EC-Council has certified over 200,000 security professionals. Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM, and the United Nations.
Unlimited 12 months access
The ideal method of studying
Audio, Video & Printable format
Can be supported from home
Direct payment or 0% Finance
Unlimited 12 months
The ideal method of studying
Audio, Video & printable format
Can be supported from home
Direct payment or 0% Finance
Certified Network Defender (CND)
Learn how to defend your network from attacks.
View More
Certified Ethical Hacker (CEH)
To master the hacking technologies, you will need to become one, but an ethical one.
View More
Certified Threat Intelligence Analyst (CTIA)
Learn to prepare and run a threat intelligence programmes to set up defense mechanisms.
View More
Certified Chief Information Security Officer (CCISO)
Industry-leading program that recognizes the real-world experience of information security.
View More
EC Council Certified Incident Handler(ECIH)
Prepare security policies and plans to tackle incidents with efficacy in time-constrained scenarios in order to reduce the impact of incidents.
View More
Computer Hacking Forensic Investigator(CHFI)
Identify an intruder’s footprints and to properly gather the necessary evidence to prosecute in the court of law.
View More
Certified Secure Computer User(CSCU)
Learn the skills needed in the domain of security and networking.
View More
Certified Security Analyst (ECSA)
Want to become a security professional? Learn our penetration testing methodology.
View More
EC Council Certified Disaster Recovery (EDRP)
Plan, strategize, implement, and maintain business continuity during a disaster and plan recovery.
View More
Certified Application Security Engineer (CASE JAVA)
View More
Certified Blockchain Professional (CBP)
The Certified Blockchain Professional Course has been developed to help professionals gain the expertise they need in blockchain technology to recognise its impact on businesses.
View More
Dark Web Forensics Deep Dive
This in-depth course on Dark Web Forensics is of great value to those aspiring to or already working in the cyber-security field.
View More
Malware And Memory Forensics Deep Dive
Learn how to use a variety of complex analytics techniques to analyse malware and suspected malware.
View More
Risk Management Approach And Practices
Gain a clear understanding of risk management frameworks, concepts and implementation of a risk management strategy within an IS system.
View More
Mobile Forensics Deep Dive
This course focuses on the essentials of different mobile networks including iOS and Android.
View More