Professional Documents
Culture Documents
org
Table of Contents
02
Who We Are
The EC-Council group is made up of several entities standards for information security professionals. Science in Cyber Security, Master of Science in
that all help serve the same goal which is to create EC-Council recently received accreditation from the Cyber Security, and Graduate Certificate Program.
a better, safer cyber world through awareness and American National Standards Institute (ANSI). We EC-Council Global Services (EGS) is dedicated to
education. Our entities include International have so far certified over 2,00,000 professionals in helping organizations understand and manage
Council of eCommerce Consultants (EC-Council), various e-business and cyber security skills. their cyber-security risk posture effectively. EGS
iClass, EC-Council University, EC-Council Global specializes in helping clients make informed
Course
Services (EGS), Description
and EC-Council Conferences and iClass is EC-Councils direct certification training Courseto Outline
business decisions protect their organizations.
Events. program. iClass delivers EC-Council certification EGS has over 20 dedicated cyber security practice
courses through various training methodologies: areas informed by the best cyber security
EC-Council creates content (course materials and instructor-led at client facilities, synchronous practitioners, each of whom have dedicated their
exams) and certification delivered through our delivery through live, online instructor-led, and lives to defending organizations from
channel of authorized training centers which asynchronously through our streaming video cyber-attacks.
consists of over 700 partners representing over platform. iClass course videos can also be loaded
2,000 physical locations in more than 145 countries onto a mobile device, such as an iPad, and shipped EC-Councils Conference and Events Group is
across the globe. We are the owner and developer to a client location. responsible for planning, organizing, and running
of the world-famous E-Council Certified Ethical conferences throughout the globe. TakeDownCon
Hacker (CEH), EC-Council Computer Hacking and Hacker Halted are IT security conferences that
Forensics Investigator (CHFI), EC-Council Certified bring world renowned speakers together for
Security Analyst (ECSA), and EC-Council License keynotes, panels, debates, and breakout sessions.
Penetration Tester (LPT) programs. Our lives are dedicated to the Conferences have been run in Dallas, Las Vegas, St.
Louis, Huntsville, Maryland, Connecticut, Myrtle
Our certification programs are recognized mitigation and remediation Beach, Miami, Atlanta, Iceland, Hong Kong, Egypt,
Key Outcomes
worldwide and have received endorsements from
Exam Information
of the cyber plague that is Singapore, and Kuala Lumpur.
various government agencies, including the United menacing the world today
States Federal Government (via the Montgomery GI Other events include CISO Summits, Global CISO
Bill), the National Security Agency (NSA), and the Forums, and Executive Cocktail Receptions where
Committee on National Security Systems (CNSS). Jay Bavisi EC-Council brings speakers and content to
All these reputed organizations have certified President & CEO executive level IT Security Professionals.
EC-Councils Certified Ethical Hacking (CEH), EC-Council
EC-Council Network Security Administrator (ENSA), The Global Cyberlympics competition is a capture
EC-Council Computer Hacking Forensics the flag type competition with approximately
Investigator (CHFI), EC-Council Disaster Recovery 1,000 global participants. EC-Council brings the
Professional (EDRP), EC-Council Certified Security hackers together online for preliminary elimination
Analyst (ECSA) and EC-Council Licensed rounds and then brings the top two teams (6-8
Penetration Tester (LPT) programs for meeting the EC-Council University is a DEAC accredited players per team) from each region to compete in
4011, 4012, 4013A, 4014, 4015 and 4016 training university offering programs such as Bachelor of the final head-to-head competition.
03
EC-Council Uni-Aid - Dont stop learning
EC-Council
EC-Council
04
EC-Council at a Glance
EC-Council Group is a multidisciplinary institution of global Information Security professional services.
EC-Council Group is a dedicated Information Security organization that aims at creating knowledge, facilitating innovation, executing research, implementing
development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Some of the finest organizations around the world such as the US Army, US Navy, DoD, the FBI, Microsoft, IBM, and the United Nations have trusted EC-Council to develop
and advance their security infrastructure.
Course Description Course Outline
05
Your Learning Options
Instructor-led Training
EC-Council has a large network of enterprise teams spread across 145 countries. Each center has a certified trainer to deliver the entire EC-Council program from a training facility in your
city.
Online Learning
iLearn online training is a distance learning program designed for those who cannot attend a live course. The program is for the people who have a very busy schedule and want to learn at their own
pace through self-study. This modality is also available from our enterprise teams.
Mobile Learning
Our world class content is also available on a mobile device, allowing our students to learn on the go. This program is designed for those who are cannot attend a live course, but are keen to improve
their cyber security skills. This modality is also available from our enterprise teams.
Computer-based Training
For people who work in secure facilities with limited or no access to the internet, we o er computer-based training (CBT) options delivered in an HD DVD format. The DVDs are an upgrade/add-on to the
base iLearn program and are not sold independently. This modality is also available from our enterprise teams.
Customized Learning
Love a course we offer, but want it customized? No problem! EC-Council has a dedicated team to cater to your needs. We have access to the largest pool of EC-Council certified instructors and enterprise
teams. Let us know where and when you want the training delivered, and we will arrange for an instructor and all thats required for a course to be taught at a location of your choice. Contact our
network of enterprise teams for a custom solution. EC-Council client-site training includes official courseware, certification exam (Prometric or VUE), iLabs, online labs (wherever available), and our
test-pass guarantee.
06
Foundation Track
Network Security
Target
FNS Fundamentals Audience
Course
CSCU Description
Certified Secure
FIS Information Security
Fundamentals ECSS
EC-Council Certified
Security Specialist
Course Outline
112-12 Computer User
This course is specifically designed
for todays computer users who
Computer Forensics
CFF Fundamentals use the internet extensively to
work, study and play.
Mac
...
Disaster Credit Card Monitoring Kids Wireless & Home
Internet Security OS Security
Recovery Security Online Network Security
07
Course Description Course Outline
08
Job
Roles
...
09
Course Description Course Outline
...
10
Job
Roles
...
11
Domain
Strategic Planning,
5 1 Domain
Job
Roles
Finance, & Vendor Governance
Course Description
Management Course Outline
- Information Security (IS) Director
- Information Assurance (IA) Program
Manager
2
TM
4 C CISO
Domain
Domain
3
- Information Security
Professional
Domain - Information Analyst
- Information Technology
Security Program Analyst
- Disaster Recovery
Management & Operations
- Digital Forensics
12
C SCU
Certified Secure Computer User
Certified Secure Computer User (CSCU)
Introduction to security
CSCU provides individuals with the necessary knowledge and skills to protect their information assets. Securing operating systems
This course covers fundamentals of various computer and network security threats such as identity theft, Malware and antivirus
credit card fraud, phishing, virus and backdoors, emails hoaxes, loss of confidential information, hacking
attacks, and social engineering. Internet security
13
C ND
Certified Network Defender
Certified Network Defender (CND)
14
TM
C EH
Certified Ethical Hacker
Certified Ethical Hacker (CEH)
15
TM
E C SA
EC-Council Certified Security Analyst
EC-Council Certified Security Analyst (ECSA)
16
TM
ECIH
EC-Council Certified Incident Handler
EC-Council Certified Incident Handler (ECIH)
17
TM
C HFI
Computer Hacking Forensic
INVESTIGATOR
Computer Hacking and Forensic Investigator (CHFI)
Network forensics
Cloud forensics
Comprehensive forensics investigation Number of Questions: 150 Malware forensics
process Passing Score: 70%
Forensics of file systems, operating systems, Investigating email crimes
Test Duration: 4 hours
network and database, websites, and email Mobile forensics
systems Test Format: Multiple choice
Techniques for investigating on cloud, Test Delivery: ECC exam portal Forensics report writing and presentation
malware, and mobile Data Acquisition and Duplication
Data acquisition and analysis as well as
anti-forensic techniques
Thorough understanding of chain of custody,
forensic report, and presentation
18
TM
E C S P JAVA
EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer (ECSP) Java
19
EC-Council Certified Secure Programmer (ECSP) .Net
20
TM
L PT
Licensed Penetration Tester (Master)
EC-Council Licensed Penetration Tester (LPT) Master
Ability to perform repeatable methodology Test format: Multiple choice Mark Horvat
Commitment to code of ethics Test delivery: ECC exam portal
The ECSA program also gave me the correct
professional experience in how to interact with my
Ability to present analysed results through customers in a professional manner before, during,
structured reports and after completing my service to them.
Moustafa Mohamed
Mohsen
21
CAST 611 - Advanced Penetration Testing
Center for Advanced Security Training
Scanning
The CAST 611 Advanced Penetration Testing is a specialized training program covering key information
security domains, at an advanced level. Students completing this course will gain in-depth knowledge Enumeration
about information gathering, scanning, enumeration, exploitation and post exploitation, data analysis and
reporting, and a number of advanced techniques. Vulnerability analysis
Exploitation
Post exploitation
Advanced techniques
Key Outcomes Exam Information Data analysis and reporting
75 minutes
Complemented with Cyber Ranges that
progresses in difficulty and reflect an Open book, note and access to range is
enterprise level architecture, with defenses allowed during the test
to defeat and challenges to overcome
70% minimum required to pass
Exposure to evasion techniques
22
CAST 612 Advanced Mobile Forensics and Security
Center for Advanced Security Training
23
CAST 613 Hacking and Hardening Corporate Web Apps
Center for Advanced Security Training
Cryptography decryption
Account management
The CAST 613 Hacking and Hardening Corporate Web Apps is a course designed with the average
security unaware programmer in mind. The course is designed with more than 50% involving hands- Parameter diddling
on coding labs. The ideal participant should have a development background, coding, or architecting
Transport layer protection
background either currently or previously.
Cross site scripting
Cookies
24
CAST 614 Advanced Network Defense
Center for Advanced Security Training
Firewalls
Advanced filtering
The CAST 614 Advanced Network Defense will enable you to evaluate advanced hacking methods
of defense fortification, bringing you closer to establishing perfect security best practices and
Firewall configuration
methodologies you can apply to secure environments. It will cover fundamental areas of fortifying
your defenses by discovering methods of developing a secure baseline and hardening your enterprise Hardening: establishing a secure baseline
architecture from the most advanced attacks.
Intrusion detection and prevention
Endpoint protection
Get introduced to concepts of advanced Onsite workshop
firewall controls and hardening of systems Securing wireless
25
CAST 616 Securing Windows Infrastructure
Center for Advanced Security Training
Organizational security
Key aspects of Windows infrastructure Three-day technical workshop
security
26
TM
Disaster
EC-Council Recovery EC-Council Disaster Recovery Professional (EDRP)
Professional
27
TM
C CISO
Certified Chief Information Security Officer
Certified Chief Information Security Officer (C|CISO)
Governance
The C|CISO certification is an industry-leading program that recognizes the real-world experience necessary
to succeed at the highest executive levels of information security. Bringing together all the components Security risk management, controls, and
required for a C-Level positions, the C|CISO program combines audit management, governance, IS controls, audit management
human capital management, strategic program development, and the financial expertise vital for leading a
highly successful IS program. Security program management and
operations
The C|CISO Training Program can be the key to a successful transition to the highest ranks of information
Information security core concepts
security management.
Strategic planning, finance, and vendor
management
Establishes the role of CISO and models for Exam Format : Multiple Choice
governance Total number of questions : 150
Core concepts of information security Exam duration : 2.5 Hours
controls, risk management, and compliance Required passing score : 72%
Builds foundation for leadership through
strategic planning, program management,
and vendor management
28
Bachelor of Science in Cyber Security (BSCS)
ACCREDITED. FLEXIBLE. ONLINE.
29
Graduate Certificate Programs
ACCREDITED. FLEXIBLE. ONLINE.
EC-Council Universitys Graduate Certificate Program focuses on the competencies necessary Information security professional
for information assurance professionals to become managers, directors, and CIOs. Students will
experience not only specialized technical training in a variety of IT security areas, but will also acquire ECCU 500 Managing secure network
an understanding of organizational structure and behavior, the skills to work within and across that systems
organizational structure, and the ability to analyze and navigate its hierarchy successfully. Each certificate ECCU 501 Ethical hacking and
targets skills and understandings specific to particular roles in the IT security framework of an organization. Countermeasures
The certificates can be taken singly or as a progressive set of five, each building on the one before it to
move students from IT practitioner skill levels to IT executive skill levels. ECCU 505 Research and writing for the
IT practitioner
Digital forensics
Key Outcomes Exam Information
Certificate Requirements Disaster recovery
Ethical practice
30
Master of Science in Cyber Security (MSS)
ACCREDITED. FLEXIBLE. ONLINE.
31
Course Description Course Outline
w w w.e ccouncil.org
32