CEH, CHFI, CND, SOC Analyst & more
EC-Council • CASE-.NET
Validates the ability to build secure .NET applications throughout the software development lifecycle, covering secure requirements gathering, input validation, authentication and authorization, cryptographic practices, error handling, session management, and security testing.
EC-Council • CASE-Java
Validates the ability to build secure Java applications throughout the software development lifecycle, covering secure requirements gathering, input validation, authentication and authorization, cryptographic practices, error handling, session management, and security testing.
EC-Council • CCISO
Validates executive-level competency in information security leadership across five domains: governance, risk, and compliance; security controls and audit management; security program management and operations; core security competencies; and strategic planning, finance, and vendor management.
EC-Council • CCSE
Validates the ability to plan, configure, and secure cloud infrastructure across AWS, Azure, and GCP, covering platform and infrastructure security, identity and access management, data protection, security operations, cloud penetration testing, and incident response.
EC-Council • CCT
Validates foundational and practical cybersecurity skills through a performance-based exam, covering network security, ethical hacking, digital forensics, incident response, risk management, threat intelligence, application security, cryptography, and IoT and cloud security.
EC-Council • ECDE
Validates the ability to integrate security practices into DevOps pipelines and continuous delivery workflows, covering DevSecOps culture, threat modeling, secure code review, automated security testing, container security, and security monitoring throughout the software development lifecycle.
EC-Council • CEI
Validates instructional competency to deliver EC-Council certification training programs, covering instructor credibility, learning environment management, effective communication and questioning techniques, instructional methods and media, and learner performance evaluation.
EC-Council • CEH
Validates proficiency in ethical hacking techniques and tools across 20 security domains, including reconnaissance, network scanning, vulnerability analysis, system hacking, malware threats, social engineering, web application attacks, SQL injection, cryptography, and cloud and IoT security.
EC-Council • CND
Validates the ability to protect, detect, and respond to network security threats, covering network perimeter protection, endpoint security, firewall and IDS/VPN configuration, network traffic analysis, vulnerability scanning, and incident response.
EC-Council • CSCU
Validates foundational knowledge of personal and network security practices for end users, covering identity theft prevention, social engineering awareness, online fraud protection, malware defense, data security, and safe internet browsing habits.
EC-Council • CSA
Validates foundational and advanced skills in Security Operations Center monitoring and analysis, covering SOC operations, SIEM deployment and use cases, log management, incident triaging, indicators of compromise investigation, threat hunting, and malware analysis.
EC-Council • CTIA
Validates the ability to collect, analyze, and disseminate cyber threat intelligence at strategic, operational, tactical, and technical levels, covering threat actor profiling, cyber kill chain methodology, APT analysis, indicators of compromise, and OSINT techniques.
EC-Council • CHFI
Validates the ability to detect hacking attacks, extract and preserve digital evidence, and conduct forensic investigations, covering digital forensics methodology, evidence acquisition, chain-of-custody procedures, dark web forensics, IoT forensics, and malware forensics.
EC-Council • DFE
Validates foundational knowledge of digital forensics concepts and investigation processes, covering computer forensics fundamentals, disk storage and file systems, data acquisition, evidence handling for Windows, Linux, and Mac, network forensics, anti-forensics techniques, and malware analysis.
EC-Council • EDRP
Validates the ability to develop and implement business continuity and disaster recovery plans, covering business impact analysis, risk assessment, recovery strategy development, emergency response procedures, recovery site management, and disaster recovery plan testing and maintenance.
EC-Council • ECES
Validates expertise in cryptographic concepts and their practical application, covering symmetric and asymmetric algorithms (AES, DES, RSA, Elliptic Curve), hash functions, number theory, key management, and cryptanalysis techniques.
EC-Council • ECIH
Validates competency across all stages of incident handling and response, including preparation, incident recording, triage, containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities for network security incidents, malicious code incidents, and insider threats.
EC-Council • EHE
Validates foundational understanding of ethical hacking and penetration testing concepts, covering information security fundamentals, threats and vulnerabilities, password cracking, web application attacks, IoT and OT security, cloud computing threats, and penetration testing methodology.
EC-Council • ICS-SCADA
Validates the ability to secure industrial control systems and SCADA networks, covering ICS/SCADA network defense, vulnerability assessment, risk analysis for IT and OT environments, intrusion detection, ICS-specific standards and regulations, and incident response for critical infrastructure.
EC-Council • NDE
Validates foundational knowledge of network security and defense concepts, covering identification, authentication, and authorization controls, firewall and IDS/IPS configuration, VPN and SIEM technologies, virtualization and cloud security, wireless and mobile device security, and administrative defense controls.