EC-Council iLearn On-Demand
EC-Council Official Courseware On Demand
This is a self-study training option for individuals wanting official EC-Council courses; it’s an alternative to our live, instructor-led training classes, these self-paced courses can be the right solution for seasoned professionals as well as those who are new to the industry.
On Demand is direct from EC-Council—the people who wrote the certifications! It includes high-quality video presentations, hands-on labs and knowledge checks.
Access Anywhere 24/7
Connect to your course any time and from anywhere via the internet. You will have access to your EC-Council On Demand course 24/7 over a 6 month period.
Save Time and Money
This high impact training costs less, reduces time out of the office plus saves the time and money you’d spend traveling to a center.
These are NOT online demonstration courses. You work hands-on with the real software—just as you would in our instructor-led classes in a live, real-time environment.
EC-Council On Demand Course List
Certified Network Defender (CND) is a vendor-neutral, hands-on, comprehensive network security certification training program. Is is a skills-based lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Inititive of Cybersecurity education framework presented by teh National Intiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DOD) job rolse for system/network administrators.
CEH provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed to the content presented in the CEH course-ware. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community
This computer forensics course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware, and specialized techniques. It is no longer a matter of "will your organization be compromised (hacked)?" but, rather, "when?"
EC-Council Certified Security Analyst, ECSA complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies.
EC-Council Secure Programmer .NET teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. The EC-Council CCISO Body of Knowledge covers all five of the CCISO Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats.
EC-Council's Core Concepts course is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security. Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training.