EC-Council

Certified Threat Intelligence Analyst (C|TIA)

C|TIA program provides credible professional knowledge required for a successful threat intelligence career. It enhances your skills as a threat intelligence analyst, thus increasing your employability. It is desired by most cybersecurity engineers, analysts, and professionals globally and is respected by hiring authorities. Ideal for individuals working in information security, network security, incident response, and other related fields, mastering in-demand skills and earning this certification will improve threat intelligence operations and investments for cybersecurity individuals and teams.

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
C|TIA13 – 15 July ‘2505 Days09:00 AM – 04:00 PMOTrain – AmmanPublic ClassroomFull Day Training

Certified Incident Handler – ECIH

The ECIH certification is a vendor-neutral credential from the EC-Council, a global leader in cybersecurity certifications. It validates an individual’s ability to identify, contain, eradicate, and recover from cybersecurity incidents, ensuring business continuity and minimizing the impact on the organization.

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
ECIH04 – 06 Feb ‘2303 Days9:00 am – 4:00 pmOTrain – AmmanPublic ClassroomFull Day Training

Certified Ethical Hacker – CEH v11

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

CHFI

Computer Hacking Forensics Investigator

The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the “cyber-criminal.” It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
CHFI10 – 14 Dec ‘2305 Days9:00 am – 4:00 pmOTrain – AmmanPublic ClassroomFull Day Training

Certified Cloud Security Engineer

Certified Cloud Security Engineer (C|CSE) is a specialized program curated by cloud security professionals in collaboration with subject matter experts from across the globe. A hands-on learning certification course, CICSE adopts a detailed and methodological approach to teaching fundamental cloud security concepts.

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
CCSE03 – 07 Dec ‘2305 Days9:00 am – 4:00 pmOTrain – AmmanPublic ClassroomFull Day Training
CCSE25 – 29 Feb ‘2305 Days9:00 am – 4:00 pmOTrain – AmmanPublic ClassroomFull Day Training
CCISO

Certified Chief Information Security Officer

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
CCISO24 – 28 Dec ‘2305 Days9:00 am – 4:00 pmOTrain – AmmanPublic ClassroomFull Day Training
ECSA

Certified Security Analyst v10

The ECSA program offers a seamless learning progress continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognized comprehensive step-bystep penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
CCSA27 – 29 Feb ‘2305 Days9:00 am – 4:00 pmOTrain – AmmanPublic ClassroomFull Day Training
CND

Certified Network Defender – CND

EC-Council has reviewed the entire CND space as designated by the Department of Defense as IAT I, II, III and IAM I, II, III as well as the NICE Framework KSA’s as they relate to cyber defense and day-to-day cyber operations. With each of these considered, they built their exam blueprint, overall training scope, and got to work building the next certification we believe will be a game changer for cyber security professionals – Certified Network Defender. 

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
CND26 – 30 Nov ‘2305 Days9:00 am – 4:00 pmOTrain – AmmanPublic ClassroomFull Day Training
CEH v11

EC-Council Certified Ethical Hacker – CEH v.12

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

CodeScheduleDurationTimingLocationDelivery FormatFull/Short Course
CEH21 – 25 April ‘2440 Hrs.9:00 AM – 4:00 PMOTrain – AmmanPublic ClassroomFull Day
en_USEnglish
Scroll to Top