800.500.3135
Cart
Find Training
Microsoft Technical Training
Microsoft Job Role Training
Microsoft Azure
Microsoft Dynamics
Microsoft Power Platform
Microsoft PowerShell
Microsoft Exchange
Microsoft Hyper-V
Microsoft 365
Microsoft Office
Microsoft Sharepoint
Microsoft SQL
Microsoft System Center
Microsoft Teams
Microsoft Windows 10
Microsoft Windows Server
Agile
Applications Infrastructure
Cloud
Data & Analytics
Programming
DevOps
ITIL
Tableau Training
Professional Development
Security
Virtualization
CompTIA
PMI
Scrum
Cisco
VMWare
EC-Council
Adobe
Citrix
RedHat
AWS
IBM
Browse Courses
Microsoft Authorized Courses
Special Offers
Topics
Agile
Application & Infrastructure
Cloud
Data & Analytics
Design Multimedia
Programming
DevOps
ITIL/ IT Service Management
Leadership & Prof. Dev.
Modern Workplace
Networking
Project Management
Security
Virtualization
Brands
Microsoft Technical
Microsoft Office
Microsoft Job Roles
CompTIA
ITIL
PMI
Scrum
Cisco
VMWare
EC-Council
Adobe
Citrix
RedHat
Agile
AWS
Tableau
DevOps
IBM
Microsoft Technical
Azure
Dynamics 365
Exchange
Microsoft 365
Power Platform
PowerShell
SharePoint
Teams
SQL Server
System Center
Visual Studio
Windows 10
Windows Server
Microsoft SATV
Microsoft Office
Access
Excel
Office 365
OneNote
Outlook
PowerApps
PowerPoint
Project
SharePoint
Teams
Visio
Word
Resources
Microsoft SATV
Army Credentialing
Grants
Ohio TechCred
LearnNow Live & OnDemand
LearnNow Live
LearnNow OnDemand
Learning Credits
Learning Methods
Blog
Webinars
About Us
Contact
A Letter from Our Founder
Student Login
Facebook Icon
Linkedin Icon
YouTube Icon
Search Button
Button
Search by Topic
Adobe
Acrobat
Captivate
Dreamweaver
Illustrator
InDesign
Photoshop
Service Management
Business Analysis
COBIT
ITIL
®
ITSM (IT Service Management)
Lean Six Sigma
QuickBooks
Tableau
Cisco
Cloud
Collaboration
Data Center
Enterprise
Security
Unified Contact Center
Wireless
Citrix
XenApp
XenDesktop
XenServer
NetScaler
CompTIA
A+
CASP+
Cloud+
Cloud Essentials+
CySA+
IT Fundamentals+
Linux+
Network+
PenTest+
Project+
Security+
Server+
Microsoft Technical
Azure
Dynamics & Power Apps
Exchange
Microsoft 365
Office 365
Power BI
PowerShell
SharePoint
Teams
SQL Server
System Center
Visual Studio
Windows 10
Windows Server
Office
Access
Excel
Office 365
OneNote
Outlook
PowerPoint
Project
SharePoint
Teams
Visio
Word
Power Apps
Professional Development
Workplace Fundamentals
Leadership & Professional Development
Brands
Amazon (AWS)
Checkpoint
Cloudera
DevOps
Crystal Reports
F5 Networks
Google
IBM
IT Management
Linux
Oracle
Red Hat
Salesforce
Tableau
VEEAM
Project Management
Agile
CAPM
®
Fundamentals
MS Project
PMP
®
PRINCE2
®
Project+
Risk Management
Scrum
Security
EC-Council
ISACA
(ISC)²
Internet of Things
NIST - NCSF
VMware
Horizon
NSX
vRealize
vSAN
vSphere
Search Courses
Search
Course Search Results for:
ec council
Certified SOC Analyst (CSA)
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.
Course Details & Class Schedule
Certified Threat Intelligence Analyst (CTIA)
Do you possess an analytical mind? Is critical thinking a part of who you are? Then you’ve come to the right place. A Certified Threat Intelligence Analyst (CTIA) acts as a force multiplier for organizations looking to reinforce their cyber defense security measures. Threat intelligence is akin to what conventional intelligence agencies across the world engage in to perceive and neutralize threats before any harm can be done. As a certified threat intelligence analyst, you’ll be at the vanguard of your organization’s cybersecurity ecosystem, keeping a 360 degree vigil on existing and foreseen/unforeseen threats. The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks. Much like a ‘hunter-killer’ team, you’ll be deployed as a ‘Blue Team’ operative, tasked with threat identification, and asked to employ the tools at hand to thwart active and potential cyberattacks.
Course Details & Class Schedule
EC-Council
EC-Council Certified Application Security Engineer (CASE).NET
The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally. It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications on the market today. It is desired by software application engineers, analysts, testers globally, and respected by hiring authorities.
Course Details & Class Schedule
EC-Council
EC-Council Certified Chief Information Security Officer (C-CISO)
In this course, students will learn in-depth content in each of the 5 CCISO Domains
Course Details & Class Schedule
EC-Council
EC-Council Certified Ethical Hacker (CEH) v11
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
Course Details & Class Schedule
EC-Council
EC-Council Certified Network Defender (CND)
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.
Course Details & Class Schedule
EC-Council Certified Penetration Tester
EC-Council Certified Penetration Tester (CPENT)
EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
Course Details & Class Schedule
EC-Council
EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0
This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.
Course Details & Class Schedule