Find a course

Find the best courses in your region.

Catalogue 225 Courses found

List of sub-fields

Course list

Reference Course Duration Prices
ECC ECSS-005 EC council Application Security Engineer​ (CASE) 3 days
24 hours
ECC CCISO-001 EC council Certified Chief Information Security Officer (CCISO) 5 days
40 hours
ECC CEH-001 EC Council Certified Ethical Hacker (CEH) 5 days
40 hours
ECC CND-001 EC Council Certified Network Defender (CND) 5 days
40 hours
ECC ECSS-0001 EC Council Certified Security Specialist (ECSS) 5 days
40 hours
ECC ECSS-004 EC council ICS/SCADA Cybersecurity 4 days
32 hours
ECC ECSS-003 EC council Security Operations​ - CSA 3 days
24 hours
ECC CHFI-001 EC Council Server & Web Forensic​ - CHFI 5 days
40 hours
ECC ECSS-006 EC council SOC Analyst​ 3 days
24 hours
ECC ECSS-002 EC council Threat Intelligence - CTIA 3 days
24 hours

At the end of this training, the participants will be able to:

  • Analyze and understand Application Security.
  • Establish a foundational understanding necessary for all application developers and development organizations.
  • Demonstrate the ability to produce secure applications with enhanced stability and minimized security risks.
  • Demonstrate the application of security activities in all phases of the SDLC: planning, creating, testing, and deploying an application to solve security-related problems.
  • Explain the importance of incorporating secure requirement gathering, robust application design, and handling security issues in post development phases of application development in application security.
ECC ECSS-005
At the end of this training, the participants will be able to:

  • Define, implement, manage, and maintain an information security governance program that includes leadership, organizational structures, and processes.
  • Understand the framework connections for data analysis.
  • Analyze a combination of topics such as audit management, governance, IS controls, human capital management, strategic program development.
  • Apply advanced technical knowledge to the day-to-day responsibilities of an information security executive.
  • Understand the financial expertise vital to leading a highly successful information security program.
ECC CCISO-001
At the end of the training, participants should be able to:

  • Identify and understand various attack vectors used in cybersecurity breaches.
  • Identify live and vulnerable machines in a network.
  • Perform OS banner grabbing, service, and user enumeration.
  • Analyze systems for potential vulnerabilities.
  • Identify techniques for system hacking, steganography, steganalysis attacks, and covering tracks.
  • Identify and use viruses, computer worms, and malware to exploit systems.
  • Perform packet sniffing.
  • Identify social engineering techniques.
  • Identify Denial-of-Service attacks.
  • Aware of session hijacking.
  • Understand how to evade Intrusion Detection Systems (IDS), firewalls, and honeypots.
ECC CEH-001

At the end of this training, participants should be able to:

  • Understand Network Security fundamentals which includes the true construct of data transfer, network technologies, software technologies, and how networks operate.
  • Understand network components, traffic, performance and utilization, network topology, location of each system, and security policy.
  • Develop the ability to manage equipment effectively and conduct risk assessments.
  • Demonstrate proficiency in creating successful incident response plans.
  • Analyze and implement various network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configurations.
  • Demonstrate proficiency in understanding the intricacies of network traffic signatures, conduct thorough analysis, and perform vulnerability scanning as part of their mastery of network security.
  • Design and implement various security policies for organizations, demonstrating their ability to analyze organizational needs.
ECC CND-001
At the end of the training, participants should be able to:

  • Demonstrate the application of information security principles to solve security-related problems.
  • Describe the fundamentals of network defense.
  • Demonstrate proficiency in ethical hacking, and digital forensics.
  • Demonstrate a comprehensive understanding of the cybersecurity.
ECC ECSS-0001
At the end of this training, the participants will be able to:
  • Gain a foundational understanding of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
  • Understand the vulnerabilities of ICS/SCADA systems and potential cyber threats.
  • Understand control system attack surfaces, methods, and tools using the hands-on lab learning experience.
  • Explain the control system approaches to system and network defense architectures and techniques.
  • Develop incident-response skills in a control system environment.
  • Understand governance models and resources for industrial cybersecurity professionals.
ECC ECSS-004
At the end of this training, the participants will be able to:

  • Gain knowledge of Security Operations Center (SOC) processes, procedures, technologies, and workflows.
  • Develop a basic understanding and in-depth knowledge of security threats, attacks, vulnerabilities, attacker’s behaviors, cyber kill chain, etc.
  • Demonstrate the use of standard forensic tools necessary to successfully carry out a computer forensic investigation.
  • Explain the methodological approach to computer forensics presented by CSA, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
  • Demonstrate proficiency in handling and responding to various security incidents.
ECC ECSS-003
At the end of this training, participants should be able to:
  • Understand the security discipline of digital forensics from a vendor-neutral perspective.
  • Acquire necessary hands-on experience with various forensic investigation techniques.
  • Use standard forensic tools necessary to successfully carry out a computer forensic investigation.
  • Identify methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
  • Analyze and study IoT Forensics.
  • Master tools and techniques to ensure security across various cloud platforms — Amazon Web Services, Microsoft Azure Cloud, and Google Cloud platform.
ECC CHFI-001
3 days (24 hours)
At the end of this training, the participants will be able to:

  • Gain a comprehensive understanding of Security Operations Center (SOC) operations.
  • Develop skills to recognize cyber threats.
  • Respond effectively to security incidents.
  • Use standard forensic tools necessary to successfully carry out a computer forensic investigation.
  • Demonstrate proficiency in computer forensics by presenting a methodological approach including analyzing, synthesizing, and applying techniques such as searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.
  • Equip your team members with the basic knowledge and abilities required for elite performance including SIEM based investigations.
  • Explain log analysis.
  • Illustrate the proper use of a firewall.
ECC ECSS-006
At the end of this training, the participants will be able to:

  • Describe the security discipline of Threat Intelligence from a vendor-neutral perspective.
  • Identify various Cyber Threats, Threat actors, and their objectives for cyberattacks.
  • Master the process of Planning and Direction in Threat intelligence.
  • Collect and process Data effectively for Threat intelligence.
  • Explain the framework connections for Data analysis.
  • Identify the Critical Issues plaguing the information security world.
  • Recognize the importance of Threat Intelligence in Risk Management, security information and Event Management (SIEM), and Incident response.
ECC ECSS-002
Items per page :