EC-Council Certified Secure Programmer (ECSP) - Only 5 Days

Why

Seven reasons why you should sit your ECSP course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be ECSP certified in just 5 days. With us, you’ll be ECSP trained in record time
  2. Our ECSP course is all-inclusive. A one-off fee covers all course materials, exams, accommodation and meals. No hidden extras
  3. Pass ECSP first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  4. You’ll learn more ECSP. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn ECSP faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying ECSP with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 68,075 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study ECSP courseware. We use practical exercises to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

What

Learn how to code and develop secure applications with greater stability and posing minimal security risks to the consumer. Get your EC-Council Certified Secure Programmer certification in just five days. Depending on whether you're used to working with .NET or Java, you'll be able to tailor your course based on the environment you work in. Choose either the .NET or Java labs and exam - and get the accreditation you want.

As an ECSP you'll improve the overall quality of your products and applications by identifying security flaws and implementing security countermeasures throughout the software development life cycle. This course is based on the OWASP (Open Web Application Security Project) Top Ten Threats, a guide to the most common categories of application security problems.

What you'll learn

This course builds on your development skills in C#, C++, Java, PHP, ASP, .NET and SQL. You'll learn about key secure programming topics, including:

  • Framework Security
  • .NET Authentication and Authorisation
  • .NET & Java Cryptography
  • Secure File Handling

If you're designing and building Windows/Web based applications with .NET/Java, the ECSP certification is for you. You'll learn the latest techniques and strategies in secure programming through classroom discussions and a series of practical labs.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call +971 4 3199019

This course will significantly benefit programmer and developers concerned about the security of their code.

Technical certification is a sound investment in your career - and your organisation. Although certification does not guarantee success, research has shown that it can have a significant impact on:

  • Morale and confidence
  • Efficiency and productivity on the job: 85% of managers view certified employees as more productive (Gartner Study)
  • Career advancement: 70.8% of IT managers view certification as a criteria for promotion (Gartner Study)
  • Financial rewards

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a certification guarantee. Pass first time or train again for free (just pay for accommodation and exams on your return). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call +971 4 3199019

The curriculum will focus on your chosen ECSP certification language of either .NET or Java.

Introduction to Application Security

  • Become Familiar with. Application Security
  • Understand the Need for Application Security
  • Key Elements of Framework Architecture Security
  • Framework Security Features
  • Top 10 Security Attacks For OWASP
  • Secure Development Lifecycle (SDL)
  • Threat Modeling Process
  • Security Testing
  • Learn Various Secure Coding Principles
  • Guidelines for Developing Secure Codes
  • Confidentiality
  • Integrity
  • Availability
  • Minimal attack surface areas
  • Secure defaults
  • Principle of least privilege
  • Principle of defense in depth
  • Fail securely
  • External systems are insecure
  • Separation of duties
  • No security by obscurity
  • Simplicity
  • Fix security issues correctly

Framework Security

  • Become Familiar with Framework Architecture
  • Learn Framework Runtime Security Model
  • Understanding you’re only as secure as your Framework
  • Role-Based Security
  • Code Access Security (CAS)
  • Evidence-Based Security
  • Permissions and Permissions Classes
  • Become Familiar with Stack Walking Process
  • Isolated Storage
  • Learn About Class Libraries Security
  • .NET Assembly Security
  • Understand Common Threats To .NET Assemblies and Classes

Input Validation and Output Encoding

  • Understand Need of Input Validation
  • Various Input Validation Approaches
  • Learn Various Validation Controls
  • Understand Common Input Validation Attacks
  • Learn Defensive Techniques for XSS Attacks
  • Validation Control’s Vulnerabilities
  • Learn Mitigation Techniques for Validation Control’s Vulnerabilities
  • Learn Defensive Techniques for SQL Injection Attacks
  • Learn Output Encoding To Prevent Input Validation Attacks
  • Sandboxing to Prevent Input Validation Attacks
  • Various Sandboxing Software
  • Best Practices for Input Validation

.NET Authentication and Authorization

  • Authorization and Authentication Processes
  • Understand Common Threats on Authorization and Authentication
  • Authentication and Authorization Security Architecture
  • Understanding the Security Relationship between IIS and ASP.NET
  • Authentication and Its Modes in Detail
  • Authorization and Its Types in Detail
  • Become Familiar with Impersonation and Delegation Concepts
  • Mitigate Authentication and Authorization Vulnerabilities
  • Best Practices for Authentication and Authorization
  • Become Familiar with Secure Communication Concepts

Secure Session and State Management

  • Session Management Concepts
  • Security Principles for Session Management Tokens
  • Common Threats on Session Management
  • The Session Management Techniques
  • Various Session Attacks
  • Defensive Techniques against Session Attacks
  • Become Familiar with Cookie-Based Session Management
  • Cookie Security
  • Viewstate in .NET or HTTP Session Class in Java - Based Session Management
  • Common Threats on Viewstate in .NET or HTTP Session Class in Java
  • Viewstate in .NET or HTTP Session Class in Java Security
  • Guidelines for Secure Session Management

.NET & Java Cryptography

  • Become Familiar with Cryptography in .NET and Java
  • Understand Different Types of Cryptographic Attacks In .NET and Java
  • Become Familiar with Symmetric Encryption
  • Learn How to Secure Symmetric Encryption
  • Become Familiar with Asymmetric Encryption
  • Learn How to Secure Asymmetric Encryption
  • Become Familiar with the Hashing Concept
  • Reversing Hashing - EG. Cracking Passwords

Quick Overview on Password Cracking and how it affects programmers

  • Learn How to Implement Security in Hashing
  • Digital Signatures – If it is valid does that mean it’s not malicious?
  • Digital Certificates – The process start to finish
  • XML Signatures

Error Handling, Auditing, and Logging

  • Errors and Exception Handling
  • The Principles of Secure Error Handling
  • Different Levels of Exception Handling
  • Mitigate Vulnerabilities in Class Level Exception Handling
  • Manage Unhandled Errors
  • Guidelines and Checklists for Proper Exception Handling
  • Become Familiar with Logging and Auditing Process
  • Common Threats to Logging and Auditing
  • Become Familiar with Log Throttling Process
  • Learn How to Implement Windows Log Security against Various Attacks
  • Best Practices and Checklists for Auditing and Logging Security
  • Various Logging Tools

Secure File Handling

  • File Handling Concepts
  • Understand File Handling Security Concerns
  • Path Traversal Attacks on File Handling
  • Learn Defensive Techniques against Path Traversal Attack
  • Canonicalization Attack on File Handling
  • Learn Defensive Techniques against Canonicalization Attack
  • Static Files and their Security
  • The Security of File I/O Using Absolute Path and Map path
  • Security While Uploading Files
  • Become Familiar with the File Extension Handling Concept
  • File ACLS
  • Checklist for Securely Accessing Files

Configuration Management and Secure Code Review

  • Configuration Management
  • Common Threats on Configuration Management
  • Machine Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in Machine Config Files or Web XML or Properties Class in JAVA
  • Application Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in App Config Files or Web XML or Properties Class in JAVA
  • Code Access Security Configuration Files or Web XML or Properties Class or Web XML or Properties Class in JAVA
  • Policy Configuration Files
  • Best Practices for Configuration Management
  • Become Familiar with Secure Code Review
  • Security Code Review Approaches
  • Various Static Code Analysis Tools

JavaScript – Just don’t do it, but if you have to…

  • XSS
  • Reflected
  • Stored
  • DOM
  • XSRF
  • Click Jacking
  • Script Injection

Buffer Overflow

  • Write and implement a buffer overflow on various vulnerabilities

Reversing Java and .NET

  • Both Java and .NET compile to byte code which can be reversed
  • Learn techniques to secure your hard earned code.

OWASP Hands-On Labs:

Unvalidated Redirects and Forwards Lab

  • Testing the attack
  • Fixing the problem on the client side
  • Fixing the problem on the server side

Insufficient Transport Layer Protection Lab

  • Insecure pages
  • Secure login cookies
  • Secure other cookies

A8 Failure to Restrict URL Access Lab

  • Mounting the attack
  • Another hole

Insecure Cryptographic Storage Lab

  • Mounting the attack
  • Preparing to encrypt the file
  • Encrypting the file
  • Decrypting the file
  • Replaying the attack
  • Zeus

Security Misconfiguration Lab

  • Problem 1
  • Problem 2
  • Problem 3
  • Problem 4
  • Mounting an attack
  • Hardening the site

Cross Site Request Forgery Lab

  • Preparing
  • Mounting the attack
  • Hardening the site with a CAPTCHA
  • Re-running the attack
  • Protecting CSRF with synchronizer token pattern
  • Re-running the attack

Insecure Direct Object Reference Lab

  • Mounting the attack
  • Hardening the site
  • Hardening in .Net

Broken Authentication and Session Management Lab

  • Mounting the attack
  • Hardening the site with IP checking
  • Hardening the site with authentication

Cross-Site Scripting Lab

  • Testing for a vulnerability
  • Mounting the attack
  • Hardening the site – encoding output
  • Hardening the site – Using the Anti-XSS library

Injection Flaws Lab

  • Mounting the attack
  • Advanced attack vectors
  • Hardening the site with parameters
  • Bonus! Hardening the site with a whitelist
  • Protecting your update with a whitelist
  • Protecting your update with parameters

Information Leakage and Improper Error Handling Lab

  • Mounting the attack
  • Turning specific errors on
  • Create custom error pages
  • Capturing the error

Cryptography Lab

  • Exploring existing controls

Provider Model Lab

  • Exploring existing controls
  • Add the link
  • Add the page

Click jacking Lab

  • Testing the vulnerability
  • Protecting with X-Frame-Options
  • Protecting with frame-breaking JavaScript

Phishing Lab

  • Creating an uncomplicated site
  • Routes and default values
  • Sending an email

Static Code Analysis Lab

  • Testing the attack

Read more ...

Interested? See prices or call +971 4 3199019

Depending on the environment you're used to working in, you'll choose and sit one of the following exams:

  • EC-Council ECSP Java Exam: 312-94
  • EC-Council ECSP .NET Exam: 312-93

Read more ...

Interested? See prices or call +971 4 3199019

Included:

Depending on the environment you're used to working in, you'll choose one of the following sets of courseware:

EC-Council ECSP Java

EC-Council ECSP .NET

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Certification Programs includes

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • Near site testing, Transportation to/from Testing Center are provided ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Examination Passing Policy

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMP, CAPM and CISSP CBK Review
  • *** Not included in our PMP, CAPM, CISA, CISM, CGEIT, CRISC, (ISC)2 or ITIL Managers and Revision Certifications
  • **** Accommodation not included on the CISSP CBK Review Seminar

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Read more ...

Interested? See prices or call +971 4 3199019

The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET/Java Framework. It is designed for developers who have C#, C++, Java, PHP, ASP, .NET and SQL development skills.

In order to attend successfully you must have programming fundamental knowledge.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on +971 4 3199019 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call +971 4 3199019

When

When do you want to sit your accelerated course?

Start

Finish

Status

Location

Book now

21/5/2018 (Monday)

25/5/2018 (Friday)

Finished

-

 

24/9/2018 (Monday)

28/9/2018 (Friday)

Wait list

Nationwide

 

5/11/2018 (Monday)

9/11/2018 (Friday)

Limited availability

Nationwide

 

17/12/2018 (Monday)

21/12/2018 (Friday)

Open

Nationwide

 

28/1/2019 (Monday)

1/2/2019 (Friday)

Open

Nationwide

 

11/3/2019 (Monday)

15/3/2019 (Friday)

Open

Nationwide

 

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 68,075 students and asked them all to review our Accelerated Learning. Currently, 96.70% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"The trainer is a great instructor. He teached us very well!"
J. M.. - EC-Council Certified Secure Programmer (ECSP) (5 days) (24/10/2016 to 28/10/2016)

"Good facilities, very knowledgeable instructor."
Anonymous - EC-Council Certified Secure Programmer (ECSP) (5 days) (27/4/2015 to 1/5/2015)

"Every professional .Net programmer should have a security qualification. ECSP will give you that."
S.R. - EC-Council Certified Secure Programmer (ECSP) (5 days) (27/4/2015 to 1/5/2015)

"Good training, Knowledgeable and experienced instructor. Etisalat Academy in Dubai is a quiet place to study and stay. Labs time is open time for trainees. I recommend the training for security professionals."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/9/2013 to 3/10/2013)

"The Instructor is probably the most knowledgeable guy in the Security field with immense amount of experience. The way he trains his students is simply brilliant as he explains what is what and why along with the concept also maintaining a light mood in the hall. "
Ankit Satsangi. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/9/2013 to 3/10/2013)

"If you're lucky enough to get this instructor, you can look forward to a fun, insight filled and thoroughly rewarding 5 days. My third time at Firebrand, first time outside the UK, and another great training experience. "
F.M. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/9/2013 to 3/10/2013)

"The course is great and I recommend the instructor for this course. I have been on other courses but the instructors were good but they don’t make it fun and they don’t make you enjoy it while learning at the same time. I recommend our instructor. He delivers the whole thing plus makes you enjoy it at the same time."
Khalifa Al Maskari, Pension Fund. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/3/2012 to 15/3/2012)

"I had good experience in dealing and training with Firebrand."
Anon.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/3/2012 to 15/3/2012)

"I really enjoyed the course with Firebrand Training. Thank you."
A.D, ADRPBF. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/3/2012 to 15/3/2012)

"Good training also for people without much experience."
Anonymous - EC-Council Certified Incident Handler (ECIH) (2 days) (24/7/2018 to 25/7/2018)

"Great training with everything needed. I was able to concentrate on training with no distractions."
Grant Gibson, AGI Media. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/7/2018 to 13/7/2018)

"The instructor has a very good knowledge and experience on the training subjects. The training was over my expectation and I hoped I had visited such training in the past."
Anonymous - EC-Council ECSA Certification (5 days) (25/6/2018 to 29/6/2018)

"Appreciated the fact that the instructor clearly had wide ranging knowledge around all the topics covered and brought the course to life with great enthusiasm."
Richard Pople, Virgin Media. - EC-Council ECSA Certification (5 days) (25/6/2018 to 29/6/2018)

"Usual good training, helps with everything being located on site. "
Anonymous - EC-Council ECSA Certification (5 days) (25/6/2018 to 29/6/2018)

"Great instructor, who worked really hard to help us learn and develop after the course."
Andrew Moore, University of London. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Now on my fifth course with Firebrand. Feeling tired now, but definitely worthwhile."
Jonathan Freedman , Howard Kennedy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"The trainer has been a very good. He has managed to make the course very interesting, providing his experience and real use cases. I'd recommend taking a course with him."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Really enjoyed my second time here - really educational with lots of information, tools and help."
J.G.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4/6/2018 to 8/6/2018)

"Extraordinary good trainer! He was skilled, well educated and made course material a lot more understandable by giving examples from his own professional experience. The training itself was well prepared and well organized."
Malte Fiedler , T-Systems. - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"Courses are given in an interactive way by a highly qualified trainer which makes the courses very lively and interesting to follow."
Anonymous - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"This was my first Firebrand course, I found it intense but very rewarding when I successfully passed at the end of the week. "
Richard Matthew, Lloyds Banking Group. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic training, very long hours but worth it in the end. Will be booking my next course here."
Ian Lindley, Innogy Business Services. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Extremely good knowledgeable trainer, good course great location to the hotel. I feel like I have learnt a lot in the 5 days that I have been here ."
Mark Ben Langley, NMI metrology and gaming . - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Our instructor is incredible, cant say I've ever learned more on a course. We covered the course material but he added real life experience for pen testing which is invaluable. He is great at motivating people."
A.M. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic course delivered by a true expert."
Andrew Starr, OpenIP Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"As the first external training by the company, i can report back and give some very positive feedback :-)"
Steven Davies, S-Connect. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"In short it was a very pleasant stay at the hotel, and the instructor was great."
Anonymous - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 days) (16/4/2018 to 20/4/2018)

"Great experience, intense at time but worth it. Enjoyed all the hands on experience "
Enda Dorrian, NS + I. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/4/2018 to 13/4/2018)

"First time in Benelux and have been impressed by the facilities, supportive and friendly staff of both the hotel and Firebrand. A lot of material to cover however, the instructor equips you with experience and knowledge to build upon. "
Jeremy Green, Firebrand Training. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/4/2018 to 13/4/2018)

"Firebrand Training fulfilled my expectations and then some. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/4/2018 to 13/4/2018)

"While hard work, the course was engaging and very informative. The new skills learnt will be very useful in my role at work and have already given me an appetite to learn more. The instructor made the subject matter both entertaining and interesting at the same time, breaking up the long days with plenty of demonstrations on the subjects being covered. I'd recommend Firebrand to anyone who needs to learn a subject quickly and is willing to put in the work to attain their certification."
K.C.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"The scope of course was very comprehensive with lots of useful real world material and concepts even for novice security students or students with limited knowledge and experience. Friendly and helpful colleagues and very knowledgeable tutor. Recommended."
Nicholas Mills. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Reading books and course study notes will get you through the CEH exam. However, the experience that Firebrand and especially my tutor gave me lifted my skills to a new level. I will be back for more training. Thank you"
Barry Starling. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Excellent course material with an enthusiastic engaging trainer, would happily train here again! "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"I've never used Firebrand before but I was very impressed with the excellent training and awesome trainer! "
Andrew Cocking, NHS. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Firebrand is a professional training provider which provides training courses by fields experts in awesome and distraction less locations."
Yahya Alazri. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/1/2018 to 2/2/2018)

"Many thanks for the firebrand training. I achieved the CND Course and i really thanking the Instructor for his efforts to get more and more knowledge about the course - he is a great lecturer. I appreciate all firebrand team efforts for providing whatever makes us happy and enjoying the course. "
Ashraf Alkalbani, ITA. - EC-Council Certified Network Defender (CND) (4 days) (26/2/2018 to 1/3/2018)

"My experience at firebrand training has always been positive. The training is excellent, the staff are kind, and the accommodation is very good. Its the best way to learn and certify."
Armand Tusha, Reliance acsn. - EC-Council Certified Network Defender (CND) (4 days) (26/2/2018 to 1/3/2018)

"Excellent instructors who are always happy to give advice and guidance."
Jamie Ridings. - EC-Council Certified Network Defender (CND) (4 days) (26/2/2018 to 1/3/2018)

"Having just completed a week of intense but enjoyable training, for the EC Councils Certified Ethical Hacker v9 at Firebrand Training Ltds Wyboston Lakes facilities and passed the exam on the final day. I can thoroughly recommend the company, facilities, support staff and World Class Instructors at firebrand. I successfully studied and completed my ISC2 CCSP there previously and once again the overall package could not have been bettered anywhere. I have recently experience training with another very well known supplier and frankly Firebrand is in a totally different league with every regard. If you want to obtain IT or Cyber certifications then I suggest you train with the best at Firebrand Wyboston Lakes. I shall be recommending to my colleagues, that they don't even consider this type of training elsewhere. I cant recommend them highly enough. Thanks again Firebrand."
G.H. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"Very good, intense training"
Dave Cleaver. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"The trainer was exceptional. Extremely engaging and really made me feel like he cares about what he does. He imparts a great deal of passion in his teaching."
Imran Mughal. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"Having been to several companies this is still the best. Can't recommend it highly enough!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"This was the most comprehensive, well organised course I've ever attended. Firebrand have done a fantastic job of logistics and the instructors' encyclopedic knowledge of security has made me feel that the CEH delivered much more for me than friends of mine who used other trainers. I would definitely recommend Firebrand, and the CEH. "
Barry Johnson, ampsandvolts. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"Great experience, friendly and confident instructor."
Alexander Rambart, Aiutd Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/1/2018 to 26/1/2018)

"An intense way to learn but if you can put in the effort and commitment it is an excellent way to learn. "
David Stewart. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/1/2018 to 26/1/2018)

"Hard work but gets results!"
Peter Kelly, DWP. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/1/2018 to 26/1/2018)

"Firebrand's approach is a good way forward for students to fully focus and concentrate on the course and the exam!"
Tajinderpal Shahi. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/12/2017 to 15/12/2017)

"Great trainer , long days but really enjoyed this. Hope to see you again soon. "
Stew Evans, LBG(. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/12/2017 to 15/12/2017)

"Real world training with plenty of practical examples and not entirely focused on teaching to pass exams."
Kristofer Donaghy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (6/11/2017 to 10/11/2017)

See prices