Please wait, loading...
Slide 1

Preparing the next generation of Cyber Security Experts

Slide 2

EC-Council Academia Partner

Courses

logo
eccouncil
service-bg

CEH

The Most Comprehensive Ethical Hacking Course in the World

CND

Validate the skills that will help the Network Administrators foster resiliency and continuity of operations during attacks.

ECSA

Perform advanced network scans beyond perimeter defenses.

ECIH

Learn to handle incidents and conduct assesments.

edrp

Only those who possess the burning desire to succeed will make it.

CHFI

Validate the candidate’s skills to identify an footprints and to gather the necessary evidence to prosecute in the court of law.

C|EH

Course Fee: 28,500/-

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

What is New in CEH Version 10 Course

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Duration: 5 Days (9:00 AM – 5:00 PM)
Eligibility Criteria: In order to be eligible to attempt EC-Council CEH, certification examination, candidate may opt to:
ceh
cnd

C|ND

Course Fee: 25,000/-

The Certified Network Defender (CND) certification program focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
  • Module 01: Computer Network and Defense Fundamentals.
  • Module 02: Network Security Threats, Vulnerabilities, and Attacks.
  • Module 03: Network Security Controls, Protocols, and Devices.
  • Module 04: Network Security Policy Design and Implementation.
  • Module 05: Physical Security.
  • Module 06: Host Security.
  • Module 07: Secure Firewall Configuration and Management.
  • Module 08: Secure IDS Configuration and Management.
  • Module 09: Secure VPN Configuration and Management.
  • Module 10: Wireless Network Defense.
  • Module 11: Network Traffic Monitoring and Analysis.
  • Module 12: Network Risk and Vulnerability Management.
  • Module 13: Data Backup and Recovery.
  • Module 14: Network Incident Response and Management.
  • Network Administrators
  • Network Administrators
  • Network security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Analyst
  • Security Operator
  • Anyone who involves in network operations

ECSA

Course Fee: 45,000/-

The ECSA pentest program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH) and enhances your ability into full exploitation by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology. It focuses on pentesting methodology with an emphasis on hands-on learning
  • Module 00: Penetration Testing Essential Concepts (Self-Study)
  • Module 01: Introduction to Penetration Testing and Methodologies
  • Module 02: Penetration Testing Scoping and Engagement Methodology
  • Module 03: Open-Source Intelligence (OSINT) Methodology
  • Module 04: Social Engineering Penetration Testing Methodology
  • Module 05: Network Penetration Testing Methodology – External
  • Module 06: Network Penetration Testing Methodology – Internal
  • Module 07: Network Penetration Testing Methodology – Perimeter Devices
  • Module 08: Web Application Penetration Testing Methodology
  • Module 09: Database Penetration Testing Methodology
  • Module 10: Wireless Penetration Testing Methodology
  • Module 11: Cloud Penetration Testing Methodology
  • Module 12: Report Writing and Post Testing Actions
  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals
ecih

E|CIH

Course Fee: 25,000/-

The ECIH certification will provide professionals with greater industry acceptance as an incident handler, risk administrator, pen tester, forensic investigator, etc.

The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
  • Module 01: Introduction to Incident Response and Handling
  • Module 02: Risk Assessmen
  • Module 03: Incident Response and Handling Steps
  • Module 04: CSIRT
  • Module 05: Handling Network Security Incidents
  • Module 06: Handling Malicious Code Incidents
  • Module 07: Handling Insider Threats
  • Module 08: Forensic Analysis and Incident Response
  • Module 09: Incident Reporting
  • Module 10: Incident Recovery
  • Module 11: Security Policies and Laws
  • Incident handlers
  • Risk assessment administrators
  • Penetration testers
  • Cyber forensic investigators
  • Vulnerability assessment auditors
  • System administrators
  • System engineers
  • Firewall administrators
  • Network managers
  • IT managers
  • IT professionals

EDRP

Course Fee: 25,000/-

The EDRP course will give participants the necessary skills to develop enterprise-wide business continuity and disaster recovery plans.
  • Module 01: Introduction to Disaster Recovery and Business Continuity
  • Module 02: Business Continuity Management (BCM)
  • Module 03: Risk Assessment
  • Module 04: Business Impact Analysis (BIA)
  • Module 05: Business Continuity Planning (BCP)
  • Module 06: Data Backup Strategies
  • Module 07: Data Recovery Strategies
  • Module 08: Virtualization-Based Disaster Recovery
  • Module 09: System Recovery
  • Module 10: Centralized and Decentralized System Recovery
  • Module 11: Disaster Recovery Planning Process
  • Module 12: BCP Testing, Maintenance, and Training
  • IT Professionals in the BC/DR or System Administration domain
  • Business Continuity and Disaster Recovery Consultants
  • Individuals wanting to establish themselves in the field of IT Business
  • Continuity and Disaster Recovery
  • IT Risk Managers and Consultants
  • CISOs and IT Directors
edrp
chfi

C|HFI

Course Fee: 30,000/-

Digital forensics is a key component in Cyber Security. Many people hear the term forensics, or computer forensics, or digital forensics and instantly think, that’s just for law enforcement, but the truth is, digital forensics has a key place on every cyber security team.

Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cyber security profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors.
  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Operating System Forensics
  • Defeating Anti-Forensics Techniques
  • Data Acquisition and Duplication
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports
The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.
Target Audience
  • Police and other law enforcement personnel
  • Defense and Military personnel
  • e-Business Security professionals
  • Systems administrators
  • Legal professionals
  • Banking, Insurance and other professionals
  • Government agencies
  • IT managers

Become a cyber security expert

start course

LEt's Go

Register with us

Application Form

Register