Cyber Handbook Enterprise

Download as pdf or txt
Download as pdf or txt
You are on page 1of 51

Over 1,200

Highly Qualified
Certified Instructors

w w w.e ccouncil.org
Table of Contents

Who We Are 03 EC-Council Certified Security Specialist (ECSS) 24

Security Wall 04 EC-Council Certified Encryption Specialist (ECES) 25

EC-Council at a Glance 05 Certified Network Defender (CND) 26


Course Description
Accreditations 06 Certified Ethical Hacker (CEH) 27

Your Learning Options 09 Certified Ethical Hacker (Practical) 28


Certified Threat Intelligence Analyst (CTIA) 29
Tracks
Certified SOC Analyst (CSA) 30
Foundation Track 11
Certified Penetration Tester (CPENT) 31
Vulnerability Assessment and Penetration Testing 12
EC-Council Certified Security Analyst (ECSA) 32
EC-Council Certified Security AnalystCourse
(Practical) Outline
Cyber Forensics 13
33
Network Defense and Operations 13
EC-Council Certified Incident Handler (ECIH) 34
Software Security 14
Computer Hacking Forensic Investigator (CHFI) 35
Key Outcomes
Governance 15
Exam Information
Certified Application Security Engineer (CASE) Java 36

Certifications Certified Application Security Engineer (CASE) .NET 37

Certified Secure Computer User (CSCU) 16 Advanced Penetration Testing (APT) 38


Digital Forensics Essentials (DFE) 17 The Licensed Penetration Tester (Master) Credential – LPT (Master) 39

18 CAST 614 – Advanced Network Defense 40

19 EC-Council Disaster Recovery Professional (EDRP) 41

20 Certified Chief Information Security Officer (C|CISO) 42


Certified Cybersecurity Technician (CCT) 21 Learning Track 43
EC-Council's Certified Cloud Security Engineer Program (CCSE) 22 44
ICS/SCADA 23 Code Red Subscription/EC-Council Micro-degrees 45

02
Table of Contents

Academic Programs
Bachelor of Science in Cyber Security (BSCS) 46
Graduate Certificate Programs 47
Master of Science in Cyber Security (MSCS) 48
EC-Council Masterclass 49

02
Who We Are
The EC-Council group is made up of several entities CCISO, CHFI, and CND programs. We have so far EC-Council Global Services (EGS) is dedicated to
that all help serve the same goal which is to create certified over 2,20,000 professionals in various helping organizations understand and manage
a better, safer cyber world through awareness and e-business and cybersecurity skills. their cyber-security risk posture effectively. EGS
education. Our entities include International specializes in helping clients make informed
Council of eCommerce Consultants (EC-Council), iClass is EC-Council’s direct certification training business decisions to protect their organizations.
iClass, EC-Council University, EC-Council Global program. iClass delivers EC-Council certification EGS has over 20 dedicated cyber security practice
Course
Services (EGS), Description
and EC-Council Conferences and courses through various training methodologies: Course
areas informed by theOutline
best cyber security
Events. instructor-led at client facilities, synchronous practitioners, each of whom have dedicated their
delivery through live, online instructor-led, and lives to defending organizations from
EC-Council creates content (course materials and asynchronously through our streaming video cyber-attacks.
exams) and certification delivered through our platform. iClass course videos can also be loaded
channel of authorized training centers which onto a mobile device, such as an iPad, and shipped EC-Council’s Conference and Events Group is
consists of over 700 partners representing over to a client location. responsible for planning, organizing, and running
2,000 physical locations in more than 145 countries conferences throughout the globe. TakeDownCon
across the globe. We are the owner and developer and Hacker Halted are IT security conferences that
of the world-famous Certified Ethical Hacker (CEH), bring world renowned speakers together for
Computer Hacking Forensics Investigator (CHFI), keynotes, panels, debates, and breakout sessions.
EC-Council Certified Security Analyst (ECSA), and Conferences have been run in Dallas, Las Vegas, St.
License Penetration Tester (LPT)(Master) programs. “Our lives are dedicated to the Louis, Huntsville, Maryland, Connecticut, Myrtle
mitigation and remediation Beach, Miami, Atlanta, Iceland, Hong Kong, Egypt,
Our certification programs are recognized Singapore, Mumbai, Dubai, Bahrain, London, Abu
worldwide and have received endorsements from of the cyber plague that is Dhabi and Kuala Lumpur.
Key Outcomes Exam Information
various government agencies, including the United menacing the world today”
States Federal Government (via the Montgomery GI Other events include CISO Summits, Global CISO
Bill), the National Security Agency (NSA), and the Forums, and Executive Cocktail Receptions where
Committee on National Security Systems (CNSS). Jay Bavisi EC-Council brings speakers and content to
All these reputed organizations have certified President & CEO executive level IT Security Professionals.
Certified Ethical Hacking (CEH), Computer Hacking EC-Council
Forensics Investigator (CHFI), EC-Council Disaster The Global Cyberlympics competition is a “capture
Recovery Professional (EDRP), EC-Council Certified the flag” type competition with approximately
Security Analyst (ECSA) and The Advanced 1,000 global participants. EC-Council brings the
Penetration Testing Program and The Licensed hackers together online for preliminary elimination
Penetration Tester (LPT)(Master) programs for rounds and then brings the top two teams (6-8
meeting the 4011, 4012, 4013A, 4014, 4015 and EC-Council University is accredited by the Distance players per team) from each region to compete in
4016 training standards for information security Education Accrediting Commission. The university the final head-to-head competition.
professionals. EC-Council has received offering programs such as Bachelor of Science in
accreditation from the American National Cyber Security, Master of Science in Cyber Security,
Standards Institute (ANSI) for our coveted CEH, and Graduate Certificate Program.

03
EC-Council Uni-Aid - Don’t stop learning

EC-Council Uni Aid is an EC-Council


scholarship that provides information
technology students at public universities
globally, access to EC-Council’s
industry-recognized information security
education and certification and related
technical disciplines.

Universities and student recipients will be


part of a global community of scholarship
recipients from the United States, Europe,
Middle East, Africa and Asia-Pacific, all of
whom share similar passion for

Course Description
information security and academic
excellence.

EC-Council has pledged $1,000,000


worth of information security
scholarships for the 2011-2012 academic
year to universities globally.

EC-Council

EC-Council Featured in CNN | The Wolf Blitzer Show

Aug 4, 2011 | Albuquerque, NM - Jay


Bavisi, president of EC-Council, was
earlier interviewed by CNN, to comment

Course Outline on the massive cyber spying incident


which targeted agencies and groups in
14 countries, including U.S government
agencies, the United Nations, defence
contractors and Olympic bodies.

As reported by CNN McAfee said the


attacks, which it calls Operation Shady
RAT, have allowed hackers potentially

Key Outcomes
to gain access to military and industrial
secrets from 72 targets, most of them in
the United States, over a five-year

Exam Information
period.

EC-Council

“EC-Council - Trusted worldwide for its end-to-end enterprise cyber


security solutions for human capital development”

04
EC-Council at a Glance
EC-Council Group is a multidisciplinary institution of global Information Security professional services.

EC-Council Group is a dedicated Information Security organization that aims at creating knowledge, facilitating innovation, executing research, implementing
development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Some of the finest organizations around the world such as the US Army, US Navy, DoD, the FBI, Microsoft, IBM, and the United Nations have trusted EC-Council to develop
and advance their security infrastructure.
Course Description Course Outline

ICECC ECC EGS


International Council of E-Commerce EC-Council Training & Certification EC-Council Global Services
Consultants Division of Professional Workforce Division of Corporate Consulting &
EC-Council Group Development Advisory Services

ECCU EGE ECF


EC-Council Global Events EC-Council Foundation
EC-Council University Division of Conferences, Forums, Summits, Non-Profit Organization for Cyber Security
Division of Academic Education Workshops & Industry Awards Awareness Increase.
Key Outcomes Exam Information

20+ 40+ 195+ 1000+ 2830+ 3000+


YEARS
TRAINING &
SUBJECT MATTER TRAINING PARTNERS TOOLS &
CERTIFICATION COUNTRIES TECHNOLOGIES
EXPERIENCE EXPERTS WORLDWIDE
PROGRAMS

2,37,580+
CERTIFIED MEMBERS
05
Accreditations
American National Standards Institute (ANSI)
EC-Council has achieved accreditation for its Certified Ethical Hacker (C|EH), Certified Chief Information Security Officer (C|CISO), Certified Network
Defender (C|ND), and Computer Hacking Forensic Investigator (C|HFI), to meet the ANSI/ISO/IEC 17024 Personnel Certification Accreditation
standard. EC-Council is one of a handful of certification bodies, whose primary specialization is information security, to be awarded this much
sought-after quality standard.
Course Description
Candidates who complete the EC-Council Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI), Certified Network
Defender (C|ND), and Certified Chief Information Security Officer (C|CISO) certification will also have that extra credential meeting the
requirements of the respective ANSI Certification Training Standards.

Learn more…

Course Outline
Committee on National Security Systems (CNSS) & National Security Agency (NSA)
Key Outcomes
EC-Council was honored at the 13th Colloquium for Information Systems Security Education (CISSE) by the United States National Security
Exam
Agency (NSA) and the Committee on National Information
Security Systems (CNSS) when its Certified Ethical Hacker (CEH), Computer Hacking Forensics
Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst (ECSA) and Licensed Penetration Tester (LPT) courseware
was certified to have met the 4012 (Senior System Managers), 4013A (System Administrators), 4014 (Information Systems Security Officers),
4015 (Systems Certifiers) and 4016 (Information Security Risk Analyst) training standards for information security professionals in the federal
government. The CNSS is a federal government entity under the U.S. Department of Defense that providesprocedures and guidance for the
protection of national security systems.

Candidates who complete the EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery
Professional (EDRP), Certified Security Analyst (ECSA) or Licensed Penetration Tester (LPT) certification will also have that extra credential meeting
the requirements of the respective CNSS 4011-4016 Federal Security Certification Training Standards.

06
Department of Defense (DoD)
EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (C|HFI), and Certified Chief Information Security Officer
programs are formally integrated as baseline skill certification options for the U.S. Department of Defense (DoD) cyber workforce in several
categories. Specifically, the C|CISO program is a recognized certification for the DoD IAM Level II, IAM Level III, and CSSP Manager, all specialized
cyber management personnel classifications within the DoD’s information assurance workforce. C|HFI is now recognized as a baseline certification
for CSSP Incident Responder and C|EH is now required for the DoD’s computer network defenders (CND’s) – CND Analyst, CND Infrastructure
Support, CND Incident Responder, and CND Auditor.
Course Description Course Outline
Learn more…

GCHQ Certified Training (GCT)


EC-Council has achieved accreditation for its Certified Ethical Hacker (C|EH), Certified Security Analyst (ECSA), and Chief Information Security Officer
(C|CISO), to meet the GCHQ Certified Training standard. This recognition is a feather in the cap for EC-Council’s much sought-after credentials,
which are among the most comprehensive programs in the field of Vulnerability Assessment and Penetration Testing, and Information Security
Leadership.

This affirms EC-Council’s commitment to offering high-quality certification programs that are developed to help arm information security
Key Outcomes Exam
professionals with the right skills to safeguard Information
the cyber world and achieve successful professional roles.

Learn more…

CREST Equivalency
Leading cyber security certification bodies CREST and EC-Council have announced mutual equivalency for their professional entry-point
technical qualifications. The direct equivalency relates to the EC-Council Security Analyst (ECSA v10) qualification with the CREST Practitioner
Security Analyst (CPSA) qualification. In addition, equivalency can also be granted for the for ECSA (Practical) with the CREST Registered Tester
(CRT) certification, provided that the candidate already holds a valid CREST CPSA qualification.

Learn more…

07
National Infocomm Competency Framework (NICF)
EC-Council Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI) programs have been accepted into National
Infocomm Competency Framework (NICF) Infocomm professionals competency requirement list. In addition to the inclusion, Infocomm
professionals training to be certified for the EC-Council programs at NICF accredited training centers, will be entitled to receive partial funding
from Critical Infocomm Technology Resource Program (CITREP) upon certification completion.

NICF determines the skills and competencies; and develops training strategies for Infocomm professionals to build a niche Infocomm workforce
in Singapore. CITREP is a training incentive program that assists Infocomm professionals with funding to gain recognized and specialized skills.

Department of Veterans Affairs


The Department of Veterans Affairs has included EC-Council Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI),
and EC-Council Certified Security Analyst (ECSA) under its GI Bill® for the reimbursement of test fees for veterans and other eligible persons in
accordance with the provisions of PL 106-4

Distance Education Accrediting Commission (DEAC)


EC-Council University is accredited by the Distance Education Accrediting Commission. The Distance Education Accrediting Commission is listed
by the U.S. Department of Education as a recognized accrediting agency. The Distance Education Accrediting Commission is recognized by the
Council for Higher Education Accreditation (CHEA).

CHEA
A national advocate and institutional voice for promoting academic quality through accreditation, CHEA is an association of 3,000 degree-
granting colleges and universities and recognizes approximately 60 institutional and programmatic accrediting organizations.
EC-Council University as well as our accreditor are acknowledged members of The Council for Higher Accreditation (CHEA).

08
Your Learning Options

Instructor-led Training
facility in your city.

Course Description
Online Training Course Outline
iLearn online training is a distance learning program designed for those who cannot attend a live course. The program is for the people who have a very busy schedule and want to learn at their own
pace through self-study. This modality is also available from our enterprise teams.

Mobile Learning
Our world class content is also available on a mobile device, allowing our students to learn on the go. This program is designed for those who are cannot attend a live course, but are keen to improve
their cyber security skills. This modality is also available from our enterprise teams.

Computer-based Training
base iLearn program and are not sold independently. This modality is also available from our enterprise teams.

Key Outcomes Exam Information


Hands-on Experience with the EC-Council Cyber Range ( iLabs)
EC-Council iLabs allows students to dynamically access a host of virtual machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere. Our simplistic web portal enables
the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost-effective, easy to use, live range lab solution available. Most of our
courses are equipped with iLabs, but iLabs can be purchased independently as well.

Customized Learning
channel. Let us know where and when you want the training delivered, and we will arrange for an instructor and all that’s required for a course to be taught at a location of your choice. Contact our
accredited training partners for a custom solution.
EC-Council client-site training includes official courseware, certification exam (ECC-Exam or VUE), iLabs, online labs (wherever available), and our test-pass guarantee.

Live Online Training


With iWeek, an instructor will teach you live online while you are seated in the comfort of your home. This training method gives you the freedom to get trained from a location of your choice.
Individuals who choose this delivery method consistently attribute their choice to the preference of having a live instructor available for which questions can be asked and answered. We offer early-bird
rates, group rates, and get even private courses delivered anytime.

09
Impact of Certified Ethical Hacker (C|EH) on Cyber Careers
The C|EH ranks in the top 10 most widely
21% of C|EHs reported a salary
79% of C|EHs reported a salary increase of
more than 20% compared with their peers. advantage of at least 40% over their peers. Top 10 recognized, important, and required certifications
for both beginning and established cybersecurity
professionals.(Datamation (Kime, 2022))

Insights from 2021 C|EH Hall of Fame Annual Report

I led I secured
“I led a team of phenomenal cybersecurity and fraud experts to identify a “I have expanded my knowledge of computer hacking and forensics
significant threat actor, mitigate the actor’s operations, protect the ecosystem from broadly, as a result, I was able to more securely protect my organization
attacks, and contribute to the takedown of the threat actor’s operations in 2020.” infrastructure.”

David Capezza, Michael Peters,


Senior Director, Visa Payment Systems Intelligence, Hall of Fame finalist CIO at a global risk management organization.2021 Hall of Fame nominee

I recovered
“C|EH equipped me to direct the recovery from a ransomware incident in just a few hours
without making any ransomware payment. I was also able to provide the FBI with forensic
data in the form of correlated logs.”

Bradley Newberry, Check out the full report


IT administrator for a municipality, Hall of Fame finalist. for industry insights,
success stories, and
learning experiences from
I analyzed C|EH alumni.
“I analyzed a few malware samples related to Covid-19 and then hosted a webinar to
show the audience members how to improve their cyber resilience against advanced Download the Report
cyberthreats.”

Yinchun Zhou,
Senior Security Consultant at an information management solutions firm,
Hall of Fame nominee

10
FoundationTrack

NDE Network Defense Target


Essentials Audience
Ethical Hacking
EHE Essentials
EC-Council Certified
CSCU ECES
Digital Forensics 212-81 EncryptionSpecialist
112-12 ComputerUser DFE
Essentials
This track focuses on todays’
computer users who use the internet
ECSS EC-Council Certified extensively to work, study and play.
Security Specialist

What will YouLearn


are Employedat:

Password SocialEngineering Mitigating


CloudSecurity EmailSecurity SafeBrowsing
Security Countermeasures IdentityTheft

Data Protection MobileDevice SocialNetwork Antiviruses


Physical Security Encryption
Security Security Protection

Mac

......
Disaster CreditCard MonitoringKids Wireless &Home
Internet Security OS Security
Recovery Security Online NetworkSecurity

*All credentials can be attained individually. Please referto cert.eccouncil.org for the eligibility criteria.
117
Vulnerability Assessment &Penetration Testing(VAPT)

Job
CPENT Certified Penetration
Testing Professional
LPT
(Master)
LicensedPenetration
Tester(Master) Roles

CEH
Hacker(Master) - Information Security Analyst/Administrator
- Information Security Manager/Specialist
Trac

- Information SystemsSecurity
k

Engineer/Manager
CTIA - Security Analyst
312-38 312-85 IntelligenceAnalyst

- Information SecurityAuditors
- Risk/Vulnerability Analyst

* Be s p o k e m o d u l e s ava i l a bl e fo r en terp ris e s

are Employedat:
Graduate Certificate in
Academic
Track

Incident Managementand
Business Continuity
* A d d i t i o n a l U n i v er s i t y c o u r s e s / p r e - r e q u i s i t e s m a y b e r e q u i r e d .

CORE ADVANCED EXPERT

This track maps to NICE’sSpecialtyAreas:


1.Protect and Defend(PR) Support (INF) 2.Securely Provision(SP)
a.Cybersecurity c. Incident Response (IR) a.Test and Evaluation
Defense Analysis(DA) d. Vulnerability 3.Analyze(AN)
b.Cybersecurity Assessment and a.Threat Analysis (TA)
Defense Infrastructure Management (VA) b.Exploitation Analysis(XA)

*All credentials can be attained individually. Please referto cert.eccouncil.org for the eligibility criteria.
128
Job
Roles

CEH CertifiedEthical
(MASTER) Hacker(Master)

CTIA Certified Threat


312-85 IntelligenceAnalyst
312-38

* B e s p o k e m o d u le s a v a i l a b l e f o r e n te rp ris e s

Graduate Certificate in Digital


Forensics, IncidentManagement
and BusinessContinuity
* A dditionalUniversitycourses/pre-requisitesmayberequired.

...
*All credentials can be attained individually. Please referto cert.eccouncil.org for the eligibility criteria.
132
Job
Roles
CPENT Certified Penetration LPT LicensedPenetration
Testing Professional
(MASTER) Tester(Master)

CASEJava CertifiedApplication
Security Engineer
312-96 Java

CEH
Hacker(Master)
CASE.Net CertifiedApplication
SecurityEngineer
312-95 .Net

312-38

Our Certified Software SecurityProfessionals


are Employedat:

Graduate Certificate in
Information Security
Professional, SecurityAnalyst

This Track Maps to NICE’sSpecialtyAreas:


1.SecurelyProvision 3.Oversee and Govern(OV) 5.5. Analyze(AN)
a.Software Development(DEV) a.Cybersecurity Management(MG) a. Analyzes collected information to identify
b.Technology(RD) 4.Protect and Defend(PR) vulnerabilities and potential for exploitation.
2.Operate and Maintain(0M)
a.Data Administration (DA)
b.Systems Analysis(AN)
a.CybersecurityDefense
Analysis (DA)
b. Vulnerability Assessmentand
..
Management (VA)
.
*All credentials can be attained individually. Please referto cert.eccouncil.org for the eligibility criteria.
144
Domain

Strategic Planning,
5 1 Domain
Job
Roles
Finance, & Vendor Governance
Course Description
Management Course Outline
- Information Security (IS) Director
- Information Assurance (IA) Program
Manager

2
TM

4 C CISO
Domain
Domain

Certified Chief Information Security Officer


Security Risk CCISO Professionals
Information Management, are Employed at:
Security Controls,
Core 712-50 & Audit
Competencies Management Graduate Certificate in:
Key Outcomes Exam Information

3
- Information Security
Professional
Domain - Executive Leadership in
Information Assurance
Security Program
Management & Operations

This Track Maps to NICE’s Specialty Areas:


e. Executive Cybersecurity
1. Securely Provision (SP)
b. Training, Education, and Leadership (EX)
a. Risk Management (RM)
Awareness (ED) f. Acquisition and Program/Project
b. Technology R&D (RD)
c. Cybersecurity Management (PM)
c. Systems Requirements
...
Management (MG) 3. Collect and Operate (CO)
Planning (RP)
d. Strategic Planning and a. Cyber Operational Planning (PL)
2. Oversee and Govern (OV)
Policy (PL)
a. Legal Advice and Advocacy (LG)

*All credentials can be attained individually. Please refer to cert.eccouncil.org for the eligibility criteria.
15
C SCU
Certified Secure Computer User
Certified Secure Computer User (CSCU)

Course Description Course Outline

CSCU provides individuals with the necessary knowledge and skills to protect their information assets.
• Introduction to Security
This course covers fundamentals of various computer and network security threats such as identity theft, • Securing Operating Systems
credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking
attacks, and social engineering. • Malware and Antivirus

OhPhish: OhPhish covers phishing, smishing, and vishing solutions in a single revolutionary platform to • Internet Security
help organizations strengthen their most vulnerable asset, their people. Learn more about OhPhish
• Security on Social Networking Sites
READ MORE
• Securing Email Communications

• Securing Mobile Devices


Key Outcomes Exam Information • Securing Cloud

• Securing Network Connections


• Fundamentals of various computer and • Exam Title: Certified Secure Computer User
network security threats • Data Backup and Disaster Recovery
• Exam Code: 112-12
• Understanding of identity theft, phishing
scams, malware, social engineering, and • Number of Questions: 50
financial frauds • Duration: 2 Hours
• Learn to safeguard mobile, media and • Availability: ECC Exam Portal
protect data
• Test Format: Multiple Choice
• Protecting computers, accounts, and social
networking profiles as a user • Passing Score: 70%
• Understand security incidents and reporting

16
What is Digital Forensics Essentials?

What Is Digital Course Overview Who is it for?


Forensics Essentials?

EC-Council’s Digital Forensics Essentials or D|FE The course is developed for those interested in learning the • High school students
fundamentals of computer forensics who aspire to pursue a career in
certification is part of the Essentials Series and
computer forensics, or digital forensics. It equips students with the • College/University Students
offers foundational learning on digital forensics
skills required to identify an intruder’s footprints in the aftermath of
and investigation phases. D|FE modules are • Professionals
the cybercrime & assemble digital evidence necessary for
mapped to industry skills and are designed to
prosecution in a court of law.
prepare students for entry-level cybersecurity
roles. It recognizes the competency and expertise The Essentials Series is EC-Council’s first Massive Open Online Course
in digital forensics and information security skills, (MOOC) series to promote essential cybersecurity skills. The
equipping candidates to bring value to their courseware comes with a free eBook, lab tutorials, video lectures
workplace and organization. with optional upgrades to lab access, an exam certificate, and more.

Learning Objective Course Mapping Exam Information


1. Computer Forensics Fundamentals 10. Dark Web Forensics
• C|ND EXAM TITLE: Digital Forensic Essentials
2. Computer Forensics Investigation Process 11. Investigating Email Crimes
• C|EH
3. Understanding Hard Disks and File Systems 12. Malware Forensics (D|FE)
• E|CIH
4. Data Acquisition and Duplication
• C|HFI EXAM LENGTH: 2 Hours
5. Defeating Anti-Forensics Techniques
• C|CT
6. Windows Forensics PLATFORM: ECC Exam Center
7. Linux and Mac Forensics
# OF QUESTIONS: 75
8. Network Forensics
9. Investigating Web Attacks PASSING SCORE: 70%

For More Information : https://www.eccouncil.org/programs/ics-scada-cybersecurity/ https://www.eccouncil.org/programs/essentials/ 17


Essentials Series | Network Defense Essentials

What Is Network Course Content Learning Objective


Defense Essentials?

Network Defense Essentials or N|DE is an entry- The Network Defense Essentials program covers the 1. Network Security Fundamentals
level certification from EC-Council launched under fundamental concepts of network defense and 2. Identification, Authentication, and
the Essentials Series to boost cybersecurity skills. security. N|DE equips students with the knowledge Authorization
N|DE modules are curated by industry experts to and skills required to identify the increasing network 3. Network Security Controls – Administrative
give participants a holistic overview of the critical security threats that impact the security posture of Controls
components of network security. The program is organizations around the globe. Participants also 4. Network Security Controls - Physical Controls
developed for those who want to kickstart a career learn to implement general security controls to 5. Network Security Controls - Technical
in cybersecurity. protect the underlying network infrastructure from Controls
unauthorized access, modification, destruction, or 6. Virtualization and Cloud Computing
disclosure.
N|DE validates the competency and expertise 7. Wireless Network Security
of a professional in network defense and 8. Mobile Device Security
The essentials course is EC-Council’s first Massive
information security skills, thereby equipping 9. IoT Device Security
Open Online Course (MOOC) educational series. The
them to bring more value to their workplace 10. Cryptography and PKI
courseware comes with a free eBook, lab tutorials,
and organization. and video lectures with optional upgrades to labs, 11. Data Security
exam certificates, and more. 12. Network Traffic Monitoring

Who is it for? Related Courses Exam Information

• High school students • C|ND


EXAM TITLE: Network Defense Essentials (N|DE) # OF QUESTIONS: 75
• College/university students • C|EH
• Professionals • C|EH MASTER EXAM FORMAT: Multiple Choice Exam PASSING SCORE: 70%
• C|PENT
PLATFORM: ECC Exam Center EXAM LENGTH: 2 Hours
• LPT MASTER

For More Information : https://www.eccouncil.org/programs/ics-scada-cybersecurity/ https://www.eccouncil.org/programs/essentials/ 18


Essentials Series |Ethical Hacking Essentials

What Is Ethical Course Content Learning Objective


Hacking Essentials?
1. Information Security Fundamentals
Ethical Hacking Essentials, or the E|HE The Ethical Hacking Essentials program covers 2. Ethical Hacking Fundamentals
certification, is an entry-level cybersecurity the fundamental concepts of information security 3. Information Security Threats and
program from EC-Council in the Essential Series. It and ethical hacking. E|HE equips students with the Vulnerabilities
encompasses the fundamental concepts of ethical knowledge and skills to identify information security 4. Password Cracking Techniques and Counter
hacking, penetration testing, and information threats and attack vectors, including password measures
security. E|HE is designed for those who want to cracking, social engineering, sniffing, and 5. Social Engineering Techniques and Counter
launch a career in cybersecurity. It equips students implementing general security controls. measures
with the essential skills required for entry-level 6. Network Level Attacks and Countermeasures
cybersecurity professionals in the field of ethical The essentials course is EC-Council’s first Massive 7. Web Application Attacks and
hacking. Open Online Course (MOOC) educational series. The Countermeasures
The program builds the competency and courseware comes with a free eBook, lab tutorials, 8. Wireless Attacks and Countermeasures
fundamental expertise required of professionals in and video lectures with optional upgrades to labs, 9. Mobile Attacks and Countermeasures
ethical hacking and information security skills, exam certificates, and more.
10. IoT and OT Attacks and Countermeasures
equipping them to bring more value to their 11. Cloud Computing Threats and
organization. Countermeasures
12. Penetration Testing Fundamentals

Who is it for? Related Courses Exam Information

• High school students • C|ND


EXAM TITLE: Ethical Hacking Essentials (E|HE) # OF QUESTIONS: 75
• College/university students • C|EH
• Professionals • C|EH MASTER EXAM LENGTH: 2 Hours PASSING SCORE: 70%
• C|PENT
PLATFORM: ECC Exam Center
• LPT MASTER

For More Information : https://www.eccouncil.org/programs/ics-scada-cybersecurity/ https://www.eccouncil.org/programs/essentials/ 19


Web Application Hacking and Security

What is WAHS? Course Content Who is it for


EC-Council’s Web Application Hacking and 100% hands-on lab-based learning about application • Penetration Tester
Security is a specialization certification vulnerabilities and web application hacking. The course • Ethical Hacker
that enables you to play, learn, hack, provided the challenger with the ability to follow an • Web Application Penetration
test, and secure web applications from instructor as they make their way through the challenges. Tester/Security Engineer/Auditor
existing and emerging security threats in • Red Team Engineer
the industry verticals.
• Information Security Engineer
• Risk/Vulnerability Analyst
• Vulnerability Manager
• Incident responder

Learning Objectives Related Courses Exam Information

1. Learn Application Vulnerabilities • CND EXAM TITLE : WAHS


2. Hack and Defend web applications • CEH
3. Advanced Web Application Penetration Testing DURATION : 6 Hours
• CEH (Practical)
4. Advanced SQL Injection • CPENT AVAILABILITY : ECC Exam Portal
5. Security Misconfigurations • LPT (Master)
6. Reflected, Stored and DOM-based Cross Site Scripting (XSS) • CASE
7. Cross Site Request Forgery (CSRF) - GET and POST Methods
8. Server-Side Request Forgery (SSRF)
9. CMS Vulnerability Scanning

25+ More

20
Certified Cybersecurity Technician

What is C|CT? Course Content Who is it for


The C|CT is an entry-level cybersecurity • The CICT training is accompanied by critical thinking tasks The CICT is ideal for anyone looking to start
program engineered by EC-Council, the and immersive lab exercises that allow candidates to apply their career in cybersecurity or add a strong
creator of the Certified Ethical Hacker their knowledge and move into the skill development phase foundational understanding of the
(CIEH) certification, to address the global in the class itself. cybersecurity concepts and techniques
need and demand for cybersecurity required to effective on the job. The course is
technicians with strong foundational • The CICT develops participants. Fundamental especially well suited to:
skills. CICT is focused on hands-on cybersecurity skills across the fields of network defense, • Early-career IT professionals, IT managers,
practice, with more than 50% of training ethical hacking, digital forensics, and security operations career changer, and career advancers
time dedicated to labs. giving leaners the foundation they need to kickstart a career • Students and recent graduates
in cybersecurity.

Learning Objectives Exam Information

1. Key concepts in cybersecurity, including information security and 11. Cryptography and public-key infrastructure
network Security 12. Data security controls, data backup and retention
2. Information security threats, vulnerabilities. and attacks EXAM TITLE : Certified Cloud Security Engineer
methods. and data loss prevention techniques
3. The different types of malware 13. Network troubleshooting, traffic and log EXAM CODE : 212-82
4. Identification, authentication. and authorization monitoring. and analysis of suspicious traffic
5. Network security controls 14. The incident handling and response process # OF QUESTIONS : 60
6. Network security assessment techniques and tools (threat hunting, threat 15. Computer forensics and digital evidence DURATION : 3 Hours
intelligence, vulnerability assessment, ethical hacking. penetration fundamentals, including the phase of a forensic
testing. configuration and asset management) investigation AVAILABILITY : ECC Exam Portal
7. Application security design and testing techniques 16. Concepts in business continuity and disaster
8. Fundamentals of virtualization, cloud computing. and cloud security recovery TEST FORMAT : Multiple choice and Real Life
9. Wireless network fundamentals. wireless encryption, and related security 17. Risk management concepts, phases and hands-on Practical Exam
measures frameworks
10. Fundamentals of mobile. loT, and OT devices and related security EXAM MODE : Remote Proctoring Services
measures

21
EC-Council's Certified Cloud Security Engineer Program

What is C|CSE Domain Who is it for

1. Introduction to Cloud Security This program is ideal for:


EC-Council's Certified Cloud Security • Network security administrators, network
2. Platform and Infrastructure Security in Cloud
Engineer (C1CSE) program is a hands-on security engineers, network defenders,
learning course curated by cloud 3. Application Security in Cloud
4. Data Security in Cloud cybersecurity engineers, and any other job
security professionals in collaboration role that involves handling the security of
with subject matter experts across the 5. Security Operations in Cloud
6. Penetration Testing in Cloud traditional network environments
globe. This specialized course combines
7. Incident Response in Cloud • Cloud administrators, cloud engineers, and
vendor-neutral and vendor-specific
8. Forensic Investigation in Cloud other industry professionals with experience
cloud security concepts mapped to real-
9. Business Continuity and Disaster Recovery in Cloud in managing cloud platforms
time cloud security job roles.
10. Governance, Risk Management, and Compliance in Cloud • Any other role that involves network or cloud
11. Standards, Policies, and Legal Issues in Cloud administration, management, and operations

USPs of the Program Exam Information

• Vendor-neutral and vendor-specific cloud security concepts. EXAM TITLE: Certified Cloud Security Engineer
• A comprehensive cloud security program
• Deep focus and demonstration on widely used vendor-specific AWS, AZURE, and GCP cloud security practices, EXAM CODE : 312-40
tools, and technologies # OF QUESTIONS : 125
• Covers both technical and operational aspect of cloud security
• Dedicated focus on Penetration Testing, Forensics investigation, Incident Response, BC/DR. GRC related DURATION : 4 Hours
security practices in cloud AVAILABILITY : ECC Exam Portal
• Intensive hands-on program (with more than 50 labs)
• Mapped with real-time job roles and responsibilities of cloud security professionals. TEST FORMAT : Multiple Choice Questions

22
ICS/SCADA
What Is Ethical Course Overview Course Outline
Hacking Essentials?

Industrial automation processes use industrial The ICS/SCADA Cybersecurity course is a hands-on 1. Introduction to ICS/SCADA Network Defense
control systems (ICS) and supervisory control training module that teaches the foundations of
and data acquisition (SCADA) systems to control security and defending network architectures 2. TCP/IP 101 0
industrial processes locally or remotely and to from attacks. Students will learn to think like a
3. Introduction to Hacking
monitor, gather, and process real-time data. malicious hacker to defend their organizations.
4. Vulnerability Management
ICS/SCADA teaches powerful methods to analyze
5. Standards and Regulations for Cybersecurity
risks possessed by network infrastructure in IT and
corporate spaces. Once your foundation or basic 6. Securing the ICS network
concepts are clear, you will learn a systematic
process of intrusion and malware analysis. After 7. Bridging the Air Gap
this, you will learn about digital forensic process 8. Introduction to Intrusion Detection Systems
and incident response techniques upon detecting
a breach. (IDS) and Intrusion Prevention Systems (IPS)

Who is it for? Exam Information

This course is designed for IT professionals who manage or direct their EXAM TITLE: ICS / SCADA # OF QUESTIONS: 75
organization's IT infrastructure and are responsible for establishing and EXAM LENGTH: 2 Hours PASSING SCORE: 70%
maintaining information security policies, practices, and procedures. PLATFORM: ECC Exam Center

For More Information : https://www.eccouncil.org/programs/ics-scada-cybersecurity/ 23


TM

E CSS
EC-Council Certified Security Specialist
EC-Council Certified Security Specialist (ECSS)

Course Description Course Outline

EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental • Information Security Fundamentals
concepts of information security, computer forensics, and network security. It enables students to identify • Networking Fundamentals
information security threats which reflect on the security posture of the organization and implement • Secure Network Protocols
general security controls. • Information Security Threats and Attacks
• Social Engineering
This program will give a holistic overview of the key components of information security, computer • Hacking Cycle
forensics, and network security. This program provides a solid fundamental knowledge required for a career • Identification, Authentication, and
in information security. Authorization
• Cryptography
• Firewalls
• Intrusion Detection System
• Data Backup
Key Outcomes Exam Information • Virtual Private Network
• Wireless Network Security
• Web Security
• It facilitates your entry into the world of • Exam Title: EC-Council Certified Security • Ethical Hacking and Pen Testing
Information Security Specialist • Incident Response
• It provides professional understanding • Exam Code: ECSS • Computer Forensics Fundamentals
about the concepts of Information Security, • Digital Evidence
Network Security, and Computer Forensics • Number of Questions: 50 • Understanding File Systems
• Windows Forensics
• It provides best practices to improve • Duration: 2 hours • Network Forensics and Investigating
organizational security posture • Availability: ECC Exam Portal Network Traffic
• Steganography
• It enhances your skills as a Security Specialist • Test Format: Multiple Choice • Analyzing Logs
and increases your employability • E-mail Crime and Computer Forensics
• Passing Score: 70% • Writing Investigative Report

24
EC-Council Certified Encryption Specialist (ECES)

Course Description Course Outline

• Introduction and History of Cryptography

• Symmetric Cryptography and Hashes


The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students
to the field of cryptography. The participants will learn the foundations of modern symmetric and key • Number Theory and Asymmetric
cryptography including the details of algorithms such as Feistel Functions, DES, and AES. Cryptography

• Applications of Cryptography

• Cryptanalysis

Key Outcomes Exam Information

• Develop skills to protect critical data in • Exam Title: EC-Council Certified Encryption
organizations with encryption Specialist
• Develop a deep understanding of essential • Exam Code: 212-81
cryptography algorithms and their
applications • Number of Questions: 50
• Make informed decisions about applying • Duration: 2 hours
encryption technologies
• Save time and cost by avoiding common • Availability: ECC Exam Portal
mistakes in implementing encryption • Test Format: Multiple Choice
technologies effectively
• Develop working knowledge of cryptanalysis • Passing Score: 70%

25
C ND
Certified Network Defender
Certified Network Defender (CND)

Course Description Course Outline

• Computer Network and Defense


CND is the world’s most advanced network defense course that covers 14 of the most current network Fundamentals
security domains any individuals will ever want to know when they are planning to protect, detect, and • Network Security Threats, Vulnerabilities,
respond to the network attacks. and Attacks
• Network Security Controls, Protocols, and
The course contains hands-on labs, based on major network security tools and to provide network Devices
administrators real world expertise on current network security technologies and operations.
• Network Security Policy Design and
Implementation
• Physical Security
• Host Security
Key Outcomes Exam Information • Secure Firewall Configuration and
Management
• Knowledge on how to protect, detect, and • Exam Title: Certified Network Defender • Secure IDS Configuration and Management
respond to network attacks • Exam Code: 312-38 • Secure VPN Configuration and Management
• Network defense fundamentals • Number of Questions: 100 • Wireless Network Defense
• Duration: 4 hours • Network Traffic Monitoring and Analysis
• Application of network security controls,
protocols, perimeter appliances, secure IDS, • Availability: ECC Exam Portal • Network Risk and Vulnerability
VPN, and firewall configuration Management
• Test Format: Multiple Choice
• Data Backup and Recovery
• Intricacies of network traffic signature, • Passing Score: Please refer to
analysis, and vulnerability scanning • Network Incident Response and
• Passing Score: Please refer to Management
https://cert.eccouncil.org/faq.html

26
TM

C EH
Certified Ethical Hacker
Certified Ethical Hacker (C|EH)

Course Description Course Outline

• Introduction to Ethical Hacking


C|EH is the world’s most advanced certified ethical hacking course that covers 20 of the most current • Footprinting and Reconnaissance
security domains any individual will ever want to know when they are planning to beef-up the information • Scanning Networks
security posture of their organization.
• Enumeration
The accredited course provides the advanced hacking tools and techniques used by hackers and • Vulnerability Analysis
information security professionals. • System Hacking
• Malware Threats
• Sniffing
• Social Engineering
Key Outcomes Exam Information • Denial-of-Service
• Session Hijacking

• • Evading IDS, Firewalls, and Honeypots


• Thorough introduction to ethical hacking Exam Title: Certified Ethical Hacker (ANSI)
• Hacking Web Servers
• Exposure to threat vectors and • Exam Code: 312-50 (ECC EXAM), 312-50
(VUE) • Hacking Web Applications
countermeasures
• Number of Questions: 125 • SQL Injection
• Addresses emerging areas of IoT, cloud and
• Duration: 4 hours • Hacking Wireless Networks
mobile hacking
• Availability: ECC Exam Portal, VUE • Hacking Mobile Platforms
• Prepares you to combat Trojans, malware, • IoT Hacking
backdoors, and more • Test Format: Multiple Choice
• Passing Score: Please refer to • Cloud Computing
• Enables you to hack using mobile https://cert.eccouncil.org/faq.html • Cryptography

27
Certified Ethical Hacker (Practical)

Course Description C|EH (Practical)


Course Outline Credential
Holders Can
• Demonstrate the understanding of attack
C|EH Practical is a six-hour, rigorous exam that requires you to demonstrate the application of ethical vectors
hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability • Perform network scanning to identify live
analysis, system hacking, web app hacking, etc. to solve a security audit challenge. and vulnerable machines in a network.

This is the next step after you have attained the highly acclaimed Certified Ethical Hacker certification. • Perform OS banner grabbing, service, and
user enumeration.
• Perform system hacking, steganography,
steganalysis attacks, and cover tracks.
• Identify and use viruses, computer worms,
and malware to exploit systems.
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information
• Perform packet sniffing.
• Conduct a variety of web server and web
• Mastery of Ethical Hacking skills. • Exam Title: Certified Ethical Hacker (Practical) application attacks including directory
traversal, parameter tampering, XSS, etc.
• Demonstrate the application of the • Number of Practical Challenges: 20
knowledge to find solutions to real-life • Perform SQL injection attacks.
challenges. • Duration: 6 hours • Perform different types of cryptography
• Commitment to code of ethics. attacks.
• Availability: Aspen - iLabs • Perform vulnerability analysis to
• Validate essential skills required in the ethical
identify security loopholes in the target
hacking domains. • Test Format: iLabs Cyber Range
organization’s network, communication
infrastructure, and end systems etc.
• Passing Score: 70%

28
C T IA
Certified Threat Intelligence Analyst
Certified Threat Intelligence Analyst (CTIA)

Course Description Course Outline

• Introduction to Threat Intelligence


C|TIA is a method-driven program that uses a holistic approach, covering concepts from planning the
threat intelligence project to building a report to disseminating threat intelligence. These concepts • Cyber Threats and Kill Chain Methodology
are highly essential while building effective threat intelligence and, when used properly, can secure
organizations from future threats or attacks. • Requirements, Planning, Direction, and
Review
This program addresses all the stages involved in the Threat Intelligence Life Cycle. This attention to
a realistic and futuristic approach makes C|TIA one of the most comprehensive threat intelligence • Data Collection and Processing
certifications on the market today. • Data Analysis
• Intelligence Reporting and Dissemination

Key Outcomes Exam Information


• Enable individuals and organizations with the ability
to prepare and run a threat intelligence program • Exam Title: Certified Threat Intelligence
that allows evidence-based knowledge and provides
Analyst
actionable advice about existing and unknown threats
• Ensure that organizations have predictive capabilities • Exam Code: 312-85
rather than just proactive measures beyond active
defense mechanism • Number of Questions: 50
• Empower information security professionals with
the skills to develop a professional, systematic, and • Duration: 2 hours
repeatable real-life threat intelligence program
• Availability: EC-Council Exam Portal
• Differentiate threat intelligence professionals from
other information security professionals
• Test Format: Multiple Choice
• Provide an invaluable ability of structured threat
intelligence to enhance skills and boost their • Passing Score: 70%
employability

29
Certified SOC Analyst (CSA)

Course Description Course Outline

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered • Module 1: Security Operations and
for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entrylevel and intermediate- Management
level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand
technical skills through instruction by some of the most experienced trainers in the industry. The program focuses • Module 2: Understanding Cyber Threats,
on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for IoCs, and Attack Methodology
dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of
SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced • Module 3: Incidents, Events, and Logging
incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and
collaborate with CSIRT at the time of need.
• Module 4: Incident Detection with Security
Information and Event Management (SIEM)

Key Outcomes Exam Information • Module 5: Enhanced Incident Detection


with Threat Intelligence

• Gain Knowledge of SOC processes, procedures, technologies,


and workflows.
• Exam Title: Certified SOC Analyst • Module 6: Incident Response
• Able to recognize attacker tools, tactics, and procedures to • Exam Code: 312-39
identify indicators of compromise (IOCs) that can be utilized
during active and future investigations.
• Number of Questions: 100
• Gain experience and extensive knowledge of Security
Information and Event Management.
• Duration: 3 hours
• Able to develop threat cases (correlation rules), create reports,
etc. • Availability: EC-Council Exam Portal (please
• Plan, organize, and perform threat monitoring and analysis in visit https://www. eccexam.com)
the enterprise.
• Able to prepare briefings and reports of analysis methodology • Test Format: Multiple Choice
and results.
• Gain understating of SOC and IRT collaboration for better • Passing Score: 70%
incident response.

30
Certified Penetration Tester

What is CPENT? Course Content Who is it for?


Introducing the most extensive and advanced penetration testing Students will receive their study kit • Penetration Testers
program on the planer. The dynamic pen testing course culminates in
consisting of physical and digital course • Ethical Hackers
a brand new 24-hr practical exam, hosted on the new EC-Council
materials, including their iLabs code. • Information Security Consultants/
Cyber Range platform, CyberQ. CPENT provides the capability to
iLabs will be used to complete classroom Testers/Analysts/Engineers
assess a pen tester's skills across a broad spectrum of "network zones,"
training sessions. Students will work with • Network Server Administrators
with each zone representing a distinct type of testing. The pen testing the instructor to review the tolls and
challenges shall truly test a candidate's ability to think-on-their-feet • Firewall & System Administrators
learn how to apply them to the iLabs • Risk Assessment Professionals
and perform real world maneuvers. Candidates challenging the CPENT
Cyber Range.
Program must overcome their assessment challenges which are
created in various zones, which is unlike any other Penetration Testing
program available in the market today.

What is new in CPENT? Course Mapping Exam Information


• CPENT is an all new program that is a vital element of the EC-Council VAPT learning track,
which also includes CND and CEH. • CND EXAM TITLE: Certified
• Instead of one or two specialties in existing programs, the CPENT focuses on multiple disciplines, • CEH
presented through an enterprise network environment that must be attacked, exploited, • CEH (Practical) Penetration Tester
evaded and defended. • CPENT # OF QUESTIONS: 10 + Report
• CPENT includes advanced Windows attacks with PowerShell (or other bypass techniques), as • LPT (Master)
well as advanced methods to score points within zones. Writing DURATION: 24 Hours or
• Students attack IOT systems by locating and gaining access to the network and identifying the 12-Hour Sessions
firmware of the IOT device.
• Students also bypass a filtered network and leverage it to gain access to web applications that PASSING SCORE: 70% for CPENT
must be compromised. and 90% for LPT (Master)
• The CPENT program exposes the learners to advanced environments and techniques such as
penetration testing operational technology, double pivoting, evading defence mechanism,
report writing, and professional dynamic reporting.

For More Information : https://www.eccouncil.org/programs/ics-scada-cybersecurity/ https://www.eccouncil.org/programs/essentials/ 31


TM

E C SA
EC-Council Certified Security Analyst
EC-Council Certified Security Analyst (ECSA)

Course Description Course Outline

• Penetration Testing Essential Concepts


(Student Introduction)
ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern
infrastructures, operating systems, and application environments while teaching the students how to • Introduction to Penetration Testing and
document and write a penetration testing report. Methodologies
• Penetration Testing Scoping and
This program takes the tools and techniques covered in C|EH to next level by utilizing EC-Council’s Engagement Methodology
published penetration testing methodology.
• Open-Source Intelligence (OSINT)
Methodology
• Social Engineering Penetration Testing
Methodology
Key Outcomes Exam Information • Network Penetration Testing Methodology
– External
• Network Penetration Testing Methodology
• Introduction to security analysis and • Exam Title: EC-Council Certified Security – Internal
penetration testing methodologies Analyst
• Network Penetration Testing Methodology
• In-depth vulnerability analysis, network • Exam Code: 412-79 – Perimeter Devices
penetration testing from external and
internal evading firewalls and IDS • Number of Questions: 150 • Web Application Penetration Testing
Methodology
• Learn to own web applications and • Duration: 4 hours
databases, and take over cloud services • Database Penetration Testing Methodology

• Analyze security of mobile devices and • Availability: ECC Exam Portal • Wireless Penetration Testing Methodology
wireless networks • Cloud Penetration Testing Methodology
• Test Format: Multiple Choice
• Present findings in a structured actionable • Report Writing and Post Testing Actions
report • Passing Score: 70%

32
EC-Council Certified Security Analyst (Practical)

Course Description ECSA (Practical)


Course Outline Credential
Holders Can
• Perform advanced network scans beyond
ECSA (Practical) is a 12-hour, rigorous practical exam built to test your penetration testing skills. perimeter defenses, leading to automated
and manual vulnerability analysis, exploit
The candidates are required to demonstrate the application of the penetration testing methodology selection, customization, launch and post
that is presented in the ECSA program, and are required to perform a comprehensive security audit of an exploitation maneuvers.
organization, just like in the real world. You will start with challenges requiring you to perform advanced
network scans beyond perimeter defenses, leading to automated and manual vulnerability analysis, exploit • Customize payloads
selection, customization, launch, and post exploitation maneuvers.
• Make critical decisions at different phases of
a pen-testing engagement

• Perform advanced network scans beyond


Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information perimeter defenses

• Perform automated and manual


• Test your ability to perform threat and • Exam Title: EC-Council Certified Security vulnerability analysis
exploit research, understand exploits in the Analyst (Practical)
• Customization, launch, and post
wild, write your own exploits, customize
• Number of challenges: 8 exploitation maneuvers
payloads, and make critical decisions
• Duration: 12 hours • Perform a full fledged Penetration Testing
• Create a professional pen testing report
with essential elements engagement
• Availability: Aspen- iLabs
• Create a professional pen-testing report
• Test Format: iLabs cyber range
• Demonstrate the application of penetration
• Passing Score: 5 out of 8 challenges and
testing methodology presented in the ECSA
submission of an acceptable penetration
program
testing report

33
TM

ECIH
EC-Council Certified Incident Handler
EC-Council Certified Incident Handler (ECIH)

Course Description Course Outline

• Introduction to Incident Response and


The ECIH program is designed to provide the fundamental skills to handle and respond to the computer Handling
security incidents in an information system. The course addresses various underlying principles and
techniques for detecting and responding to current and emerging computer security threats. • Risk Assessment

• Incident Response and Handling Steps


The comprehensive training program will make students proficient in handling as well as responding to
various security incidents such as network security incidents, malicious code incidents, and insider attack • CSIRT
threats.
• Handling Network Security Incidents

• Handling Malicious Code Incidents

Key Outcomes Exam Information • Handling Insider Threats

• Forensic Analysis and Incident Response

• Principals, processes and techniques for • Exam Title: EC-Council Certified Incident • Incident Reporting
detecting and responding to security threats/ Handler
breaches • Incident Recovery
• Exam Code: 212-89
• Liaison with legal and regulatory bodies • Number of Questions: 50 • Security Policies and Laws

• Learn to handle incidents and conduct • Duration: 2 hours


assessments • Availability: ECC Exam Portal

• Cover various incidents like malicious code, • Test Format: Multiple Choice
network attacks, and insider attacks • Passing Score: 70%

34
TM

C HFI
Computer Hacking Forensic
INVESTIGATOR
Computer Hacking and Forensic Investigator (CHFI)

Course Description Course Outline

• Computer Forensics in Today’s World


CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to • Computer Forensics Investigation Process
acquire hands-on experience.
• Understanding Hard Disks and File Systems
The program provides a strong baseline knowledge of key concepts and practices in the digital forensic
domains relevant to today’s organizations. Moreover, CHFI provides firm grasp on the domains of digital • Data Acquisition and Duplication
forensics. • Defeating Anti-Forensics Techniques

• Operating System Forensics

• Network Forensics
Key Outcomes Exam Information • Investigating Web Attacks

• Database Forensics
• Comprehensive forensics investigation • Exam Title: Computer Hacking Forensic • Cloud Forensics
process Investigator
• Forensics of file systems, operating systems, • Exam Code: 312-49 exam • Malware Forensics
network and database, websites, and email • Number of Questions: 150 • Investigating Email Crimes
systems
• Duration: 4 hours • Mobile Forensics
• Techniques for investigating on cloud,
malware, and mobile • Availability: ECC Exam Portal
• Forensics Report Writing and Presentation
• Data acquisition and analysis as well as • Test Format: Multiple Choice
anti-forensic techniques • Passing Score: Please refer to https://cert.
• Thorough understanding of chain of custody, eccouncil.org/faq.html
forensic report, and presentation

35
JAVA

C ASE
Certified Application Security Engineer
Certified Application Security Engineer (CASE) Java

Course Description Course Outline

• Understanding Application Security, Threats,


and Attacks
The CASE Java program is designed to be a hands-on, comprehensive application security training course
that will help software professionals create secure applications. It trains software developers on the critical • Security Requirements Gathering
security skills and knowledge required throughout a typical software development life cycle (SDLC), • Secure Application Design and Architecture
focusing on the importance of the implementation of secure methodologies and practices required in
today’s insecure operating environment. • Secure Coding Practices for Input Validation

• Secure Coding Practices for Authentication and


Authorization

• Secure Coding Practices for Cryptography

Key Outcomes Exam Information • Secure Coding Practices for Session


Management

• Secure Coding Practices for Error Handling


• Security Beyond Secure Coding - Challenging • Exam Title: Certified Application Security
the traditional mindset where secure application • Static and Dynamic Application Security Testing
means secure coding Engineer (Java)
(SAST & DAST)
• Testing and credentialing secure application • Exam Code: 312-96
development across all phases of the SDLC • Secure Deployment and Maintenance
• CASE Program maps to many Specialty Areas • Number of Questions: 50
under “Securely Provision category” in the NICE
2.0 Framework • Duration: 2 hours
• Covers techniques such as Input Validation • Availability: ECC Exam Portal
techniques, Defense Coding Practices,
Authentications and Authorizations, • Test Format: Multiple Choice
Cryptographic Attacks, Error Handling techniques,
and Session Management techniques, among • Passing Score: 70%
many others

36
.NET

C ASE
Certified Application Security Engineer
Certified Application Security Engineer (CASE) .Net

Course Description Course Outline

CASE goes beyond just the guidelines on secure coding practices but include secure requirement gathering, robust • Understanding Application Security,
application design, and handling security issues in post development phases of application development. Threats, and Attacks

• Security Requirements Gathering


This makes CASE one of the most comprehensive certifications for secure software development in the market today.
It’s desired by software application engineers, analysts, testers globally, and respected by hiring authorities. • Secure Application Design and Architecture

The hands-on training program encompasses security activities involved in all phases of the Secure Software • Secure Coding Practices for Input
Development Life Cycle (SDLC): planning, creating, testing, and deploying an application. Validation

• Secure Coding Practices for Authentication


and Authorization

Key Outcomes Exam Information • Secure Coding Practices for Cryptography

• Secure Coding Practices for Session


• Ensure that application security is no longer an Management
afterthought but a foremost one. • Exam Title: Certified Application Security
Engineer (.NET) • Secure Coding Practices for Error Handling
• It lays the foundation required by all application
developers and development organizations, to • Exam Code: 312-95 • Static and Dynamic Application Security
produce secure applications with greater stability
Testing (SAST & DAST)
and fewer security risks to the consumer. • Number of Questions: 50
• Ensure that organizations mitigate the risk of losing • Secure Deployment and Maintenance
• Duration: 2 hours
millions due to security compromises that may arise
with every step of application development process.
• Availability: ECC Exam Portal
• Helps individuals develop the habit of giving
importance to security sacrosanct of their job • Test Format: Multiple Choice
role in the SDLC, therefore opening security as
the main domain for testers, developers, network • Passing Score: 70%
administrator etc.

37
APT
Advanced Penetration Testing
Advanced Penetration Testing

Course Description Course Outline

• Introduction to Vulnerability Assessment


In the Advanced Penetration Testing Course, you are presented with minimal network information along
and Penetration Testing
with a Scope of Work (SOW). The course was created to provide you with advanced concepts that will help
when it comes to attempting the LPT (Master) Certification exam.
• Information Gathering Methodology
The last module of the course includes an SOW for each of the various networks we have created for the
• Scanning and Enumeration
course. This, combined with the composition of various ranges, mimics a professional penetration test.
Time is limited and you will be required to identify the attack surface followed by the weaknesses of the
• Identify Vulnerabilities
machines that are on the network.
• Exploitation

Key
KeyOutcomes
Outcomes Exam Information • Post Exploitation

• Advanced Tips and Techniques


• Prepare you for the LPT (master) exam. • Preparing a Report
• Learn professional security and penetration testing skills.
• Practice Ranges
• Show advanced concepts like scanning against defenses, pivoting between networks, deploying
proxy chains, and using web shells.

38
The Licensed Penetration Tester (Master)
Credential– LPT(Master)

Course Description Testimonials


Course Outline

“Converting fear into confidence


The LPT (Master) credential is developed in collaboration with SMEs and practitioners around the world with LPT(Master)”
after a thorough job role, job task, and skills-gap analysis.
by Adithya Naresh
The LPT (Master) practical exam is the capstone to EC-Council’s entire information security track, right from
the CEH to the ECSA Program. The LPT (Master) exam covers the skill-sets, technical analysis and report
writing, required to be a true professional penetration tester.
“Proud to attain the LPT(Master)
credential”

by Ali Isikli
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information

Live Online “LPT(Master): Extremely challenging


LPT Demonstrates
and one of the toughest exams”
• Mastery of penetration testing skills Fully
by Mark Horvat
Proctored
• Ability to perform repeatable methodology

• Commitment to code of ethics 3 Levels


“Real-life penetration testing with
• Ability to present analysed results through
LPT(Master)”
structured reports 9 Challenges
by Moustafa Mohamed
Mohsen
18 Hours

39
CAST 614 – Advanced Network Defense
Center for Advanced Security Training

Course Description Course Outline

• Firewalls
CAST 614 is an advanced course offering you the opportunity to deep dive into the crucial practical
aspects of enterprise network security. • Advanced Filtering

It covers fundamental areas of fortifying your defenses by discovering methods of developing a secure • Firewall Configuration
baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy
for a fortified perimeter is denied, the course moves on to defending against the sophisticated malware • Hardening: Establishing a Secure Baseline
that is on the rise today, and the importance of live memory analysis and real time monitoring.
• Intrusion Detection and Prevention

• Protecting Web Applications

Key Outcomes Exam Information • Memory Analysis

• Endpoint Protection
• Stage a strong defense against popular • Exam Title: CAST 614 - Advanced Network
security threats Defense • Securing an Enterprise

• Fortify your organization with a good • Number of Questions: 50 (Written) and 10


foundation of risk protection methods (Practical)
• Duration: 90 minutes (Written) and 60
• Apply latest references and guidance on minutes (Practical)
best practices in the field of cybersecurity
• Availability: ECC Exam Portal
• Secure your enterprise architecture from • Passing Score: Written Exam (60%) and
a medium threat level and build towards Practical Exam (70%)
more sophisticated threats

40
TM

Disaster
EC-Council Recovery
Professional EC-Council Disaster Recovery Professional (EDRP)

Course Description Course Outline

• Introduction to Disaster Recovery and


Business Continuity
The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate
failure risks for an organization. It also provides the networking professional a foundation in disaster • Business Continuity Management (BCM)
recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the
enterprise, development of policies and procedures, an understanding of the roles and relationships of • Risk Assessment
various members of an organization, implementation of a plan, and recovering from a disaster. • Business Impact Analysis (BIA)

• Business Continuity Planning (BCP)

• Data Backup Strategies

Key Outcomes Exam Information • Data Recovery Strategies

• Virtualization-Based Disaster Recovery


• Introduction to business continuity, risk • Exam Title: EC-Council Disaster Recovery • System Recovery
management, and disaster recovery Professional
• Centralized and Decentralized System
• Disasters and emergency management, and • Exam Code: 312-76 Recovery
applicable regulations
• Number of Questions: 150
• Disaster Recovery Planning Process
• DR planning process, preparation, recovery
of systems and facilities • Duration: 4 hours
• BCP Testing, Maintenance, and Training
• Incident response and liaison with public • Availability: ECC Exam Portal
services and regulatory bodies • Test Format: Multiple Choice
• Exposure to various services from • Passing Score: 70%
government and other entities

41
Certified Chief Information Security Officer (C|CISO)

Course Description Domains


Course Outline

• Governance
The C|CISO certification is an industry-leading program that recognizes the real-world experience necessary
to succeed at the highest executive levels of information security. Bringing together all the components • Security Risk Management, Controls, &
required for a C-Level positions, the C|CISO program combines audit management, governance, IS controls, Audit Management
human capital management, strategic program development, and the financial expertise vital for leading a
highly successful IS program. • Security Program Management &
Operations
The C|CISO Training Program can be the key to a successful transition to the highest ranks of information
• Information Security Core Competencies
security management.
• Strategic Planning, Finance, & Vendor
Management

Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information

• Establishes the role of CISO and models for • Number of Questions: 150
governance • Duration: 2.5 hours
• Core concepts of information security • Test Format: Multiple Choice
controls, risk management, and compliance

• Builds foundation for leadership through


strategic planning, program management,
and vendor management

42
Learning Track
EXECUTIVE LEADERSHIP
TM

C CISO
Executive
Certified Chief Information Security Officer

VULNERABILITY INCIDENT
NETWORK APPLICATION
ASSESSMENT & HANDLING &
DEFENSE SECURITY
PEN TESTING RESPONSE

INDUSTRIAL CONTROL
SYSTEMS & SUPERVISORY
CONTROL AND DATA
ACQUISITION

ICS / SCADA
IOT
DEVSECOPS

C IP
Certified IoT Professional
E CDE
EC-Council Certified DevSecOps Engineer

Specializations THREAT
INTELLIGENCE DISASTER RECOVERY BLOCKCHAIN

C BP
TM

C P ENT
Disaster
EC-Council Recovery
Certified Penetration Testing Professional
Professional Certified Blockchain Professional

Cybersecurity
Professionals
CLOUD SECURITY INCIDENT RESPONSE
WEP APP HACKING TM

TM

C CSE
Certified Cloud Security Engineer
ECIH
EC-Council Certifie Incident Handler

DIGITAL FORENSICS
SOC ANALYST TM

C HFI
Computer Hacking Forensic
INVESTIGATOR

ETHICAL HACKING NETWORK DEFENSE


TM

Core C ND
Certified Network Defender

CYBER TECHNICIAN

Cyber Technician C CT
Certified Cybersecurity Technician

ESSENTIALS SERIES SECURITY SPECIALIST

Cyber Essentials
TM
TM

N DE E HE D F E
Network Defense Essentials Ethical Hacking Essentials Digital Forensics Essentials

Cybersecurity Phishing
Awareness Awareness

Knowledge Workers Knowledge Workers


TM

C SCU
Certified Secure Computer User

ENCRYPTION
TM

Individual Courses E CES


EC-Council Certified Encryption Specialist
Browse a catalog of over 10,000 courses
43
OhPhish
War ning Syst em For Cyber Canopy

Course Description OhPhish


Course Outline
Solutions

OhPhish portal imitates real-world phishing scenarios. The platform equips employees with the most • Email Phishing
efficient solutions and products to combat phishing attacks and prevent data breaches. It caters to
• Vishing
the need for businesses by creating a safe working environment from Phishing, Smishing, and Vishing
attacks. OhPhish integrates e-Learning and gamification modules in a Learning Management System • Smishing
(LMS), helping employees to stay aware of phishing attacks.
• Spear Phishing

Key
KeyOutcomes
Outcomes Exam Information

• Builds a user-friendly cybersecurity awareness training solution

• Maintains “Active Directory” to launch comprehensively laid out phishing templates

• Generates extensive reports in PDF and Excel formats

• Tracks real-time updates with snapshots (availability on Mobile Applications)

• Identifies trends based on user, department, and other critical demographic

44
Why CodeRed:

Courses built
Unlimited Courses are
by world-class More than 40%
access to a aligned to
Code Red Subscription/ library of 100s
experts and
current job
of the courses
cybersecurity are hands-on
EC-Council Micro-degrees: of courses
influencers
hiring trends
Course Description Course Outline
CodeRed is a continuous learning
platform designed for Busy Cyber
professionals - offering them
content rich courses created by
worlds’ leading cybersecurity
certification provide EC-Council Microdegrees

Python Security Cloud Security PHP Security


Microdegree Microdegree Microsecurity

Master advanced cybersecurity skills with the modern flexibility of self-paced learning
and practical hands-on labs. EC-Council’s Microdegree offers a unique form of learning
Key Outcomes Exam that
experience Information
encourages a learner to acquire specialized skill sets in a relatively short
amount of time. The MicroDegree engages the learner in over 200 hours of
comprehensive deep-dive, hands-on learning experience, enabling them to excel in
their career.

What’s Included:

Practical Video Learning


Official Course Manual Cyber Range
Content

Lab Manuals Assessments/Quiz Proctored Exam

4536
Bachelor of Science in Cyber Security (BSCS)
ACCREDITED. FLEXIBLE. ONLINE.

Program
Course Description
Description Courses
Course Outline

• CIS 300 Fundamentals of Information Systems


Security
• CIS 301 Legal Issues in Cyber Security
The Bachelor of Science in Cyber Security (BSCS) prepares students the knowledge for careers in cyber • CIS 302 Managing Risk in Information Systems
• CIS 303 Security Policies and Implementation
security and assurance. The program consists of topical areas dealing with computer security management,
Issues
incident response, and security threat assessment, etc.
• CIS 304 Auditing IT Infrastructures for
Compliance
• CIS 308 Access Control
• CIS 401 Security Strategies in Windows
Platforms and Applications
• CIS 402 Security Strategies in Linux Platforms
and Applications
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information • CIS 403 Network Security, Firewalls, and VPNs
• CIS 404 Hacker Techniques, Tools, and Incident
Handling
• Application of technical strategies, tools and • Completion of 60 credit hours of 300/400 • CIS 405 Internet Security: How to Defend
techniques to provide security for information level courses in which the candidate earned a
systems. cumulative GPA of 2.0 or better. Against Online Attackers
• CIS 406 System Forensics, Investigation, and
• Adherence to a high standard of ethical behavior. • Completion of 120 + total semester credit hours Response
including all transfer credit awarded. • CIS 407 Cyberwarfare
• Use of research in both established venues and
innovative applications to better provide risk • Satisfactory completion of the summative • CIS 408 Wireless and Mobile Device Security
assessment, policy updates and security for capstone course. • CIS 410 Capstone Course
established enterprise systems. • COM 340 Communication and Technical
• All degree requirements must be completed Writing
• Understanding the importance of critical within one and a half times the program length
thinking to creatively and systematically solve as measured by maintaining a cumulative • MTH 350 Introduction to Statistics
the problems within the parameters of existing course completion rate of 67% of course • PSY 360 Social Psychology
information systems. work from the first term the student enrolls • BIS 430 Ethics for the Business Professional
in the University and begins the program to • ECN 440 Principles of Microeconomics
• Achieve the competency skills needed to fulfill graduation. • MGT 450 Introduction to Project Management
position requirements in the cyber security field.

46
Graduate Certificate Programs
ACCREDITED. FLEXIBLE. ONLINE.

Course
ProgramDescription
Description Course
CoursesOutline

EC-Council University’s Graduate Certificate Program focuses on the competencies necessary • Information Security Professional
for information assurance professionals to become managers, directors, and CIOs. Students will • Managing Secure Networks (C|ND)
experience not only specialized technical training in a variety of IT security areas, but will also acquire • Ethical Hacking and Countermeasures (C|EH)
an understanding of organizational structure and behavior, the skills to work within and across that • Research and Writing for the IT Practitioner
organizational structure, and the ability to analyze and navigate its hierarchy successfully. Each • Security Analyst
certificate targets skills and understandings specific to particular roles in the IT security framework of an • Security analyst and vulnerability assessment
organization. The certificates can be taken singly or as a progressive set of five, each building on the one (ECSA)
before it to move students from IT practitioner skill levels to IT executive skill levels. • Conducting Penetration and Security Tests
(LPT-Master)
• Securing Wireless Networks
• Cloud Security Architect (Any 3 of the 4 courses
Key Outcomes
Graduate Certificates ExamInformation
Exam Information below)
• Secure Programming
• Advanced Network Defense
• Information Security Professional • Completion of mandated credit hours of • Advanced Mobile Forensics or
courses in which the candidate earned a • Designing and Implementing Cloud Security
• Security Analyst cumulative GPA or 3.0 or better • Incident Management and Business Continuity
• Cloud Security Architect • All certificate requirements must be • Beyond Business Continuity
completed within one and a half times • Disaster Recovery (EDRP)
• Incident Management and Business
the program length as measured • Incident Handling and Response (ECIH)
Continuity
by maintaining a cumulative course • Executive Leadership in Information
• Executive Leadership in Information competition rates of 67% of course work Assurance
Assurance from the first term the student enrolls in the • Global Business Leadership
University and begins the program to the • Project Management
last course needed. • Executive Governance and Management
(CCISO)

47
Master of Science in Cyber Security (MSCS)
ACCREDITED. FLEXIBLE. ONLINE.

Program
Course Description
Description Courses
Course Outline

• ECCU 500 Managing Secure Network Systems

The Master of Science in Cyber Security (MSCS) Program prepares information technology professionals • MGMT 502 Business Essentials
• ECCU 501 Ethical Hacking & Countermeasures
for careers in cyber security and assurance. The program consists of topical areas dealing with computer
• ECCU 502 Investigating Network Intrusions and Computer
security management, incident response, and cyber security threat assessment, which require students to Forensics
be the creators of knowledge and inventors of cyber security processes, not merely users of information. • ECCU 503 Security Analysis and Vulnerability Assessment
Additionally, students will receive instruction in leadership and management in preparation for becoming • ECCU 504 Foundations of Organizational Behavior for the
cyber security leaders, managers, and directors. IT Practitioner
• ECCU 505 Introduction to Research and Writing for the IT
Practitioner
• ECCU 506 Conducting Penetration and Security Tests
• ECCU 507 Linux Networking and Security
• ECCU 509 Securing Wireless Networks
Key
KeyOutcomes
Outcomes Exam
ExamInformation
Information • ECCU 510 Secure Programming
• ECCU 511 Global Business Leadership
• ECCU 512 Beyond Business Continuity: Managing
Organizational Change
• Application of cyber security technical strategies, • Completion of thirty-six (36) credits of 500 • ECCU 513 Disaster Recovery
tools, and techniques to secure data and level courses in which the candidate earned • ECCU 514 Quantum Leadership
information for a customer or client a cumulative GPA of 3.0 or better • ECCU 515 Project Management in IT Security
• Adherence to a high standard of cyber security
ethical behavior • ECCU 516 The Hacker Mind: Profiling the IT Criminal
• Satisfactory completion of the summative • ECCU 517 Cyber Law
• Use of research in both established venues and
innovative applications to expand the body of capstone course • ECCU 518 Special Topics
knowledge in cyber security • ECCU 519 Capstone
• Application of principles of critical thinking to • All degree requirements must be completed
• ECCU 520 Advanced Network Defense
creatively and systematically solve the problems within one and a half times the program • ECCU 521 Advanced Mobile Forensics and Security
and meet the challenges of the everchanging length or have a cumulative course • ECCU 522 Incident Handling and Response
environments of cyber security completion rate of 67% of coursework • ECCU 523 Executive Governance Management
• Mastery of the skills necessary to move into cyber from the date the student enrolls in the • ECCU 524 Designing and Implementing Cloud Security
security leadership roles in companies, agencies,
University and begins the program. • ECCU 525 Securing Cloud Platforms
divisions, or departments

48
Course Description Course Outline

Global Experts,
Local Delivery.
Key Outcomes
Experience Exam
high-quality, affordable, hands-on Information
cybersecurity
training in a premium classroom setting.

Masterclass training brings globally renowned cybersecurity


training and credentialing to your locality, delivered by
EC-Council’s Master Trainers.

Access the Masterclass


Global Training Calendar

40
Course Description Course Outline

Key Outcomes Exam Information

w w w.e ccouncil.org

You might also like