CCISO Product Training – Internal Use Only

Instructions:

Welcome to the Certified Chief Information Security Officer (CCISO) Product training. Please take the pre-assessment first. Once you have taken the assessment, you will move onto the next lesson which is the video training. Once you are done with the video training, you will take the post-assessment. 

ECIHv2 Product Training – Internal Use Only

Instructions:

Welcome to the EC-Council Certified Incident Handler (ECIH)Product training. Please take the pre-assessment first. Once you have taken the assessment, you will move onto the next lesson which is the video training. Once you are done with the video training, you will take the post-assessment. 

CSA (SoC) Product Training – Internal Use Only

Welcome to the EC-Council Certified SoC Analyst (CSA)Product training. Please take the pre-assessment first. Once you have taken the assessment, you will move onto the next lesson which is the video training. Once you are done with the video training, you will take the post-assessment. 

CND Product Training – Internal Use Only

Welcome to the EC-Council Certified Network Defender (CND)Product training. Please take the pre-assessment first. Once you have taken the assessment, you will move onto the next lesson which is the video training. Once you are done with the video training, you will take the post-assessment. 

CEH Product Training – Internal Use Only

Welcome to the Certified Ethical Hacker (CEH) Product training. Please take the pre-assessment first. Once you have taken the assessment, you will move onto the next lesson which is the video training. Once you are done with the video training, you will take the post-assessment. 

Dark Web Forensics (Redacted Edition)

This is an in-depth workshop on Dark Web Forensics investigations including technical details of how the dark web/TOR works, a tour of actual dark web markets; and specific investigative techniques or tools for dark web investigations.

WARNING: The content in this video contains potentially offensive topics and adult content. Viewer discretion advised!

*** This version of The Dark Web Forensic Deep Dive contains some content that has been redacted. An un-redacted version is available for law enforcement, please contact us here for more information. ***

Dark Web Forensics

This is an in-depth workshop on Dark Web Forensics investigations including technical details of how the dark web/TOR works, a tour of actual dark web markets; and specific investigative techniques or tools for dark web investigations.

Certified Ethical Hacker – CEH Microsoft Edition

This course in its 10th iteration is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.

It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information
security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

The following module has been broken up by objective to give students the option to watch a topic in short bursts, but for those who want to go in and see the full module the way the course would be taught in a life class we have added a full module at the end of the list.

Certified SOC Analyst (CSA)

Course Description

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

EC-Council: Certified Chief Information Security Officer (CCISO) VO

EC-Council’s Certified CISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, formed the foundation of the program and outlined the content covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as instructors. Each segment of the program was developed with the aspiring and sitting CISO in mind and looks to transfer the knowledge of seasoned executives to the next generation of leaders in the areas that are most critical in the development and maintenance of a successful information security program.

Certified Network Defender (CND) VO

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real-world expertise on current network security technologies and operations.