Cyber Handbook Enterprise
Cyber Handbook Enterprise
Cyber Handbook Enterprise
Highly Qualified
Certified Instructors
w w w.e ccouncil.org
Table of Contents
02
Table of Contents
Academic Programs
Bachelor of Science in Cyber Security (BSCS) 46
Graduate Certificate Programs 47
Master of Science in Cyber Security (MSCS) 48
EC-Council Masterclass 49
02
Who We Are
The EC-Council group is made up of several entities CCISO, CHFI, and CND programs. We have so far EC-Council Global Services (EGS) is dedicated to
that all help serve the same goal which is to create certified over 2,20,000 professionals in various helping organizations understand and manage
a better, safer cyber world through awareness and e-business and cybersecurity skills. their cyber-security risk posture effectively. EGS
education. Our entities include International specializes in helping clients make informed
Council of eCommerce Consultants (EC-Council), iClass is EC-Council’s direct certification training business decisions to protect their organizations.
iClass, EC-Council University, EC-Council Global program. iClass delivers EC-Council certification EGS has over 20 dedicated cyber security practice
Course
Services (EGS), Description
and EC-Council Conferences and courses through various training methodologies: Course
areas informed by theOutline
best cyber security
Events. instructor-led at client facilities, synchronous practitioners, each of whom have dedicated their
delivery through live, online instructor-led, and lives to defending organizations from
EC-Council creates content (course materials and asynchronously through our streaming video cyber-attacks.
exams) and certification delivered through our platform. iClass course videos can also be loaded
channel of authorized training centers which onto a mobile device, such as an iPad, and shipped EC-Council’s Conference and Events Group is
consists of over 700 partners representing over to a client location. responsible for planning, organizing, and running
2,000 physical locations in more than 145 countries conferences throughout the globe. TakeDownCon
across the globe. We are the owner and developer and Hacker Halted are IT security conferences that
of the world-famous Certified Ethical Hacker (CEH), bring world renowned speakers together for
Computer Hacking Forensics Investigator (CHFI), keynotes, panels, debates, and breakout sessions.
EC-Council Certified Security Analyst (ECSA), and Conferences have been run in Dallas, Las Vegas, St.
License Penetration Tester (LPT)(Master) programs. “Our lives are dedicated to the Louis, Huntsville, Maryland, Connecticut, Myrtle
mitigation and remediation Beach, Miami, Atlanta, Iceland, Hong Kong, Egypt,
Our certification programs are recognized Singapore, Mumbai, Dubai, Bahrain, London, Abu
worldwide and have received endorsements from of the cyber plague that is Dhabi and Kuala Lumpur.
Key Outcomes Exam Information
various government agencies, including the United menacing the world today”
States Federal Government (via the Montgomery GI Other events include CISO Summits, Global CISO
Bill), the National Security Agency (NSA), and the Forums, and Executive Cocktail Receptions where
Committee on National Security Systems (CNSS). Jay Bavisi EC-Council brings speakers and content to
All these reputed organizations have certified President & CEO executive level IT Security Professionals.
Certified Ethical Hacking (CEH), Computer Hacking EC-Council
Forensics Investigator (CHFI), EC-Council Disaster The Global Cyberlympics competition is a “capture
Recovery Professional (EDRP), EC-Council Certified the flag” type competition with approximately
Security Analyst (ECSA) and The Advanced 1,000 global participants. EC-Council brings the
Penetration Testing Program and The Licensed hackers together online for preliminary elimination
Penetration Tester (LPT)(Master) programs for rounds and then brings the top two teams (6-8
meeting the 4011, 4012, 4013A, 4014, 4015 and EC-Council University is accredited by the Distance players per team) from each region to compete in
4016 training standards for information security Education Accrediting Commission. The university the final head-to-head competition.
professionals. EC-Council has received offering programs such as Bachelor of Science in
accreditation from the American National Cyber Security, Master of Science in Cyber Security,
Standards Institute (ANSI) for our coveted CEH, and Graduate Certificate Program.
03
EC-Council Uni-Aid - Don’t stop learning
Course Description
information security and academic
excellence.
EC-Council
Key Outcomes
to gain access to military and industrial
secrets from 72 targets, most of them in
the United States, over a five-year
Exam Information
period.
EC-Council
04
EC-Council at a Glance
EC-Council Group is a multidisciplinary institution of global Information Security professional services.
EC-Council Group is a dedicated Information Security organization that aims at creating knowledge, facilitating innovation, executing research, implementing
development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Some of the finest organizations around the world such as the US Army, US Navy, DoD, the FBI, Microsoft, IBM, and the United Nations have trusted EC-Council to develop
and advance their security infrastructure.
Course Description Course Outline
2,37,580+
CERTIFIED MEMBERS
05
Accreditations
American National Standards Institute (ANSI)
EC-Council has achieved accreditation for its Certified Ethical Hacker (C|EH), Certified Chief Information Security Officer (C|CISO), Certified Network
Defender (C|ND), and Computer Hacking Forensic Investigator (C|HFI), to meet the ANSI/ISO/IEC 17024 Personnel Certification Accreditation
standard. EC-Council is one of a handful of certification bodies, whose primary specialization is information security, to be awarded this much
sought-after quality standard.
Course Description
Candidates who complete the EC-Council Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI), Certified Network
Defender (C|ND), and Certified Chief Information Security Officer (C|CISO) certification will also have that extra credential meeting the
requirements of the respective ANSI Certification Training Standards.
Learn more…
Course Outline
Committee on National Security Systems (CNSS) & National Security Agency (NSA)
Key Outcomes
EC-Council was honored at the 13th Colloquium for Information Systems Security Education (CISSE) by the United States National Security
Exam
Agency (NSA) and the Committee on National Information
Security Systems (CNSS) when its Certified Ethical Hacker (CEH), Computer Hacking Forensics
Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst (ECSA) and Licensed Penetration Tester (LPT) courseware
was certified to have met the 4012 (Senior System Managers), 4013A (System Administrators), 4014 (Information Systems Security Officers),
4015 (Systems Certifiers) and 4016 (Information Security Risk Analyst) training standards for information security professionals in the federal
government. The CNSS is a federal government entity under the U.S. Department of Defense that providesprocedures and guidance for the
protection of national security systems.
Candidates who complete the EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery
Professional (EDRP), Certified Security Analyst (ECSA) or Licensed Penetration Tester (LPT) certification will also have that extra credential meeting
the requirements of the respective CNSS 4011-4016 Federal Security Certification Training Standards.
06
Department of Defense (DoD)
EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (C|HFI), and Certified Chief Information Security Officer
programs are formally integrated as baseline skill certification options for the U.S. Department of Defense (DoD) cyber workforce in several
categories. Specifically, the C|CISO program is a recognized certification for the DoD IAM Level II, IAM Level III, and CSSP Manager, all specialized
cyber management personnel classifications within the DoD’s information assurance workforce. C|HFI is now recognized as a baseline certification
for CSSP Incident Responder and C|EH is now required for the DoD’s computer network defenders (CND’s) – CND Analyst, CND Infrastructure
Support, CND Incident Responder, and CND Auditor.
Course Description Course Outline
Learn more…
This affirms EC-Council’s commitment to offering high-quality certification programs that are developed to help arm information security
Key Outcomes Exam
professionals with the right skills to safeguard Information
the cyber world and achieve successful professional roles.
Learn more…
CREST Equivalency
Leading cyber security certification bodies CREST and EC-Council have announced mutual equivalency for their professional entry-point
technical qualifications. The direct equivalency relates to the EC-Council Security Analyst (ECSA v10) qualification with the CREST Practitioner
Security Analyst (CPSA) qualification. In addition, equivalency can also be granted for the for ECSA (Practical) with the CREST Registered Tester
(CRT) certification, provided that the candidate already holds a valid CREST CPSA qualification.
Learn more…
07
National Infocomm Competency Framework (NICF)
EC-Council Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI) programs have been accepted into National
Infocomm Competency Framework (NICF) Infocomm professionals competency requirement list. In addition to the inclusion, Infocomm
professionals training to be certified for the EC-Council programs at NICF accredited training centers, will be entitled to receive partial funding
from Critical Infocomm Technology Resource Program (CITREP) upon certification completion.
NICF determines the skills and competencies; and develops training strategies for Infocomm professionals to build a niche Infocomm workforce
in Singapore. CITREP is a training incentive program that assists Infocomm professionals with funding to gain recognized and specialized skills.
CHEA
A national advocate and institutional voice for promoting academic quality through accreditation, CHEA is an association of 3,000 degree-
granting colleges and universities and recognizes approximately 60 institutional and programmatic accrediting organizations.
EC-Council University as well as our accreditor are acknowledged members of The Council for Higher Accreditation (CHEA).
08
Your Learning Options
Instructor-led Training
facility in your city.
Course Description
Online Training Course Outline
iLearn online training is a distance learning program designed for those who cannot attend a live course. The program is for the people who have a very busy schedule and want to learn at their own
pace through self-study. This modality is also available from our enterprise teams.
Mobile Learning
Our world class content is also available on a mobile device, allowing our students to learn on the go. This program is designed for those who are cannot attend a live course, but are keen to improve
their cyber security skills. This modality is also available from our enterprise teams.
Computer-based Training
base iLearn program and are not sold independently. This modality is also available from our enterprise teams.
Customized Learning
channel. Let us know where and when you want the training delivered, and we will arrange for an instructor and all that’s required for a course to be taught at a location of your choice. Contact our
accredited training partners for a custom solution.
EC-Council client-site training includes official courseware, certification exam (ECC-Exam or VUE), iLabs, online labs (wherever available), and our test-pass guarantee.
09
Impact of Certified Ethical Hacker (C|EH) on Cyber Careers
The C|EH ranks in the top 10 most widely
21% of C|EHs reported a salary
79% of C|EHs reported a salary increase of
more than 20% compared with their peers. advantage of at least 40% over their peers. Top 10 recognized, important, and required certifications
for both beginning and established cybersecurity
professionals.(Datamation (Kime, 2022))
I led I secured
“I led a team of phenomenal cybersecurity and fraud experts to identify a “I have expanded my knowledge of computer hacking and forensics
significant threat actor, mitigate the actor’s operations, protect the ecosystem from broadly, as a result, I was able to more securely protect my organization
attacks, and contribute to the takedown of the threat actor’s operations in 2020.” infrastructure.”
I recovered
“C|EH equipped me to direct the recovery from a ransomware incident in just a few hours
without making any ransomware payment. I was also able to provide the FBI with forensic
data in the form of correlated logs.”
Yinchun Zhou,
Senior Security Consultant at an information management solutions firm,
Hall of Fame nominee
10
FoundationTrack
Mac
......
Disaster CreditCard MonitoringKids Wireless &Home
Internet Security OS Security
Recovery Security Online NetworkSecurity
*All credentials can be attained individually. Please referto cert.eccouncil.org for the eligibility criteria.
117
Vulnerability Assessment &Penetration Testing(VAPT)
Job
CPENT Certified Penetration
Testing Professional
LPT
(Master)
LicensedPenetration
Tester(Master) Roles
CEH
Hacker(Master) - Information Security Analyst/Administrator
- Information Security Manager/Specialist
Trac
- Information SystemsSecurity
k
Engineer/Manager
CTIA - Security Analyst
312-38 312-85 IntelligenceAnalyst
- Information SecurityAuditors
- Risk/Vulnerability Analyst
are Employedat:
Graduate Certificate in
Academic
Track
Incident Managementand
Business Continuity
* A d d i t i o n a l U n i v er s i t y c o u r s e s / p r e - r e q u i s i t e s m a y b e r e q u i r e d .
*All credentials can be attained individually. Please referto cert.eccouncil.org for the eligibility criteria.
128
Job
Roles
CEH CertifiedEthical
(MASTER) Hacker(Master)
* B e s p o k e m o d u le s a v a i l a b l e f o r e n te rp ris e s
...
*All credentials can be attained individually. Please referto cert.eccouncil.org for the eligibility criteria.
132
Job
Roles
CPENT Certified Penetration LPT LicensedPenetration
Testing Professional
(MASTER) Tester(Master)
CASEJava CertifiedApplication
Security Engineer
312-96 Java
CEH
Hacker(Master)
CASE.Net CertifiedApplication
SecurityEngineer
312-95 .Net
312-38
Graduate Certificate in
Information Security
Professional, SecurityAnalyst
Strategic Planning,
5 1 Domain
Job
Roles
Finance, & Vendor Governance
Course Description
Management Course Outline
- Information Security (IS) Director
- Information Assurance (IA) Program
Manager
2
TM
4 C CISO
Domain
Domain
3
- Information Security
Professional
Domain - Executive Leadership in
Information Assurance
Security Program
Management & Operations
*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
15
C SCU
Certified Secure Computer User
Certified Secure Computer User (CSCU)
CSCU provides individuals with the necessary knowledge and skills to protect their information assets.
• Introduction to Security
This course covers fundamentals of various computer and network security threats such as identity theft, • Securing Operating Systems
credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking
attacks, and social engineering. • Malware and Antivirus
OhPhish: OhPhish covers phishing, smishing, and vishing solutions in a single revolutionary platform to • Internet Security
help organizations strengthen their most vulnerable asset, their people. Learn more about OhPhish
• Security on Social Networking Sites
READ MORE
• Securing Email Communications
16
What is Digital Forensics Essentials?
EC-Council’s Digital Forensics Essentials or D|FE The course is developed for those interested in learning the • High school students
fundamentals of computer forensics who aspire to pursue a career in
certification is part of the Essentials Series and
computer forensics, or digital forensics. It equips students with the • College/University Students
offers foundational learning on digital forensics
skills required to identify an intruder’s footprints in the aftermath of
and investigation phases. D|FE modules are • Professionals
the cybercrime & assemble digital evidence necessary for
mapped to industry skills and are designed to
prosecution in a court of law.
prepare students for entry-level cybersecurity
roles. It recognizes the competency and expertise The Essentials Series is EC-Council’s first Massive Open Online Course
in digital forensics and information security skills, (MOOC) series to promote essential cybersecurity skills. The
equipping candidates to bring value to their courseware comes with a free eBook, lab tutorials, video lectures
workplace and organization. with optional upgrades to lab access, an exam certificate, and more.
Network Defense Essentials or N|DE is an entry- The Network Defense Essentials program covers the 1. Network Security Fundamentals
level certification from EC-Council launched under fundamental concepts of network defense and 2. Identification, Authentication, and
the Essentials Series to boost cybersecurity skills. security. N|DE equips students with the knowledge Authorization
N|DE modules are curated by industry experts to and skills required to identify the increasing network 3. Network Security Controls – Administrative
give participants a holistic overview of the critical security threats that impact the security posture of Controls
components of network security. The program is organizations around the globe. Participants also 4. Network Security Controls - Physical Controls
developed for those who want to kickstart a career learn to implement general security controls to 5. Network Security Controls - Technical
in cybersecurity. protect the underlying network infrastructure from Controls
unauthorized access, modification, destruction, or 6. Virtualization and Cloud Computing
disclosure.
N|DE validates the competency and expertise 7. Wireless Network Security
of a professional in network defense and 8. Mobile Device Security
The essentials course is EC-Council’s first Massive
information security skills, thereby equipping 9. IoT Device Security
Open Online Course (MOOC) educational series. The
them to bring more value to their workplace 10. Cryptography and PKI
courseware comes with a free eBook, lab tutorials,
and organization. and video lectures with optional upgrades to labs, 11. Data Security
exam certificates, and more. 12. Network Traffic Monitoring
25+ More
20
Certified Cybersecurity Technician
1. Key concepts in cybersecurity, including information security and 11. Cryptography and public-key infrastructure
network Security 12. Data security controls, data backup and retention
2. Information security threats, vulnerabilities. and attacks EXAM TITLE : Certified Cloud Security Engineer
methods. and data loss prevention techniques
3. The different types of malware 13. Network troubleshooting, traffic and log EXAM CODE : 212-82
4. Identification, authentication. and authorization monitoring. and analysis of suspicious traffic
5. Network security controls 14. The incident handling and response process # OF QUESTIONS : 60
6. Network security assessment techniques and tools (threat hunting, threat 15. Computer forensics and digital evidence DURATION : 3 Hours
intelligence, vulnerability assessment, ethical hacking. penetration fundamentals, including the phase of a forensic
testing. configuration and asset management) investigation AVAILABILITY : ECC Exam Portal
7. Application security design and testing techniques 16. Concepts in business continuity and disaster
8. Fundamentals of virtualization, cloud computing. and cloud security recovery TEST FORMAT : Multiple choice and Real Life
9. Wireless network fundamentals. wireless encryption, and related security 17. Risk management concepts, phases and hands-on Practical Exam
measures frameworks
10. Fundamentals of mobile. loT, and OT devices and related security EXAM MODE : Remote Proctoring Services
measures
21
EC-Council's Certified Cloud Security Engineer Program
• Vendor-neutral and vendor-specific cloud security concepts. EXAM TITLE: Certified Cloud Security Engineer
• A comprehensive cloud security program
• Deep focus and demonstration on widely used vendor-specific AWS, AZURE, and GCP cloud security practices, EXAM CODE : 312-40
tools, and technologies # OF QUESTIONS : 125
• Covers both technical and operational aspect of cloud security
• Dedicated focus on Penetration Testing, Forensics investigation, Incident Response, BC/DR. GRC related DURATION : 4 Hours
security practices in cloud AVAILABILITY : ECC Exam Portal
• Intensive hands-on program (with more than 50 labs)
• Mapped with real-time job roles and responsibilities of cloud security professionals. TEST FORMAT : Multiple Choice Questions
22
ICS/SCADA
What Is Ethical Course Overview Course Outline
Hacking Essentials?
Industrial automation processes use industrial The ICS/SCADA Cybersecurity course is a hands-on 1. Introduction to ICS/SCADA Network Defense
control systems (ICS) and supervisory control training module that teaches the foundations of
and data acquisition (SCADA) systems to control security and defending network architectures 2. TCP/IP 101 0
industrial processes locally or remotely and to from attacks. Students will learn to think like a
3. Introduction to Hacking
monitor, gather, and process real-time data. malicious hacker to defend their organizations.
4. Vulnerability Management
ICS/SCADA teaches powerful methods to analyze
5. Standards and Regulations for Cybersecurity
risks possessed by network infrastructure in IT and
corporate spaces. Once your foundation or basic 6. Securing the ICS network
concepts are clear, you will learn a systematic
process of intrusion and malware analysis. After 7. Bridging the Air Gap
this, you will learn about digital forensic process 8. Introduction to Intrusion Detection Systems
and incident response techniques upon detecting
a breach. (IDS) and Intrusion Prevention Systems (IPS)
This course is designed for IT professionals who manage or direct their EXAM TITLE: ICS / SCADA # OF QUESTIONS: 75
organization's IT infrastructure and are responsible for establishing and EXAM LENGTH: 2 Hours PASSING SCORE: 70%
maintaining information security policies, practices, and procedures. PLATFORM: ECC Exam Center
E CSS
EC-Council Certified Security Specialist
EC-Council Certified Security Specialist (ECSS)
EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental • Information Security Fundamentals
concepts of information security, computer forensics, and network security. It enables students to identify • Networking Fundamentals
information security threats which reflect on the security posture of the organization and implement • Secure Network Protocols
general security controls. • Information Security Threats and Attacks
• Social Engineering
This program will give a holistic overview of the key components of information security, computer • Hacking Cycle
forensics, and network security. This program provides a solid fundamental knowledge required for a career • Identification, Authentication, and
in information security. Authorization
• Cryptography
• Firewalls
• Intrusion Detection System
• Data Backup
Key Outcomes Exam Information • Virtual Private Network
• Wireless Network Security
• Web Security
• It facilitates your entry into the world of • Exam Title: EC-Council Certified Security • Ethical Hacking and Pen Testing
Information Security Specialist • Incident Response
• It provides professional understanding • Exam Code: ECSS • Computer Forensics Fundamentals
about the concepts of Information Security, • Digital Evidence
Network Security, and Computer Forensics • Number of Questions: 50 • Understanding File Systems
• Windows Forensics
• It provides best practices to improve • Duration: 2 hours • Network Forensics and Investigating
organizational security posture • Availability: ECC Exam Portal Network Traffic
• Steganography
• It enhances your skills as a Security Specialist • Test Format: Multiple Choice • Analyzing Logs
and increases your employability • E-mail Crime and Computer Forensics
• Passing Score: 70% • Writing Investigative Report
24
EC-Council Certified Encryption Specialist (ECES)
• Applications of Cryptography
• Cryptanalysis
• Develop skills to protect critical data in • Exam Title: EC-Council Certified Encryption
organizations with encryption Specialist
• Develop a deep understanding of essential • Exam Code: 212-81
cryptography algorithms and their
applications • Number of Questions: 50
• Make informed decisions about applying • Duration: 2 hours
encryption technologies
• Save time and cost by avoiding common • Availability: ECC Exam Portal
mistakes in implementing encryption • Test Format: Multiple Choice
technologies effectively
• Develop working knowledge of cryptanalysis • Passing Score: 70%
25
C ND
Certified Network Defender
Certified Network Defender (CND)
26
TM
C EH
Certified Ethical Hacker
Certified Ethical Hacker (C|EH)
27
Certified Ethical Hacker (Practical)
This is the next step after you have attained the highly acclaimed Certified Ethical Hacker certification. • Perform OS banner grabbing, service, and
user enumeration.
• Perform system hacking, steganography,
steganalysis attacks, and cover tracks.
• Identify and use viruses, computer worms,
and malware to exploit systems.
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information
• Perform packet sniffing.
• Conduct a variety of web server and web
• Mastery of Ethical Hacking skills. • Exam Title: Certified Ethical Hacker (Practical) application attacks including directory
traversal, parameter tampering, XSS, etc.
• Demonstrate the application of the • Number of Practical Challenges: 20
knowledge to find solutions to real-life • Perform SQL injection attacks.
challenges. • Duration: 6 hours • Perform different types of cryptography
• Commitment to code of ethics. attacks.
• Availability: Aspen - iLabs • Perform vulnerability analysis to
• Validate essential skills required in the ethical
identify security loopholes in the target
hacking domains. • Test Format: iLabs Cyber Range
organization’s network, communication
infrastructure, and end systems etc.
• Passing Score: 70%
28
C T IA
Certified Threat Intelligence Analyst
Certified Threat Intelligence Analyst (CTIA)
29
Certified SOC Analyst (CSA)
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered • Module 1: Security Operations and
for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entrylevel and intermediate- Management
level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand
technical skills through instruction by some of the most experienced trainers in the industry. The program focuses • Module 2: Understanding Cyber Threats,
on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for IoCs, and Attack Methodology
dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of
SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced • Module 3: Incidents, Events, and Logging
incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and
collaborate with CSIRT at the time of need.
• Module 4: Incident Detection with Security
Information and Event Management (SIEM)
30
Certified Penetration Tester
E C SA
EC-Council Certified Security Analyst
EC-Council Certified Security Analyst (ECSA)
• Analyze security of mobile devices and • Availability: ECC Exam Portal • Wireless Penetration Testing Methodology
wireless networks • Cloud Penetration Testing Methodology
• Test Format: Multiple Choice
• Present findings in a structured actionable • Report Writing and Post Testing Actions
report • Passing Score: 70%
32
EC-Council Certified Security Analyst (Practical)
33
TM
ECIH
EC-Council Certified Incident Handler
EC-Council Certified Incident Handler (ECIH)
• Principals, processes and techniques for • Exam Title: EC-Council Certified Incident • Incident Reporting
detecting and responding to security threats/ Handler
breaches • Incident Recovery
• Exam Code: 212-89
• Liaison with legal and regulatory bodies • Number of Questions: 50 • Security Policies and Laws
• Cover various incidents like malicious code, • Test Format: Multiple Choice
network attacks, and insider attacks • Passing Score: 70%
34
TM
C HFI
Computer Hacking Forensic
INVESTIGATOR
Computer Hacking and Forensic Investigator (CHFI)
• Network Forensics
Key Outcomes Exam Information • Investigating Web Attacks
• Database Forensics
• Comprehensive forensics investigation • Exam Title: Computer Hacking Forensic • Cloud Forensics
process Investigator
• Forensics of file systems, operating systems, • Exam Code: 312-49 exam • Malware Forensics
network and database, websites, and email • Number of Questions: 150 • Investigating Email Crimes
systems
• Duration: 4 hours • Mobile Forensics
• Techniques for investigating on cloud,
malware, and mobile • Availability: ECC Exam Portal
• Forensics Report Writing and Presentation
• Data acquisition and analysis as well as • Test Format: Multiple Choice
anti-forensic techniques • Passing Score: Please refer to https://cert.
• Thorough understanding of chain of custody, eccouncil.org/faq.html
forensic report, and presentation
35
JAVA
C ASE
Certified Application Security Engineer
Certified Application Security Engineer (CASE) Java
36
.NET
C ASE
Certified Application Security Engineer
Certified Application Security Engineer (CASE) .Net
CASE goes beyond just the guidelines on secure coding practices but include secure requirement gathering, robust • Understanding Application Security,
application design, and handling security issues in post development phases of application development. Threats, and Attacks
The hands-on training program encompasses security activities involved in all phases of the Secure Software • Secure Coding Practices for Input
Development Life Cycle (SDLC): planning, creating, testing, and deploying an application. Validation
37
APT
Advanced Penetration Testing
Advanced Penetration Testing
Key
KeyOutcomes
Outcomes Exam Information • Post Exploitation
38
The Licensed Penetration Tester (Master)
Credential– LPT(Master)
by Ali Isikli
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information
39
CAST 614 – Advanced Network Defense
Center for Advanced Security Training
• Firewalls
CAST 614 is an advanced course offering you the opportunity to deep dive into the crucial practical
aspects of enterprise network security. • Advanced Filtering
It covers fundamental areas of fortifying your defenses by discovering methods of developing a secure • Firewall Configuration
baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy
for a fortified perimeter is denied, the course moves on to defending against the sophisticated malware • Hardening: Establishing a Secure Baseline
that is on the rise today, and the importance of live memory analysis and real time monitoring.
• Intrusion Detection and Prevention
• Endpoint Protection
• Stage a strong defense against popular • Exam Title: CAST 614 - Advanced Network
security threats Defense • Securing an Enterprise
40
TM
Disaster
EC-Council Recovery
Professional EC-Council Disaster Recovery Professional (EDRP)
41
Certified Chief Information Security Officer (C|CISO)
• Governance
The C|CISO certification is an industry-leading program that recognizes the real-world experience necessary
to succeed at the highest executive levels of information security. Bringing together all the components • Security Risk Management, Controls, &
required for a C-Level positions, the C|CISO program combines audit management, governance, IS controls, Audit Management
human capital management, strategic program development, and the financial expertise vital for leading a
highly successful IS program. • Security Program Management &
Operations
The C|CISO Training Program can be the key to a successful transition to the highest ranks of information
• Information Security Core Competencies
security management.
• Strategic Planning, Finance, & Vendor
Management
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information
• Establishes the role of CISO and models for • Number of Questions: 150
governance • Duration: 2.5 hours
• Core concepts of information security • Test Format: Multiple Choice
controls, risk management, and compliance
42
Learning Track
EXECUTIVE LEADERSHIP
TM
C CISO
Executive
Certified Chief Information Security Officer
VULNERABILITY INCIDENT
NETWORK APPLICATION
ASSESSMENT & HANDLING &
DEFENSE SECURITY
PEN TESTING RESPONSE
INDUSTRIAL CONTROL
SYSTEMS & SUPERVISORY
CONTROL AND DATA
ACQUISITION
ICS / SCADA
IOT
DEVSECOPS
C IP
Certified IoT Professional
E CDE
EC-Council Certified DevSecOps Engineer
Specializations THREAT
INTELLIGENCE DISASTER RECOVERY BLOCKCHAIN
C BP
TM
C P ENT
Disaster
EC-Council Recovery
Certified Penetration Testing Professional
Professional Certified Blockchain Professional
Cybersecurity
Professionals
CLOUD SECURITY INCIDENT RESPONSE
WEP APP HACKING TM
TM
C CSE
Certified Cloud Security Engineer
ECIH
EC-Council Certifie Incident Handler
DIGITAL FORENSICS
SOC ANALYST TM
C HFI
Computer Hacking Forensic
INVESTIGATOR
Core C ND
Certified Network Defender
CYBER TECHNICIAN
Cyber Technician C CT
Certified Cybersecurity Technician
Cyber Essentials
TM
TM
N DE E HE D F E
Network Defense Essentials Ethical Hacking Essentials Digital Forensics Essentials
Cybersecurity Phishing
Awareness Awareness
C SCU
Certified Secure Computer User
ENCRYPTION
TM
OhPhish portal imitates real-world phishing scenarios. The platform equips employees with the most • Email Phishing
efficient solutions and products to combat phishing attacks and prevent data breaches. It caters to
• Vishing
the need for businesses by creating a safe working environment from Phishing, Smishing, and Vishing
attacks. OhPhish integrates e-Learning and gamification modules in a Learning Management System • Smishing
(LMS), helping employees to stay aware of phishing attacks.
• Spear Phishing
Key
KeyOutcomes
Outcomes Exam Information
44
Why CodeRed:
Courses built
Unlimited Courses are
by world-class More than 40%
access to a aligned to
Code Red Subscription/ library of 100s
experts and
current job
of the courses
cybersecurity are hands-on
EC-Council Micro-degrees: of courses
influencers
hiring trends
Course Description Course Outline
CodeRed is a continuous learning
platform designed for Busy Cyber
professionals - offering them
content rich courses created by
worlds’ leading cybersecurity
certification provide EC-Council Microdegrees
Master advanced cybersecurity skills with the modern flexibility of self-paced learning
and practical hands-on labs. EC-Council’s Microdegree offers a unique form of learning
Key Outcomes Exam that
experience Information
encourages a learner to acquire specialized skill sets in a relatively short
amount of time. The MicroDegree engages the learner in over 200 hours of
comprehensive deep-dive, hands-on learning experience, enabling them to excel in
their career.
What’s Included:
4536
Bachelor of Science in Cyber Security (BSCS)
ACCREDITED. FLEXIBLE. ONLINE.
Program
Course Description
Description Courses
Course Outline
46
Graduate Certificate Programs
ACCREDITED. FLEXIBLE. ONLINE.
Course
ProgramDescription
Description Course
CoursesOutline
EC-Council University’s Graduate Certificate Program focuses on the competencies necessary • Information Security Professional
for information assurance professionals to become managers, directors, and CIOs. Students will • Managing Secure Networks (C|ND)
experience not only specialized technical training in a variety of IT security areas, but will also acquire • Ethical Hacking and Countermeasures (C|EH)
an understanding of organizational structure and behavior, the skills to work within and across that • Research and Writing for the IT Practitioner
organizational structure, and the ability to analyze and navigate its hierarchy successfully. Each • Security Analyst
certificate targets skills and understandings specific to particular roles in the IT security framework of an • Security analyst and vulnerability assessment
organization. The certificates can be taken singly or as a progressive set of five, each building on the one (ECSA)
before it to move students from IT practitioner skill levels to IT executive skill levels. • Conducting Penetration and Security Tests
(LPT-Master)
• Securing Wireless Networks
• Cloud Security Architect (Any 3 of the 4 courses
Key Outcomes
Graduate Certificates ExamInformation
Exam Information below)
• Secure Programming
• Advanced Network Defense
• Information Security Professional • Completion of mandated credit hours of • Advanced Mobile Forensics or
courses in which the candidate earned a • Designing and Implementing Cloud Security
• Security Analyst cumulative GPA or 3.0 or better • Incident Management and Business Continuity
• Cloud Security Architect • All certificate requirements must be • Beyond Business Continuity
completed within one and a half times • Disaster Recovery (EDRP)
• Incident Management and Business
the program length as measured • Incident Handling and Response (ECIH)
Continuity
by maintaining a cumulative course • Executive Leadership in Information
• Executive Leadership in Information competition rates of 67% of course work Assurance
Assurance from the first term the student enrolls in the • Global Business Leadership
University and begins the program to the • Project Management
last course needed. • Executive Governance and Management
(CCISO)
47
Master of Science in Cyber Security (MSCS)
ACCREDITED. FLEXIBLE. ONLINE.
Program
Course Description
Description Courses
Course Outline
The Master of Science in Cyber Security (MSCS) Program prepares information technology professionals • MGMT 502 Business Essentials
• ECCU 501 Ethical Hacking & Countermeasures
for careers in cyber security and assurance. The program consists of topical areas dealing with computer
• ECCU 502 Investigating Network Intrusions and Computer
security management, incident response, and cyber security threat assessment, which require students to Forensics
be the creators of knowledge and inventors of cyber security processes, not merely users of information. • ECCU 503 Security Analysis and Vulnerability Assessment
Additionally, students will receive instruction in leadership and management in preparation for becoming • ECCU 504 Foundations of Organizational Behavior for the
cyber security leaders, managers, and directors. IT Practitioner
• ECCU 505 Introduction to Research and Writing for the IT
Practitioner
• ECCU 506 Conducting Penetration and Security Tests
• ECCU 507 Linux Networking and Security
• ECCU 509 Securing Wireless Networks
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information • ECCU 510 Secure Programming
• ECCU 511 Global Business Leadership
• ECCU 512 Beyond Business Continuity: Managing
Organizational Change
• Application of cyber security technical strategies, • Completion of thirty-six (36) credits of 500 • ECCU 513 Disaster Recovery
tools, and techniques to secure data and level courses in which the candidate earned • ECCU 514 Quantum Leadership
information for a customer or client a cumulative GPA of 3.0 or better • ECCU 515 Project Management in IT Security
• Adherence to a high standard of cyber security
ethical behavior • ECCU 516 The Hacker Mind: Profiling the IT Criminal
• Satisfactory completion of the summative • ECCU 517 Cyber Law
• Use of research in both established venues and
innovative applications to expand the body of capstone course • ECCU 518 Special Topics
knowledge in cyber security • ECCU 519 Capstone
• Application of principles of critical thinking to • All degree requirements must be completed
• ECCU 520 Advanced Network Defense
creatively and systematically solve the problems within one and a half times the program • ECCU 521 Advanced Mobile Forensics and Security
and meet the challenges of the everchanging length or have a cumulative course • ECCU 522 Incident Handling and Response
environments of cyber security completion rate of 67% of coursework • ECCU 523 Executive Governance Management
• Mastery of the skills necessary to move into cyber from the date the student enrolls in the • ECCU 524 Designing and Implementing Cloud Security
security leadership roles in companies, agencies,
University and begins the program. • ECCU 525 Securing Cloud Platforms
divisions, or departments
48
Course Description Course Outline
Global Experts,
Local Delivery.
Key Outcomes
Experience Exam
high-quality, affordable, hands-on Information
cybersecurity
training in a premium classroom setting.
40
Course Description Course Outline
w w w.e ccouncil.org