CEHv8 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed to the content presented in the CEHv8 courseware. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community
EC Council Certified Security Analyst, ECSA complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies.
This computer forensicscourse will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?”
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
EC-Council Secure Programmer .Net teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.
The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information.
Certified Secure Computer User
The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats.
Center for Advanced Security Training (CAST) Courses
Mobile Forensics: Advanced Mobile Hacking & Forensics (CAST 612)
This course will provide you with the knowledge and real world hands-on practical skills for performing Mobile Forensic Investigations. The course is based on vendor neutral Digital Forensic principals, with a great deal of focus on Apple, Google Android, RIM Blackberry and an array of other mobile devices.
Hardening Your Enterprise: Advanced Network Defense (CAST 614)
This is a comprehensive fast paced technical security training program that will take the perspective of the “hacker”, and use that for the foundation of defending against the latest attacks. It is fun to be on offense and do the hacking and penetration testing, but for most us the reality is we have to play defense.
Cryptography: Hacking “Secure” Encryption and Countermeasures (CAST 615)
This technical security training explores, in depth, the science of cryptography teaching students the history of cryptography, modern cryptographic methods, and how to use techniques like cryptanalysis to break cryptography. The program also covers closely related topics such as hashing and digital certificates.