+31 (0) 299 462 825


IT Security Training and Certification Curriculum

EC-Council is the leading supplier of IT Security Training and Certification products. The courses are organised in various tracks for different parts of the IT organisation.

Vulnerability Assessment & Penetration Testing (VAPT)

This track focusses on hacking strategies and counter measures. Typical job roles include Security Officer, Security Analyst, Security Administrator as well as Risk and Vunerability Analysts. 


This is where you will learn to think and behave like a hacker. A comprehensive and thorough foundation.

CEH Master

In  a lenghty practical exam using a simulated corporate network you will need to prove that you can apply everything. 


Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore


The Certified Security Analyst Program covers the testing of infrastructures, operating systems, and application environments

ECSA Practical

ECSA (Practical) is a 12-hour, rigorous practical exam built to test your penetration testing skills. The candidates are required to demonstrate the application of the penetration testing methodology. 


The Advanced Penetration Testing course prepares you for the Licensed Penetration Tester exam by presenting you with minimal network information along with a Scope of Work (SOW). 

Cyber Forensics 

Courses in this track focus on in-depth knowledge and skills about hacking, investigation, threat analysis and incident handling. With CND and CEH as a logical starting point the other courses take hacking and threats incidents one level deeper.

CEH Master

The Certified Ethical Hacker Master course and certification is a solid foundation for all courses in this track. 


In the Certified Incident Handler Course you will learn how to adequately respond to any hacking incident or security breach.


The Certified Threat Intelligence Analyst Program is method driven using a holistic approach to build a highly effective and secure infrastructure


Within this course you will learn major forensic investigation scenario’s plus a strong baseline knowledge on key concepts and practices of digital forensics. 

Network Defense and Operations

All courses within this curriculum focus on an adequate defense of the network infrastructure. And once an intrusion or incident is detected – how to deal with it in a structured way in order to minimise damage and chaos. 


CND is the world’s most advanced network defense course that covers 14 of the most current network security domains to protect, detect and respond .


The EDRP course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization.


The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system.


The CSA course will prepare you to monitor and triage alerts and events from various sources, perform analysis, validate, prioritise and document activities.

Software Security

These courses focus on secure software development. Typical job roles include Software Engineer, Software Developer, Software Architect, Web Developer and Application Security Tester. Follow-up courses include CEH, ECSA and LPT. 


The CASE Java program is designed to be a hands-on, comprehensive application security training course that will help software professionals create secure applications.


CASE goes beyond just the guidelines on secure coding practices but include secure requirement gathering, robust application design, and handling security issues in multiple phases of application development

Management and Governance

In the Certified Chief Information Security Officer (CCISO) 5-day course all five Domains listed below are tackled. All are components for C-Level positions.

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.

Back to TOP