CASE JAVA

Certified Application Security Engineer (CASE) is a hands-on, Instructor-led, comprehensive application security course, which encompasses security activities involved in all of the phases of Software Development Lifecycle (SDLC).

The program also focuses on selecting and implementing the right security strategies, guidelines, and practices that are widely accepted and applicable to most environments used today.
The course will help students gain in-depth knowledge and skills in gathering security requirements, designing secure application architecture, implementing secure coding practices, performing static application security testing (SAST) and dynamic application testing (DAST) and secure deployment.

CASE.NET

The .Net framework has increased in popularity because of its open source nature, interoperability, language independence, library of codes and ease of deployment. It has become the preferred choice of application developers. However, there are not many training programs that address secure application development.

While .Net developers often learn security on the job, primarily because the basic education of programming does not usually cover or emphasize security concerns, the CASE program trains these developers to place importance on security.

Certified Chief Information Security Officer (CCISO) – Keith Rayle (Video) (VO)

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. Material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.

EC-Council Certified Security Analyst (ECSA) v10 (VO)

The ECSA course is a fully hands-on program with labs and exercises that cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the skills to uncover the security threats that organizations are vulnerable to.

This can be achieved effectively with the EC-Council iLabs Cyber Range. It allows you to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a complete live range open for any form of hacking or testing.

EC-Council Certified Security Analyst (ECSA) v10

The ECSA course is a fully hands-on program with labs and exercises that cover real world scenarios. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the skills to uncover the security threats that organizations are vulnerable to.

This can be achieved effectively with the EC-Council iLabs Cyber Range. It allows you to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a complete live range open for any form of hacking or testing.

ECSA v10 – Pre-Orders

Attention: ECSA v10 has been announced but won’t be distributed until the first week in May. You are welcome to purchase the course and you will be added to a wait list and will be the first to receive the course as soon as its available.

This area will be updated when the new course is live.

Certified Project Manager (C|PM)

C|PM training is an end-to-end Project Management Course that enables professionals track, analyse, optimize and automate their day-to-day operations by using digital tools and technical advancements provided in this course! C|PM is developed in line with the latest industry trends to help current and aspiring Project Managers to achieve their performance objectives through digital technologies.

Certified Ethical Hacker (CEH)v10 (VO)

This course in its 10th iteration is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.

It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information
security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

Certified Ethical Hacker (CEH)v10

This course in its 10th iteration is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.

It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information
security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the C|EH v10 program.

The following module has been broken up by objective to give students the option to watch a topic in short bursts, but for those who want to go in and see the full module the way the course would be taught in a life class we have added a full module at the end of the list.

STORM Resource Center

Thank you for purchasing the STORM Mobile Security Toolkit.

Please start by following Step 1 to get started.

Make sure you go through all the steps before starting any demos.

EC-Council Disaster Recovery Professional (EDRP)

The EDRP certification is aimed at educating and validating a candidate’s ability to plan, strategize, implement, and maintain a business continuity and disaster recovery plan.

From 9/11 to Hurricane Katrina to the recent WannaCry fiasco, the business community has been hit over and over again by one disaster after another in the past decade and a half. The scary part is that the frequency is increasing exponentially in the past few years, thanks to the growing number of cyber-attacks.

Even scarier is the study that shows that 2 out of 5 business still do not even have a BC/DR plan. And out of the ones that do, only about half of them even test it regularly to see if it is still relevant. Furthermore, industry experts have reiterated the fact in every forum possible, that the size of the business is irrelevant to having a BC/DR plan. Everyone needs to have one to stay relevant in current times.

This scenario can only be amended by trained BC/DR professionals who not only understand the gravity of the situation, but also are equipped to ensure that businesses are least impacted when a disaster strikes.

Certified Digital Marketer (C|DM)

Certified Digital Marketer (C|DM) Training and Certification Program is aimed at those interested in leading Digital Marketing Strategies at a Corporate level. No prior knowledge of digital marketing is assumed and no technical skills beyond basic internet and computer knowledge are required.

Course Objectives:

Each module includes Lab Manuals on Digital Mar related technologies and digital tools that allow students to:

  • Become familiar with the best digital marketing techniques available in the market
  • Obtain hands-on experience and practical exposure on the most effective digital marketing tools
  • Apply all the digital marketing methodologies and best practices using online platforms
  • Exercise and challenge your approaches on moc test and lab assessments

Certified Ethical Hacker (CEH) CL

CEHv9 is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

Advanced Mobile Hacking & Forensics Course Description (CAST 612)

This course provides students with the knowledge and real world hands-on practical skills for performing Mobile Forensic Investigations. The course is based on vendor neutral Digital Forensic principals, with a great deal of focus on Apple, Google Android, RIM Blackberry and an array of other mobile devices.

In order to successfully complete a Mobile Forensics investigation it is imperative that you learn both the hardware and software design intricacies of these platforms as well as the common investigation protocols currently recognized and accepted for court trial

Global Cyberlympics

Global Cyberlympics is an international cyber security competition led and organized by the EC-Council Foundation. Cyberlympics is a not for profit initiative created to discover new talents, methods, and ideas in cyber.

We want to discover gifted hackers and cyber defenders with the goal of educating the global community about the dangers of malicious hacking. Global Cyberlympics players solve challenges on the game network by applying skillsets such as computer forensics, ethical hacking, and penetration testing.

Players face a multitude of hacking challenges such as lock picking, RFID, Biometric cracking, with an emphasis on working as a team, making the Cyberlympics more than just a typical Capture the Flag competition. These challenges mirror the real world situations
information security professionals face every day as they protect computer systems from malicious hackers.

In the 2016 Cyberlympics, the top two teams representing each region found that to earn their switches and cables to connect to the game network they had to work as a team to crack a “Cryptex” lock vault which contained 2 USB drives storing the tools and challenges for each subsequent challenge.

Cyberlympics shines a spotlight on the best, most well-rounded cyber defenders and their teams. Standouts in the Games are the best in their field – and EC-Council Foundation is proud to recognize their skills. The 2016 winners were Hack.ERS form the Netherlands with Jobless Hackers, also from the Netherlands, in second. The bronze medalists were KLHT of Russia.

Click here to register your team for the 2017 competition, finals will be held in The Hague, Netherlands.

Global CISO Forum

Global CISO Forum 2017
Training: October 5 – 8

Conference: October 9 – 10
EC-Council Foundation’s Global CISO Forum is an invite-only, closed-door event gathering the highest level executives from across industries and countries to discuss the most pressing issues in information security. Now in its seventh year, the 2017 Global CISO Forum promises to be the best yet with an exciting mix of industries, formats, and interactive presentations.

Click here for free admission into the conference using the code GCFILEARN.

Registrations will only be accepted from Director-level or above information security practitioners. All registrations are subject to approval and will be rejected if this requirement is not met.

IT Security Conference – Hacker Halted

The theme for Hacker Halted 2017 is The Art of Cyber War: Lessons from Sun Tzu. 2,500 years ago, Sun Tzu wrote 13 chapters on military strategy. Fast forward to today and we are still learning from those chapters and applying them in our newfound digital age.

In an age where war is waged over cables and microchips instead of battlefields, one challenge is defining what war is and when war should be declared. Boundaries are being eroded as the globalization of technology continues its march across our physical landscape. Come learn strategies for Cyber War: Hacker Halted 2017.

To Register for free, click here and use code HHILEARN17

ECES

EC-Council Certified Secure Program .Net (ECSP)

Software defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming. Hence, it has become a must for organizations to educate their software developers about secure coding practices.

Attackers try to find security vulnerabilities in the applications or servers and then try to use these vulnerabilities to steal secrets, corrupt programs and data, and gain control of computer systems and networks. Sound programming techniques and best practices can be used to develop high quality code to prevent web application attacks. Secure programming is a defensive measure against attacks targeted towards application systems.