Certified Ethical Hacker – CEH Microsoft Edition

This course in its 10th iteration is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.

It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information
security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

The following module has been broken up by objective to give students the option to watch a topic in short bursts, but for those who want to go in and see the full module the way the course would be taught in a life class we have added a full module at the end of the list.

Certified SOC Analyst (CSA)

Course Description

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

EC-Council: Certified Chief Information Security Officer (CCISO) VO

EC-Council’s Certified CISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.

Certified Network Defender (CND) VO

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real-world expertise on current network security technologies and operations.

Ethical Hacking Core Skills (EHCS)

EC-Council’s Ethical Hacking Core Skills course is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security. Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training.

EC-Council Certified Incident Handler (ECIH) VO

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.

It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post-breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.

Following a rigorous development which included a careful Job Task Analysis (JTA) related to incident handling and incident first responder jobs, EC-Council developed a highly interactive, comprehensive, standards-based, intensive 3-day training program and certification that provides a structured approach to learning real-world incident handling and response requirements.

EC-Council: Certified Chief Information Security Officer (CCISO)

EC-Council’s Certified CISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.

EC-Council Certified Incident Handler (ECIH)

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe.

It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post-breach consequences by reducing the impact of the incident, from both a financial and a reputational perspective.

Following a rigorous development which included a careful Job Task Analysis (JTA) related to incident handling and incident first responder jobs, EC-Council developed a highly interactive, comprehensive, standards-based, intensive 3-day training program and certification that provides a structured approach to learning real-world incident handling and response requirements.

CPM Starter Kit

C|PM training is an end-to-end Project Management Course that enables professionals track, analyse, optimize and automate their day-to-day operations by using digital tools and technical advancements provided in this course! C|PM is developed in line with the latest industry trends to help current and aspiring Project Managers to achieve their performance objectives through digital technologies.

Certified Blockchain Professional (CBP)(DF)

About C|BP – Program Overview

Blockchain, the cornerstone of a decentralization strategy, is a distributed database that is replicated across multiple nodes to enable immutable, permanent, transparent, and secure record-keeping of transactions. Essentially Blockchain is a data storage and data transaction validation system.

The blockchain technology is the only peer-to-peer decentralized network to authorize users to digitally sign transactions with 100% accuracy. Blockchain is gaining popularity across industries such as finance, government, insurance, logistics, media healthcare and many others for being a borderless network of value exchange in real time.

The C|BP course provides a thorough overview of blockchain technology and its implementation in the real world. The course begins with the technical foundations of blockchain, such as distributed and decentralized systems, cryptography and mining. Students will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine.

Students will explore different blockchain solutions and business blockchain frameworks for blockchain enterprise applications such as Hyperledger, introduced by the Linux Foundation and widely used by IBM. Most importantly the course will cover multiple blockchain implementation concepts by immersing students to sustainable and scalable blockchain development.

CBP Starter Kit

About C|BP – Program Overview

Blockchain, the cornerstone of a decentralization strategy, is a distributed database that is replicated across multiple nodes to enable immutable, permanent, transparent, and secure record-keeping of transactions. Essentially Blockchain is a data storage and data transaction validation system.

The blockchain technology is the only peer-to-peer decentralized network to authorize users to digitally sign transactions with 100% accuracy. Blockchain is gaining popularity across industries such as finance, government, insurance, logistics, media healthcare and many others for being a borderless network of value exchange in real time.

The C|BP course provides a thorough overview of blockchain technology and its implementation in the real world. The course begins with the technical foundations of blockchain, such as distributed and decentralized systems, cryptography and mining. Students will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine.

Students will explore different blockchain solutions and business blockchain frameworks for blockchain enterprise applications such as Hyperledger, introduced by the Linux Foundation and widely used by IBM. Most importantly the course will cover multiple blockchain implementation concepts by immersing students to sustainable and scalable blockchain development.

Certified Threat Intelligence Analyst (CTIA)

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence.

In the ever-changing threat landscape, C|TIA is an essential program for those who deal with cyber threats on a daily basis. Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.

 

 

Certified Blockchain Professional (CBP)

About C|BP – Program Overview

Blockchain, the cornerstone of a decentralization strategy, is a distributed database that is replicated across multiple nodes to enable immutable, permanent, transparent, and secure record-keeping of transactions. Essentially Blockchain is a data storage and data transaction validation system.

The blockchain technology is the only peer-to-peer decentralized network to authorize users to digitally sign transactions with 100% accuracy. Blockchain is gaining popularity across industries such as finance, government, insurance, logistics, media healthcare and many others for being a borderless network of value exchange in real time.

The C|BP course provides a thorough overview of blockchain technology and its implementation in the real world. The course begins with the technical foundations of blockchain, such as distributed and decentralized systems, cryptography and mining. Students will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine.

Students will explore different blockchain solutions and business blockchain frameworks for blockchain enterprise applications such as Hyperledger, introduced by the Linux Foundation and widely used by IBM. Most importantly the course will cover multiple blockchain implementation concepts by immersing students to sustainable and scalable blockchain development.

CASE JAVA

Certified Application Security Engineer (CASE) is a hands-on, Instructor-led, comprehensive application security course, which encompasses security activities involved in all of the phases of Software Development Lifecycle (SDLC).

The program also focuses on selecting and implementing the right security strategies, guidelines, and practices that are widely accepted and applicable to most environments used today.
The course will help students gain in-depth knowledge and skills in gathering security requirements, designing secure application architecture, implementing secure coding practices, performing static application security testing (SAST) and dynamic application testing (DAST) and secure deployment.