EC-Council

EC-Council Training Courses

As a chosen Training Partner of EC-Council, Icon IT provides high-quality cybersecurity technical certification training. The EC-Council courses are designed to enhance the skillset of security professionals by introducing innovative curriculums that teach you how to perceive your network from a hacker’s perspective, trace digital footprints through forensics, conduct penetration tests, and write secure code.

We offer training for every member of your security team and your end-user community to prevent and respond to your next cybersecurity incident effectively.

Cybersecurity Awareness Training

EC-Council Certified Secure Computer User (CSCU) v3

The CSCU program is designed to equip students with comprehensive knowledge and practical skills in computer, device, and network security. Focusing on the practical aspects of networking and security, this certification enables students to enhance their expertise and understanding in this field. Throughout the program, students will develop a fundamental understanding of various security issues, including identity theft, credit card fraud, online banking phishing scams, malware, loss of sensitive information, and social engineering. This certification serves as an excellent addition to educational programs for knowledge workers and end-users who aspire to become proficient and secure power users.

Cybersecurity Technician

EC-Council Certified Cybersecurity Technician (C|CT)

EC-Council’s C|CT certification offers a comprehensive and immersive learning experience, integrating critical thinking challenges and hands-on lab exercises to strengthen learning and skill development. Upon completion of the program, participants gain a robust grasp of cybersecurity principles and techniques, along with practical experience to thrive in real-world cybersecurity roles.

Core Skills and Ethical Hacking

EC-Council Certified Network Defender (CND)

The Certified Network Defender (CND) is a comprehensive, hands-on, instructor-led network security certification training program that is vendor-neutral. It is a lab-intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). Additionally, the course has been meticulously mapped to global job roles and responsibilities, as well as the Department of Defense (DoD) job roles for system and network administrators. The design and development of this course have been informed by extensive market research and surveys.

EC-Council Certified Ethical Hacker (CEH) v12

The CEH (Certified Ethical Hacker) certification offers a comprehensive understanding of ethical hacking phases, various attack vectors, and proactive countermeasures. It is designed to immerse individuals in the mindset and methodologies of hackers, empowering them to establish robust security infrastructure and effectively fend off potential threats. By identifying system weaknesses and vulnerabilities, organizations can enhance their security controls to mitigate the risk of potential incidents.

This certification provides a hands-on learning experience and a systematic approach across each ethical hacking domain and methodology. It enables individuals to demonstrate the knowledge and skills necessary to obtain the CEH credential. Through this certification, candidates will gain a fresh perspective on the responsibilities and measures essential for maintaining security.

EC-Council Ethical Hacking Essentials (EHE)

Ethical Hacking Essentials is a comprehensive cybersecurity course designed to provide a strong foundation in ethical hacking and penetration testing. It covers a wide range of computer and network security concepts, including threats and vulnerabilities, web application attacks, IoT and OT attacks, cloud computing, and pentesting fundamentals.

This course focuses on hands-on practical experience to equip learners with the skills necessary for a successful career in cybersecurity. To apply and challenge the newly acquired abilities, the course includes an exciting Capture the Flag (CTF) Exercise seamlessly integrated into the Capstone project. This CTF involves live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. Engaging in these exclusive hands-on, human-versus-machine CTF challenges will help you develop the essential proficiencies required for success in your cybersecurity professional role.

Incident Handling Training

EC-Council Certified Incident Handler (ECIH)

The EC-Council’s Certified Incident Handler program is designed to equip students with the knowledge, skills, and abilities required to effectively prepare for, respond to, and eliminate threats and threat actors in an incident. This comprehensive program covers the entire process of incident handling and response, incorporating hands-on labs that teach tactical procedures and techniques necessary to efficiently plan, record, triage, notify, and contain. Students will gain expertise in handling various types of incidents, conducting risk assessments, and understanding the laws and policies related to incident handling. Upon completion of the course, students will be proficient in creating IH&R policies and addressing different types of security incidents, including malware, email security, network security, web application security, cloud security, and insider threat-related incidents. Furthermore, the E|CIH (EC-Council Certified Incident Handler) program also delves into post-incident activities such as containment, eradication, evidence gathering, and forensic analysis, ultimately leading to prosecution or countermeasures to prevent the incident from reoccurring.

EC-Council Computer Hacking Forensics Investigator (CHFI) v10

The EC-Council’s Certified Hacking Forensic Investigator (CHFI) program is an extensive ANSI-accredited training that delivers vendor-neutral education in digital forensics. This hands-on program provides organizations with a deep understanding of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis. Additionally, the training encompasses Dark Web, IoT, and Cloud Forensics, ensuring a comprehensive grasp of the field. Participants will acquire knowledge of the tools and techniques essential for conducting digital investigations using advanced digital forensics technologies.

EC-Council Digital Forensics Essentials (DFE)

This course offers a thorough introduction to Computer Forensics Fundamentals and the Computer Forensics Investigation Process. Participants will explore a range of topics including Dark Web, Windows, Linux, and Malware Forensics, among others. The interactive labs integrated into the course guarantee that learners acquire essential hands-on experience vital for a career in digital forensics. To apply these newly acquired skills, participants will take part in an engaging Capture the Flag (CTF) Exercise seamlessly integrated into our Capstone project. The CTF incorporates live virtual machines, genuine software, and real networks, all within a secure and regulated sandbox environment. By participating in these immersive hands-on CTF challenges, participants will develop the practical proficiencies required for success in their cybersecurity professional role.

Network and Cloud Defense Training

EC-Council Certified Threat Intelligence Analyst (CTIA)

Are you someone with an analytical mind? If so, our Certified Threat Intelligence Analyst (CTIA) program is perfect for you. As a CTIA, you will serve as a crucial asset to organizations seeking to bolster their cybersecurity defenses. Similar to traditional intelligence agencies, threat intelligence involves identifying and neutralizing potential threats before they can cause harm.

In this role, you will be at the forefront of your organization’s cybersecurity efforts, maintaining a comprehensive watch over both existing and emerging threats. The CTIA program has been meticulously developed in partnership with cybersecurity and threat intelligence experts worldwide. Its primary objective is to assist organizations in recruiting skilled professionals in cyber intelligence who can effectively identify and mitigate business risks. By converting unknown internal and external threats into quantifiable entities, CTIAs can proactively thwart potential threats.

EC-Council Certified SOC Analyst (CSA)

The Certified SOC Analyst (CSA) program is an essential starting point for individuals looking to build a career in a security operations center (SOC). It is specifically designed to equip both current and aspiring Tier I and Tier II SOC analysts with the necessary skills to effectively handle entry-level and intermediate-level operations. This training and credentialing program provides candidates with valuable technical skills that are currently in high demand, delivered by experienced industry professionals. The program aims to open up new career opportunities by imparting comprehensive knowledge and enhanced capabilities, enabling participants to make meaningful contributions to a SOC team. Over the course of 3 intense days, the program covers the fundamentals of SOC operations, followed by detailed instruction on log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, participants will learn how to effectively manage various SOC processes and collaborate with CSIRT when necessary.

EC-Council Certified Cloud Security Engineer (CCSE)

The EC-Council’s Certified Cloud Security Engineer (C|CSE) course is a specialized program developed by cloud security professionals in collaboration with subject matter experts from around the world. It provides a hands-on learning certification course that offers a detailed and methodical approach to teaching the fundamental concepts of cloud security. By combining both vendor-neutral and vendor-specific cloud security concepts, the C|CSE program ensures a comprehensive learning experience. The vendor-neutral concepts emphasize universally applicable cloud security best practices, technologies, and frameworks, while the vendor-specific concepts focus on equipping individuals with practical skills for working with specific cloud platforms. This holistic approach aims to equip individuals with the knowledge and skills necessary to thrive in the field of cloud security.

EC-Council Threat Intelligence Essentials (TIE)

Cybersecurity and technology-based mitigation approaches rely heavily on intelligence. This program is carefully designed to enhance your understanding and application of fundamental threat intelligence concepts. It covers the differentiation of intelligence from data or information and emphasizes its crucial role in modern cybersecurity. Additionally, the program enables students to deeply explore the threat intelligence lifecycle, understand its significance in shaping team roles, delve into ethical and legal considerations, and recognize the importance of measuring threat intelligence effectiveness.

You will master different types of threat intelligence: strategic, operational, tactical, and technical. 

EC-Council SOC Essentials (SCE)

The SOC Essentials (S|CE) Series is specifically designed for individuals in the cybersecurity field as well as newcomers who are eager to enhance their proficiency in essential security technologies. This comprehensive course aims to equip candidates with highly sought-after skills and provide a thorough understanding of security operations frameworks and related technologies essential for mastering the foundational concepts of a Security Operations Center (SOC).

EC-Council Network Defense Essentials (NDE)

Network Defense Essentials offers a comprehensive overview of information security and network defense fundamentals. Tailored for entry-level information security or cybersecurity professionals, this introductory cybersecurity course is perfect for individuals aspiring to establish a career in cybersecurity.

The program covers crucial topics such as identification, authentication, and authorization, virtualization and cloud computing, wireless networks, mobile and IoT devices, and data security. Through interactive labs, participants gain practical, hands-on experience vital for excelling in a cybersecurity career.

EC-Council IoT Security Essentials (ISE)

The EC-Council’s IoT Security Essentials Series provides a comprehensive coverage of crucial topics in securing Internet of Things (IoT) systems. Participants will gain the knowledge and skills necessary to design, deploy, and maintain secure IoT solutions, from understanding fundamental IoT concepts to addressing advanced security threats. The program offers a blend of theoretical learning and hands-on exercises to explore IoT fundamentals, networking and communication protocols, cloud integration, threat intelligence, incident response, and security engineering principles.

EC-Council Cloud Security Essentials (CSE)

This course is tailored to provide you with the essential skills to understand the foundational and critical components of Cloud Security. You will acquire knowledge about the fundamentals of cloud computing and the vital aspects of securing identities, data, and applications within cloud providers and hybrid infrastructures. Our immersive Capstone project will allow you to apply your newly acquired abilities, gaining practical proficiencies crucial for success in your cybersecurity professional role. Upon finishing this course, you will be thoroughly prepared to embark on a career in cloud security and progress towards obtaining cloud security certifications.

Pen Testing Training

EC-Council Certified Penetration Tester (CPENT)

EC-Council’s Certified Penetration Tester (CPENT) program offers extensive training in conducting effective penetration tests within enterprise network environments. The course encompasses various aspects such as attacking, exploiting, evading, and defending networks. For those familiar with flat networks, CPENT’s live practice range is designed to enhance skills by providing instruction on pen testing IoT and OT systems, creating custom exploits, developing tools, performing advanced binaries exploitation, executing double pivots to access concealed networks, and customizing scripts/exploits to infiltrate the deepest segments of the network.

Application Security Training

EC-Council Certified Application Security Engineer (CASE).NET

The Certified Application Security Engineer (CASE) credential is a result of collaboration with global experts in application and software development. This certification assesses critical security skills and knowledge required throughout the software development life cycle (SDLC), placing emphasis on the implementation of secure methodologies and practices in today’s insecure operating environment. 

EC-Council DevSecOps Essentials (DSE)

The DevSecOps Essentials program provides a comprehensive understanding of secure application development, also referred to as DevSecOps. Throughout the course, participants will gain valuable insights into identifying application development risks and securing and testing applications across on-premises, cloud providers, and hybrid infrastructures. The program concludes with an engaging Capstone project, allowing participants to apply their newly acquired skills in a hands-on setting, thus preparing them for success in a cybersecurity professional role focused on secure application development. Upon completion of this program, participants will be well-prepared to pursue a career in secure application development.

Executive Leadership Training

EC-Council Certified Chief Information Security Officer (C-CISO)

In this course, students will gain a comprehensive understanding of each of the 5 CCISO Domains. The CCISO Certification is a prestigious program designed to acknowledge the practical experience required to excel at the highest levels of information security management. By encompassing all the essential elements for C-Level positions, the CCISO program integrates audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise necessary to lead a highly successful IS program. The role of the CISO is too critical to be learned through trial and error, and executive level management skills should not be acquired on the job. The material covered in the CCISO Program assumes a high-level comprehension of technical topics and focuses on the application of technical knowledge to an information security executive’s daily responsibilities, rather than delving into strictly technical information.

Scroll to Top