out in a manner that is forensically sound to preserve evidence in the event of a breach of the law. Far too many cyber-attacks are occurring across the globe where laws are clearly broken and due to improper or non-existent forensic investigations, the cyber criminals go either unidentified, undetected, or are simply not prosecuted.
Cyber Security professionals who acquire a firm grasp on the principles of digital forensics can become invaluable members of Incident Handling and Incident response teams. The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees a firm grasp on the domains of digital forensics.
The CHFI certification is awarded after successfully passing the exam EC0 312-49. CHFI EC0 312-49 exams are available at ECC exam center around the world.
In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 78%.
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Forensic Investigator
Brochure: Forensic Investigator (CHFI) |
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.
In order to sit for the CCISO exam and earn the certification, candidates must meet the basic CCISO requirements. Candidates who do not yet meet the CCISO requirements but are interested in information security management can pursue the EC-Council Information Security Management (EISM) certification.
The EISM Exam is based on the same bank of questions as the CCISO exam – questions written by CISOs for current and aspiring CISOs. The difference is, there are scenario-based questions that require years of on the job experience to answer on the CCISO exam. These are omitted from the EISM exam and only the basic information security management questions remain.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. Material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
The NICE Cybersecurity Workforce Framework (NCWF)(link is external) NIST Special Publication 800-181, is a national resource that categorizes and describes cybersecurity work.The NCWF provides employers, employees, educators, students, and training providers with a common language to define cybersecurity work as well as a common set of tasks and skills required to perform cybersecurity work.
EC-Council has mapped the domains of CCISO to the NCWF in the following document.
There is no exam for CNDA.
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This course was specially designed for Government Agencies.
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Course Description
With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game.
You will be evaluating advanced hacking methods of defense fortification bringing you closer to establishing perfect security best practices and methodologies you can apply to secure environments. This course provides segmentation and isolation to reduce the effectiveness of the advanced persistent threats.
CAST 614 will cover fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of live memory analysis and real time monitoring.
Mr. Kevin Cardwell spent 22 years in the U.S. Navy, during this time he tested and evaluated surveillance and weapon system software, some of this work was on projects like the Multi-Sensor Torpedo Alertment Processor (MSTRAP), Tactical Decision Support System (TDSS), Computer Aided Dead Reckoning Tracer (CADRT), Advanced Radar Periscope Discrimination and Detection (ARPDD), and the Remote Mine Hunting System (RMHS). He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations Center (NOC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. He served as the Leading Chief of Information Security at the NOC for six years prior to retiring from the U.S. Navy. During this time, he was the leader of a 5 person Red Team that had a 100% success rate at compromising systems and networks.
Mr. Cardwell currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US and UK. He is an instructor, technical editor and author for computer forensics, and hacking courses. He is technical editor of the Learning Tree Course Ethical Hacking and Countermeasures and Computer Forensics. He is author of the Controlling Network Access course. He has presented at Blackhat USA Conferences. He is a contributing author to the Computer Hacking Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period. He is a Certified Ethical Hacker (CEH), Certified Security analyst (E|CSA), Qualified Penetration Tester (QPT), Certified in Handheld Forensics, Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. His current research projects are in Computer Forensic evidence collection on “live” systems, Professional Security Testing and Advanced Rootkit technologies. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman, he serves as a professional training consultant to the Oman Information Technology Authority, and is currently developing the team to man the first Commercial Security Operations Center in the country of Oman.
Students completing this course will gain an in-depth knowledge in the following areas:
How will this course benefit you?
Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in:
From practically any organization that handles important data would find this course beneficial, examples are:
NOTE: This is definitely not a beginner’s course; participants will be expected to possess the knowledge of attempting attacks against a variety of platforms and architectures under the supervision of an expert. Ideally, the student will be CEH, ECSA or hold equivalent industry experience
CAST on-site provides personalized advanced security courses to meet the needs of an individual or company that are planning to ensure maximum flexibility in terms of logistics, dates and cost issues. Our certified expert trainers are experienced instructors and highly knowledgeable in their respective fields. CAST on-site prides itself on strict quality control principles at all times to ensure that clients receive the highest standard of training and service. On-Site training is designed to add great value to your work force by increasing staff efficiency and skills ensuring improved productivity and output that far exceeds the value of the initial training costs.
Key features of CAST On-site:
To download CAST 614 printable brochure Please Click Here
Inquire online about advanced security training programs if you have questions, comments or feedback for us, please send us a message using the form below or email us at contact@nearsecure.com For more information and news updates, connect with us via social media or our mailing list. We look forward to hearing from you!
CAST General Enquiry Form
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Exam Name: CSCU (112-12) Exam
Credit Towards Certification: Secure Computer User Specialist (CSCU)
Exam Details:
Number of Questions: 50
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery: EC-Council Exam Portal
This course is specifically designed for todays’ computer users who use the internet extensively to work, study and play.
Course Duration: 16 Hours
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
SECURE COMPUTER USER
Brochure & Outline: CERTIFIED SECURE COMPUTER USER (CSCU) |
CASE allows application developers and testers to demonstrate their mastery of the knowledge and skills required to handle common application security vulnerabilities.
Number of Questions: 50
Test Duration: 2 Hours
Test Format: Multiple Choice Questions
Passing Score: 70%
Availability: EC-Council Exam Portal
Eligibility Criteria
To be eligible to apply to sit for the CASE Exam, the candidate must either:
For more information visit cert.eccouncil.org
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
Application Security Engineer
Brochure & Outline: Certified Application Security Engineer (CASE) |
The ECSS exam will be conducted on the last day of training. Students need to pass the online EC-Council Exam to receive the ECSS certification.
Exam Details:
Number of Questions: 50
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery: EC-Council Exam Portal
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
SECURITY SPECIALIST
Brochure: CERTIFIED SECURITY SPECIALIST |
SECURITY SPECIALIST
Outline: CERTIFIED SECURITY SPECIALIST |
Number of Questions: 150
Passing Score: 70%
Test Duration: 4 hours
Test Format: MCQ
Test Delivery: ECC Exam Portal
iLearn (Self-Study)
This solution is an asynchronous, self-study environment which delivers EC-Council’s sought after IT Security training courses in a streaming video format.
iWeek (Live Online)
This solution is a live, online, instructor-led training course which means you can attend a course with a live instructor from anywhere with an internet connection.
Master Class
This solution offers you the opportunity to learn from world-class instructors and the opportunity to collaborate with top Infosecurity professionals.
Training Partner (In Person)
This solution offers “in-person” training so that you can get the benefit of collaborating with your peers and gaining real-world skills, conveniently located in your backyard.
Below you can view or download for free our training courses brochures in PDF |
DISASTER RECOVERY PROFESSIONAL
Brochure: DISASTER RECOVERY PROFESSIONAL |
Exam Title | Certified SOC Analyst |
Exam Code | 312-39 |
Number of Questions | 100 |
Duration | 3 hours |
Availability | EC-Council Exam Portal (please visit https://www.eccexam.com) |
Test Format | Multiple Choice |
Passing Score | 70% |
Module 1 – Security Operations and Management
Module 2 – Understanding Cyber Threats, IoCs, and Attack Methodology
Module 3 – Incidents, Events, and Logging
Module 4 – Incident Detection with Security Information and Event Management (SIEM)
Module 5 – Enhanced Incident Detection with Threat Intelligence
Module 6 – Incident Response
Below you can view or download for free our training courses brochures in PDF |
SOC ANALYST (CSA)
Brochure: CERTIFIED SOC ANALYST (CSA) |
SOC ANALYST (CSA)
Outline: CERTIFIED SOC ANALYST (CSA) |