Preview the Latest Certification Training from EC-Council. For FREE.

Register today for a free 3-hour overview including live lab demonstrations (where applicable) to experience the instruction and content delivered in a full course. Take advantage of this opportunity to preview the industry leading curriculum from EC-Council. Each session in our free series of First Look events is delivered by an EC-Council Certified Master Instructor.


Certified Incident Handler (ECIH)

Course Overview: Attend this 3 hour First Look at EC-Council’s CIH course and be treated to a technical, deep-dive webinar that covers the most popular modules in CIH complete with live lab demonstrations! Come experience this deep-dive virtual event and learn: How to combat different types of cybersecurity threats, attack vectors, threat actors and their motives, how to identify the signs of an incident, and how to apply the right techniques to different types of cybersecurity incidents. You'll also learn about the anti-forensics techniques used by attackers to find cybersecurity incident cover-ups. This webinar will be delivered by EC-Council Certified Master Instructor Kevin King!

  • Check back soon for upcoming dates.

Certified SOC Analyst (CSA)

Course Overview:Attend this 3 hour First Look at EC-Council’s CSA course and be treated to a technical, deep-dive webinar that covers the most popular modules in CSA complete with live lab demonstrations! Come experience this virtual event and get an overview of the CSA modules: 1. Security Operations and Management, 2. Understanding Cyber Threats, IoCs, and Attack Methodology, 3. Incidents, Events, and Logging, 4. Incident Detection with Security Information and Event Management (SIEM), 5. Enhanced Incident Detection with Threat Intelligence, 6. Incident Response. This webinar will be delivered by EC-Council Certified Master Instructor Kevin King!

Please use site code UTC when registering for your free First Look session.


Chief Information Security Officer (CCISO)

Course Overview: This CCISO First Look will cover some of the most important topics in each CCISO Domain: Governance and Risk Management, Information Security Controls, Compliance, and Audit Management, Security Program Management & Operations, Information Security Core Competencies, Strategic Planning, Finance, Procurement, and Vendor Management, and much more.

Please use site code UTC when registering for your free First Look session.


Certified Ethical Hacker (CEH)

Course Overview: Register for this deep-dive virtual event and learn the tactics and techniques of Certified Ethical Hackers (CEHs) from the point of gaining access using multiple exploitation techniques and leveraging weaknesses in web applications and databases. In this fast-paced, comprehensive deep dive you will be introduced to methods of hiding information to include Steganography and the OWASP Top 10 attacks including attacking databases using SQL injection and gaining system-level access to networks.

Please use site code UTC when registering for your free First Look session.


Computer Hacking Forensic Investigator (CHFI)

Course Overview: Attend this 3 hour First Look at EC-Council’s CHFI course and be treated to a technical, deep-dive webinar that covers the most popular modules in CHFI complete with live lab demonstrations! Come experience this deep-dive virtual event and get a first look at the following CHFI modules: Operating System Forensics - Understand how to collect and examine volatile and non-volatile data in Windows machine, Discovering and Extracting Hidden Forensic Material on Computers, Extracting Information about Loaded Processes, Malware Forensics - Perform Static and Dynamic malware analysis, Perform Static Analysis of a Suspicious File, and Dynamic Malware Analysis. This webinar will be delivered by EC-Council Certified Master Instructor Eric Reed!

Please use site code UTC when registering for your free First Look session.


Certified Network Defender (CND)

Course Overview: Register for this deep-dive virtual event and get an overview on the following CND modules: Network security controls, protocols, and devices, IDS/IPS sensors, tuning IDS for false positives and false negatives, and configurations to hardening security through IDPS technologies, wireless network threats and learn how to mitigate them, monitoring and conducting signature analysis to detect various types of attacks and policy violation activities, risk assessment and vulnerability assessment and scanning, hardening the security of various hosts individually in the organization’s network, and much more.

Please use site code UTC when registering for your free First Look session.


Do You Have More Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with United Training