Cyber Security Certification Programs

 

 

CYBER SECURITY CERTIFICATION PROGRAMS

EC-Council computer security training has become popular among IT security professionals. Become a certified information security professional, become a master of security expertise!

The next generation of Information Security leader could be you. Are you ready?

 

 

 

 
 CERTIFIED ETHICAL HACKER (CEH)
 Course:   Certified Ethical Hacker (CEH)
 Schedule:

   25 – 29 Nov 2019    |  Enroll Now

 Language:    Conducted in Thai by Certified Trainer
 List Price:   56,250 Baht Special offers please call 0-2634-7993-4
 Included:   Material, Exam, Attendant Certificate, Lunch & Coffee Breaks


CEH is the world’s most advanced certified ethical hacking course that covers 18 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization.

The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.

Key Outcomes

  • Thorough introduction to ethical hacking
  • Exposure to threat vectors and counter measures
  • Addresses emerging areas of cloud and mobile hacking
  • Prepares you to combat Trojans, malware, backdoors and more
  • Enables you to hack using mobile

Target Audience
Ethical hackers, System Administrators, Network Administrators and Engineers, Webmanagers, Auditors, Security Professionals in general.

 

 

 

 
 COMPUTER HACKING AND FORENSIC INVESTIGATOR (CHFI)
 Course:   Computer Hacking and Forensic
  Investigator (CHFI)
 Schedule:

   28 Oct – 1 Nov 2019    |  Enroll Now

 Language:    Conducted in Thai by Certified Trainer
 List Price:   56,250 Baht Special offers please call 0-2634-7993-4
 Included:   Material, Exam, Attendant Certificate, Lunch & Coffee Breaks


CHFI is a comprehensive course covering major forensic investigation scenarios, enabling students to acquire hands-on experience.

The program provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. Moreover, CHFI provides firm grasp on the domains of digital forensics.

Key Outcomes

  • Comprehensive forensics investigation process
  • Forensics of file systems, operating systems, network and database, websites, and email systems
  • Techniques for investigating on cloud, malware, and mobile
  • Data acquisition and analysis as well as anti-forensic techniques
  • Thorough understanding of chain of custody, forensic report, and presentation

Target Audience
Anyone interested in cyber forensics/investigations, Attorneys/ legal consultants/ and lawyers, Law enforcement officers, Police officers, Federal/ government agents, Defense and military, Detectives/ investigators, Incident response team members, Information security managers, Network defenders, IT professionals, IT directors/managers, System/network engineers, Security analyst/ architect/auditors/ consultants

Prerequisites
IT/forensics professionals with basic knowledge on IT/cyber security/ computer forensics/ and incident response, Prior completion of CEH training would be an advantage

 
 
 EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)
 Course:   EC-Council Certified Security Analyst (ECSA)
 Schedule:

   16 – 20 Dec 2019    |  Enroll Now

 Language:    Conducted in Thai by Certified Trainer
 List Price:   56,250 Baht Special offers please call 0-2634-7993-4
 Included:   Material, Exam, Attendant Certificate, Lunch & Coffee Breaks


ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and write a penetration testing report.

This program takes the tools and techniques covered in CEH to next level by utilizing EC-Council’s published penetration testing methodology.

Key Outcomes

  • Introduce to security analysis and penetration testing methodologies
  • In-depth vulnerability analysis, network penetration testing from external and internal evading firewalls and ids
  • Learn to own web applications and databases, and take over cloud services
  • Analyze security of mobile devices and wireless networks
  • Present findings in a structured actionable report

Target Audience
Ethical Hackers, Penetration Testers, Security Analysts, Security Engineers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators, and Risk Assessment Professionals.

 
 
For more information, please call +66 (0) 2634-7993-4 Ext.11-17