Train with EC-Council
EC-Council’s iClass online learning platform offers the most flexible online training solutions, making it the perfect option for the busy Cybersecurity professional.
World Class Training
We select the best real world instructors to teach our live in-person and live online courses to bring you cyber security training programs wherever you are around the globe.
Cutting Edge Technology
EC-Council partners with the best technology providers around to bring you lag-free video training and a fully automated robust online cyber range.
Mobile Training Options
The STORM is our mobile security toolkit that comes loaded with a custom Kali Linux OS & 100+ open source hacking tools. Add your course to the STORM for a complete mobile learning experience.
Best Selling Products
Certified Ethical Hacker (CEH)
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.
Certified Network Defender (CND)
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators.
Certified Incident Handler (ECIH)
The EC-Council Certified Incident Handler (ECIH) program focuses on a structured approach for performing the incident handling and response (IH&R) process. The IH&R process includes stages like incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among incident responders in knowing how to respond to various types of security incidents.
Certified Chief Information Security Officer (CCISO)
EC-Council’s Certified Chief Information Security Officer (CCISO) Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.
Train now, pay later with Affirm.