EC-Council provide multiple training courses designed to train the engineer in a variety of aspects of Security.
From EC-Council's Network Security Administrator to its Network Defense Architect, there are courses and certifications for every level for the Network Security Engineer.
Certified Ethical Hacker (CEH)
Holders of the Certified Ethical Hacker (CEH) certification bring in an average salary of $103,297, according to the survey, up from $95,155 last year.
Created and managed by the International Council of E-Commerce Consultants (EC-Council), the certification tests the ability of IT professionals to prod for holes, weaknesses and vulnerabilities in an end user’s network defenses using hackers’ methods.
While a hacker would be interested in causing damage or stealing information, a CEH would be interested in fixing the deficiencies found.
Network Security Administrator (ENSA)
The EC-Council's ENSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.
Certified Security Analyst (ECSA)
The ECSAV9 penetration testing course is designed to enhance the skills based competency of a penetration tester. This course is intensively hands-on and a tremendous amount of emphasis is placed on the practical competency of the student.
Unlike the previous version of ECSA exam, in the new ECSAv9, a student will only be allowed to challenge the ECSA exam after meeting certain eligibility requirements.
To become eligible, a student must conduct a detailed penetration test through the EC-Council iLabs Cyber range environment and submit a written report via EC-Council’s ASPEN system.
Computer Hacking Forensic Investigator (CHFI)
The EC-Council's CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
Certified Incident Handler (ECIH)
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling. After attending the course, they will be able to create incident handling and response policies and deal with various types of computer security incidents.
Disaster Recovery Profesisonal (EDRP)
The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster.
This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster.