Tecnología: EC Council

Certified Secure Computer User (CSCU)

The purpose of the Certified Secure Computer User CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card […]

Leer más

Certified Application Security Engineer (CASE.NET)

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally.The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.The CASE […]

Leer más

Certified Application Security Engineer (CASE JAVA)

The Certified Application Security Engineer (CASE JAVA) credential is developed in partnership with large application and software development experts globally.The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.The […]

Leer más

Certified Business Continuity & Disaster Recovery (EDRP)

EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in […]

Leer más

Advanced Penetration Testing (APT)

The Advanced Penetration Testing (APT) course will teach you how to perform a professional security test as well as how to produce the next most important thing… the findings and the report! The ranges progress in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is […]

Leer más

Computer Hacking Forensic Investigator Certification (CHFI)

Las tecnologías digitales están cambiando la cara de los negocios. A medida que las organizaciones adoptan rápidamente tecnologías digitales como la nube, los dispositivos móviles, el big data y el IoT, el contexto de la ciencia forense digital es más relevante que antes. El creciente número de delitos cibernéticos ha cambiado el papel de los […]

Leer más

Certified Network Defender (CND)

Learn the skills that matter! EC-Council’s vendor-neutral network security certifications provide an unbiased approach to learning secure networking practices, as well as how to analyze and harden computing systems prevalent in the current IT infrastructure. CND v2 has earned a reputation as the only program in the market that is 100% focused on network security […]

Leer más

Certified Ethical Hacker (CEH)

Nuestros expertos en seguridad han diseñado para Ethical Hacker más de 140 laboratorios que imitan escenarios en tiempo real en el curso para ayudarlo a «vivir» a través de un ataque como si fuera real y brindarle acceso a más de 2200 herramientas de Hacking de uso común para sumergirlo en el mundo de los […]

Leer más

Certified Incident Handler (ECIH)

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe. It is a comprehensive specialist-level program that imparts knowledge and skills that organizations need to effectively handle post breach consequences by reducing the impact of the incident, […]

Leer más

Certified Encryption Specialist (ECES)

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. 

Leer más

Certified Threat Intelligence Analyst (C|TIA)

The Certified Threat Intelligence Analyst (CTIA) program is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe. The aim is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown internal and external threats into quantifiable threat entities and stop them in their tracks. Much like a […]

Leer más

Certified Soc Analyst (CSA)

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand […]

Leer más