Browse Our Cybersecurity Course Library
Visit a course overview to learn more about each program and choose
the learning option that best fits your learning style, schedule, and budget.
Course Name | Specialty Area | Course Details |
---|---|---|
Certified Ethical Hacker - CEH | Ethical Hacking | |
Certified Chief Information Security Officer - CCISO | Executive Management | |
Computer Hacking Forensics Investigator - CHFI | Computer Forensics | |
Certified Incident Handler - ECIH | Incident Handling | |
Certified Network Defender - CND | Network Security | |
Certified SOC Analyst - CSA | Incident Handling | |
Certified Penetration Testing Professional - CPENT | Pen Testing | |
Risk Management Approach and Practices - RM | Executive Management | |
Ethical Hacking Core Skills - EHCS | Ethical Hacking | |
Dark Web Forensics | Computer Forensics | |
Malware and Memory Forensics | Computer Forensics | |
Mobile Forensics | Computer Forensics | |
Certified Cloud Security Engineer - CCSE | Cloud Security | |
Certified Threat Intelligence Analyst - CTIA | Incident Handling | |
STORM: Ethical Hacking Core Skills | Mobile Security Toolkit | |
STORM: Ethical Hacking Intermediate Skills | Mobile Security Toolkit | |
EC-Council Certified DevSecOps Engineer (ECDE) | Application Security | Course Overview |
Certified Application Security Engineer - CASE .NET | Application Security | |
Certified Application Security Engineer - CASE Java | Application Security | |
Disaster Recovery Professional - EDRP | Disaster Recovery | |
Certified Encryption Specialist - ECES | Encryption | |
Network Defense Essentials | Fundamentals | |
Digital Forensics Essentials | Fundamentals | |
Ethical Hacking Essentials | Fundamentals | |
Certified Secure Computer User - CSCU | Fundamentals | |
Certified Project Management - CPM | IT Project Management | |
ICS/SCADA Cybersecurity | Network Security | |
Certified Cybersecurity Technician - CCT | Cyber Technician | |
Web Application | Hacking & Security | Pen Testing |