Pick your Iverson classes - Course dates now available

EC Council

Other Courses
Course Title Course Code
Core
Certified Network Defender ECND
Certified Ethical Hacker CEH
EC-Council Certified Security Analyst/Licensed Penetration Tester ECSA/LPT
Fundamentals
EC-Council Certified Encryption Specialist ECES
EC-Council Certified Security Specialist ECSS
Management
Certified Chief Information Security Officer CCISO
Security Awareness
Certified Secure Computer User CSCU
Specialist
Computer Hacking Forensic Investigator V8 CHFI
EC-Council Certified Incident Handler ECIH
EC-Council Certified Secure Programmer - .NET ECSP.NET
EC-Council Certified Secure Programmer - Java ECSP.JAVA
EC-Council Disaster Recovery Professional EDRP
EC-Council VOIP Professional ECVP
Project Management PM
Project Management in IT Security PMITSH
 

Certified Network Defender
CND is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys. The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current
network security technologies and operations.

Certified Ethical Hacker
CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real-time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Unlike other theoretical trainings, you will be immersed in interactive sessions and there will be hands-on lab. You can explore the newly gained knowledge right away in your classroom by trying to test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience of the current essential security systems.

EC-Council Certified Security Analyst
The ECSA penetration testing course provides you with a real-world, hands-on penetration testing experience. It is a globally accepted hacking and penetration testing benchmark that covers the testing of modern infrastructures, operating systems and application environments. It also equips the students with the knowledge of writing a penetration testing report The ECSA pen test program takes the tools and techniques you learned in the Certified Ethical Hacker course (CEH), and elevates your abilities by teaching you how to apply the skills learned in the CEH by utilizing EC-Council’s published penetration testing methodology.

Certified Secure Computer User
CSCU delivers computer security awareness to individuals who use computer and Internet at home, school, or office. The purpose of the CSCU training program is to provide the students with the knowledge and necessary skills to guard information assets. This class will immerse the students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, email hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering.

Computer Hacking Forensic Investigator
This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.

EC-Council Certified Incident Handler
The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policies related to incident handling. After attending this course, they will be able to create incident handling and response policies as well as deal with various types of computer security incidents.

EC-Council Certified Secure Programmer .Net
This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications. The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development lifecycle to improve the overall quality of products and applications.

EC-Council Certified Secure Programmer Java
ECSP Java is comprehensive course that provides hands-on training covering Java security features, policies, strength, and weakness. It helps developers understand how to write secure and robust Java applications and provides advanced knowledge in various aspects of secure Java development that can effectively prevent hostile and buggy code. The end result of security Java coding practices include saving valuable effort, money, time, and possibly the reputation of organization using Java coded applications.

EC-Council Disaster Recovery Professional
This course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster.

ENQUIRE NOW  

What they say

Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu.

The Man
Company

Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu.

The Man
Company


CodeCourse TitleExam CodeDurations (Days)Fees (RM)Schedule
CEH Ethical Hacking and Countermeasures 312-50 5 7345.8 Schedule
CHFI Computer Hacking Forensic Investigator V8 312-49 5 6762.8 Schedule
ECES EC-Council Certified Encryption Specialist 212-81 3 5247 Schedule
ECIH EC-Council Certified Incident Handler 212-89 2 3731.2 Schedule
ECSP.NET EC-Council Certified Secure Programmer 312-93 3 5247 Schedule
ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration Tester 412-79 5 8978.2 Schedule
ECVP EC-Council VOIP Professional 312-78 5 6296.4 Schedule
EDRP EC-Council Disaster Recovery Professional 312-76 5 5247 Schedule
ECND EC-Council Certified Network Security Defender 312-38 5 5247 Schedule
CSCU Certified Secure Computer User 112-12 2 1749 Schedule
ECSS EC-Council Certified Security Specialist ECSS 2 3731.2 Schedule
PM Project Management 212-79 3 3381.4 Schedule
PMITS Project Management in IT Security 212-38 2 3381.4 Schedule

* Price displayed is inclusive 6% GST
Online Enquiry
Course Enrollment Form
Exam Registration