Facebook

EC-Council Courses

Most popular
Trending

All EC-Council Courses

EC-Council Online Training Courses - E-Learning



We found 5 courses available for you
See

Certified Threat Intelligence Analyst | CTIA eLearning

6 Lessons
24 hours
Intermediate

Course Description Certified Threat Intelligence Analyst (CTIA) is designed and …

Certified Incident Handler | CIH eLearning

9 Lessons
24 hours
All Levels

Course Description The EC-Council Certified Incident Handler (ECIH) program focuses …

Certified Penetration Testing Professional | CPENT eLearning

14 Lessons
24 hours
All Levels

Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …

Computer Hacking Forensic Investigator | CHFI eLearning

16 Lessons
24 hours
All Levels

Course Description The Computer Hacking Forensic Investigator (CHFI) course delivers …

What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Certified Encryption Specialist | ECES eLearning

5 Lessons
24 hours
Intermediate

Course Description The EC-Council Certified Encryption Specialist (ECES) program introduces …

What you'll learn
Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies