EC-Council Certified Secure Programmer (ECSP) - Kun 5 dage

Hvorfor

Hvad siger vores kunder?

Der har ikke været tid til at være social, da alt har været studie, men det hele har været interessant.
Ebbe Vestergaard - EC-Council Certified Ethical Hacker (CEH) (5 dage), 11/4/2016 til 15/4/2016

Her er 4 gode grunde til at du skal tage ECSP hos Firebrand:

Se Hvordan Vi Hjælper Dig Med at Få Nye Færdigheder Hurtigt

  1. Du bliver ECSP uddannet og certificeret hurtigere. Du lærer mere på vores 5 dages accelererede kursus og får mindst 12 timers daglig uddannelse i et distraktionsfrit miljø.
  2. Dit ECSP kursus er alt-inklusiv. Du får en gennemskuelig pris, der dækker alle kursusmaterialer, eksamen, overnatning og forplejning. Du skal ikke tænke på andet end at lære.
  3. Bestå ECSP den første gang eller kom tilbage, gratis. Din instruktør er ekspert, og træner dig ud fra accelererede metoder, så du lærer hurtigere og har de bedste muligheder for at bestå eksamen første gang. Men hvis du mod forventning ikke består, er du dækket af vores Certificeringsgaranti.
  4. Tag ECSP hos en prisvindende uddannelsesleverandør. Vi har vundet adskillige udmærkelser heriblandt Microsofts "Årets Learning Partner" hele fem gange og to Børsen Gazelle priser. Firebrand er din hurtigste vej til uddannelse, og vi har sparet 72.589 deltagere for mere end en million spildte timer siden 2001.

Er du klar til kurset? Tag en GRATIS test som hjælper dig med at bedømme din nuværende viden.

Hvad

Learn how to code and develop secure applications with greater stability and posing minimal security risks to the consumer. Get your EC-Council Certified Secure Programmer certification in just five days. Depending on whether you're used to working with .NET or Java, you'll be able to tailor your course based on the environment you work in. Choose either the .NET or Java labs and exam - and get the accreditation you want.

As an ECSP you'll improve the overall quality of your products and applications by identifying security flaws and implementing security countermeasures throughout the software development life cycle. This course is based on the OWASP (Open Web Application Security Project) Top Ten Threats, a guide to the most common categories of application security problems.

What you'll learn

This course builds on your development skills in C#, C++, Java, PHP, ASP, .NET and SQL. You'll learn about key secure programming topics, including:

  • Framework Security
  • .NET Authentication and Authorisation
  • .NET & Java Cryptography
  • Secure File Handling

If you're designing and building Windows/Web based applications with .NET/Java, the ECSP certification is for you. You'll learn the latest techniques and strategies in secure programming through classroom discussions and a series of practical labs.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

This course will significantly benefit programmer and developers concerned about the security of their code.

Technical certification is a sound investment in your career - and your organisation. Although certification does not guarantee success, research has shown that it can have a significant impact on:

  • Morale and confidence
  • Efficiency and productivity on the job: 85% of managers view certified employees as more productive (Gartner Study)
  • Career advancement: 70.8% of IT managers view certification as a criteria for promotion (Gartner Study)
  • Financial rewards

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

The curriculum will focus on your chosen ECSP certification language of either .NET or Java.

Introduction to Application Security

  • Become Familiar with. Application Security
  • Understand the Need for Application Security
  • Key Elements of Framework Architecture Security
  • Framework Security Features
  • Top 10 Security Attacks For OWASP
  • Secure Development Lifecycle (SDL)
  • Threat Modeling Process
  • Security Testing
  • Learn Various Secure Coding Principles
  • Guidelines for Developing Secure Codes
  • Confidentiality
  • Integrity
  • Availability
  • Minimal attack surface areas
  • Secure defaults
  • Principle of least privilege
  • Principle of defense in depth
  • Fail securely
  • External systems are insecure
  • Separation of duties
  • No security by obscurity
  • Simplicity
  • Fix security issues correctly

Framework Security

  • Become Familiar with Framework Architecture
  • Learn Framework Runtime Security Model
  • Understanding you’re only as secure as your Framework
  • Role-Based Security
  • Code Access Security (CAS)
  • Evidence-Based Security
  • Permissions and Permissions Classes
  • Become Familiar with Stack Walking Process
  • Isolated Storage
  • Learn About Class Libraries Security
  • .NET Assembly Security
  • Understand Common Threats To .NET Assemblies and Classes

Input Validation and Output Encoding

  • Understand Need of Input Validation
  • Various Input Validation Approaches
  • Learn Various Validation Controls
  • Understand Common Input Validation Attacks
  • Learn Defensive Techniques for XSS Attacks
  • Validation Control’s Vulnerabilities
  • Learn Mitigation Techniques for Validation Control’s Vulnerabilities
  • Learn Defensive Techniques for SQL Injection Attacks
  • Learn Output Encoding To Prevent Input Validation Attacks
  • Sandboxing to Prevent Input Validation Attacks
  • Various Sandboxing Software
  • Best Practices for Input Validation

.NET Authentication and Authorization

  • Authorization and Authentication Processes
  • Understand Common Threats on Authorization and Authentication
  • Authentication and Authorization Security Architecture
  • Understanding the Security Relationship between IIS and ASP.NET
  • Authentication and Its Modes in Detail
  • Authorization and Its Types in Detail
  • Become Familiar with Impersonation and Delegation Concepts
  • Mitigate Authentication and Authorization Vulnerabilities
  • Best Practices for Authentication and Authorization
  • Become Familiar with Secure Communication Concepts

Secure Session and State Management

  • Session Management Concepts
  • Security Principles for Session Management Tokens
  • Common Threats on Session Management
  • The Session Management Techniques
  • Various Session Attacks
  • Defensive Techniques against Session Attacks
  • Become Familiar with Cookie-Based Session Management
  • Cookie Security
  • Viewstate in .NET or HTTP Session Class in Java - Based Session Management
  • Common Threats on Viewstate in .NET or HTTP Session Class in Java
  • Viewstate in .NET or HTTP Session Class in Java Security
  • Guidelines for Secure Session Management

.NET & Java Cryptography

  • Become Familiar with Cryptography in .NET and Java
  • Understand Different Types of Cryptographic Attacks In .NET and Java
  • Become Familiar with Symmetric Encryption
  • Learn How to Secure Symmetric Encryption
  • Become Familiar with Asymmetric Encryption
  • Learn How to Secure Asymmetric Encryption
  • Become Familiar with the Hashing Concept
  • Reversing Hashing - EG. Cracking Passwords

Quick Overview on Password Cracking and how it affects programmers

  • Learn How to Implement Security in Hashing
  • Digital Signatures – If it is valid does that mean it’s not malicious?
  • Digital Certificates – The process start to finish
  • XML Signatures

Error Handling, Auditing, and Logging

  • Errors and Exception Handling
  • The Principles of Secure Error Handling
  • Different Levels of Exception Handling
  • Mitigate Vulnerabilities in Class Level Exception Handling
  • Manage Unhandled Errors
  • Guidelines and Checklists for Proper Exception Handling
  • Become Familiar with Logging and Auditing Process
  • Common Threats to Logging and Auditing
  • Become Familiar with Log Throttling Process
  • Learn How to Implement Windows Log Security against Various Attacks
  • Best Practices and Checklists for Auditing and Logging Security
  • Various Logging Tools

Secure File Handling

  • File Handling Concepts
  • Understand File Handling Security Concerns
  • Path Traversal Attacks on File Handling
  • Learn Defensive Techniques against Path Traversal Attack
  • Canonicalization Attack on File Handling
  • Learn Defensive Techniques against Canonicalization Attack
  • Static Files and their Security
  • The Security of File I/O Using Absolute Path and Map path
  • Security While Uploading Files
  • Become Familiar with the File Extension Handling Concept
  • File ACLS
  • Checklist for Securely Accessing Files

Configuration Management and Secure Code Review

  • Configuration Management
  • Common Threats on Configuration Management
  • Machine Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in Machine Config Files or Web XML or Properties Class in JAVA
  • Application Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in App Config Files or Web XML or Properties Class in JAVA
  • Code Access Security Configuration Files or Web XML or Properties Class or Web XML or Properties Class in JAVA
  • Policy Configuration Files
  • Best Practices for Configuration Management
  • Become Familiar with Secure Code Review
  • Security Code Review Approaches
  • Various Static Code Analysis Tools

JavaScript – Just don’t do it, but if you have to…

  • XSS
  • Reflected
  • Stored
  • DOM
  • XSRF
  • Click Jacking
  • Script Injection

Buffer Overflow

  • Write and implement a buffer overflow on various vulnerabilities

Reversing Java and .NET

  • Both Java and .NET compile to byte code which can be reversed
  • Learn techniques to secure your hard earned code.

OWASP Hands-On Labs:

Unvalidated Redirects and Forwards Lab

  • Testing the attack
  • Fixing the problem on the client side
  • Fixing the problem on the server side

Insufficient Transport Layer Protection Lab

  • Insecure pages
  • Secure login cookies
  • Secure other cookies

A8 Failure to Restrict URL Access Lab

  • Mounting the attack
  • Another hole

Insecure Cryptographic Storage Lab

  • Mounting the attack
  • Preparing to encrypt the file
  • Encrypting the file
  • Decrypting the file
  • Replaying the attack
  • Zeus

Security Misconfiguration Lab

  • Problem 1
  • Problem 2
  • Problem 3
  • Problem 4
  • Mounting an attack
  • Hardening the site

Cross Site Request Forgery Lab

  • Preparing
  • Mounting the attack
  • Hardening the site with a CAPTCHA
  • Re-running the attack
  • Protecting CSRF with synchronizer token pattern
  • Re-running the attack

Insecure Direct Object Reference Lab

  • Mounting the attack
  • Hardening the site
  • Hardening in .Net

Broken Authentication and Session Management Lab

  • Mounting the attack
  • Hardening the site with IP checking
  • Hardening the site with authentication

Cross-Site Scripting Lab

  • Testing for a vulnerability
  • Mounting the attack
  • Hardening the site – encoding output
  • Hardening the site – Using the Anti-XSS library

Injection Flaws Lab

  • Mounting the attack
  • Advanced attack vectors
  • Hardening the site with parameters
  • Bonus! Hardening the site with a whitelist
  • Protecting your update with a whitelist
  • Protecting your update with parameters

Information Leakage and Improper Error Handling Lab

  • Mounting the attack
  • Turning specific errors on
  • Create custom error pages
  • Capturing the error

Cryptography Lab

  • Exploring existing controls

Provider Model Lab

  • Exploring existing controls
  • Add the link
  • Add the page

Click jacking Lab

  • Testing the vulnerability
  • Protecting with X-Frame-Options
  • Protecting with frame-breaking JavaScript

Phishing Lab

  • Creating an uncomplicated site
  • Routes and default values
  • Sending an email

Static Code Analysis Lab

  • Testing the attack

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Depending on the environment you're used to working in, you'll choose and sit one of the following exams:

  • EC-Council ECSP Java Exam: 312-94
  • EC-Council ECSP .NET Exam: 312-93

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Included:

Depending on the environment you're used to working in, you'll choose one of the following sets of courseware:

EC-Council ECSP Java

EC-Council ECSP .NET

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • On site eksaminering som en del af dit kursus
  • Certificeringsgaranti

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET/Java Framework. It is designed for developers who have C#, C++, Java, PHP, ASP, .NET and SQL development skills.

In order to attend successfully you must have programming fundamental knowledge.

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 78 79 16 53 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Interesseret? Se vores priser her eller ring 78 79 16 53

Hvornår

Hvornår vil du tage dit accelererede kursus?

Starter

Slutter

Tilgængelighed

Sted

Tilmelding

27/5/2019 (Mandag)

31/5/2019 (Fredag)

Afsluttet

-

 

30/9/2019 (Mandag)

4/10/2019 (Fredag)

Venteliste

Landsdækkende

 

11/11/2019 (Mandag)

15/11/2019 (Fredag)

Begrænsede pladser

Landsdækkende

 

3/2/2020 (Mandag)

7/2/2020 (Fredag)

Tilgængelige pladser

Landsdækkende

 

16/3/2020 (Mandag)

20/3/2020 (Fredag)

Tilgængelige pladser

Landsdækkende

 

Kundereferencer

Vi har uddannet over 72.589 personer i løbet af 12 år. Vi har bedt dem alle om at bedømme vores accelererede kurser. Aktuelt har 96,74% sagt, at Firebrand oversteg deres forventninger:

"The trainer is a great instructor. He teached us very well!"
J. M.. - EC-Council Certified Secure Programmer (ECSP) (5 dage) (24/10/2016 til 28/10/2016)

"Good facilities, very knowledgeable instructor."
Anonym - EC-Council Certified Secure Programmer (ECSP) (5 dage) (27/4/2015 til 1/5/2015)

"Every professional .Net programmer should have a security qualification. ECSP will give you that."
S.R. - EC-Council Certified Secure Programmer (ECSP) (5 dage) (27/4/2015 til 1/5/2015)

"Godt kursus, gode faciliteter og god forplejning."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Godt kursus, dejligt sted og god mad."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Der har ikke været tid til at være social, da alt har været studie, men det hele har været interessant."
Ebbe Vestergaard. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Fantastiske omgivelser, god support stab, gode undervisningsfaciliteter, gode vaerelser og fantastisk instruktor. Sundsgaarden med fantastisk udsigt til Danmark"
Leif Andersen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Tekniknørderi med andre nørder i en hel uge er balsam for sjælen :)"
Silas Hansen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Utroligt stort udbytte set i forhold til den tid man investerer i et kursus."
Preben Bensen , Finansforbundet. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (10/12/2012 til 14/12/2012)

"I dont think Ive learned this much in 5 days before, and Ive got tons of more information to dig into. This really is accelerated training. I really prefer this way of learning over the traditional, slow style of learning. It is really intense, but you also learn a lot - dont expect any lazyness here! Be rested before you arrive, theres a lot of information to take in. The Firebrand staff is very nice and accomodating."
E.Ø.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/7/2016 til 8/7/2016)

"Good teachers make accelerated learning possible!"
Peder Illum, MedCom. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Brilliant teacher, high speed education in a well working testenvironment."
Tom Thomsson . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"Would definitely recommend Firebrand to fellow work mates and friends. Super educational experience where everything that can be done to made you feel comfortable and immersed in an academic environment is done. Its the real deal and I wouldnt hesitate coming back for another course. Bring on the next course certification. "
I.R.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"CEH course is very exciting and give you a 5 days journey in high level stuff."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"Excellent condensed training. A lot of subjects covered in small time."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (1/2/2016 til 5/2/2016)

"An excellent training to systemize your knowledge and learn from experts in the information security field."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Good, funny and knowledgeable instructor. Nice accommodations and friendly staff."
S.B.F.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"I had a great time, lots of fun. But brace yourselves, information overflow and sleepless nights are coming."
Oliver Rickfors . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Intense studying gives good results, highly recommend!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Fast paced course allowing you to save time but only appropriate if you have the right background knowledge and energy."
Francisco Blas Izquierdo Riera , Coresec Systems AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Hard week on CEH, I was a little misplaced, but I had so much fun and I have learned a lot anyway. I it has defiantly given me the information I need to carry out my work. "
Thomas Bonde Ejby , AXVICE. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"brilliant training provider. would definitely come back!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (24/8/2015 til 28/8/2015)

"Intensive and filled with info that will keep one busy for the coming weeks."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/5/2015 til 8/5/2015)

"Could be shorter, but overall a great experience."
Johan Bogg , Iftac AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/5/2015 til 8/5/2015)

"It was a very high tempo, but I have learnt a lot! Would definitely go here again."
Marcus Persson , Sigma. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/2/2015 til 6/2/2015)

"Purely proffesional, my best certification experience by a mile. Will do it again"
Jahmai Enime , CoreLogic. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"Sundsgården and Firebrand staff ROCKS. "
Peder Illum , Medcom. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"NICE STAFF! Good food and accommodation. "
Andreas Lindkvist . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/11/2014 til 7/11/2014)

"Absolutely perfect."
Stefan Karjalainen , Atea Sverige. - EC-Council Disaster Recovery Professional Certification (5 dage) (15/9/2014 til 19/9/2014)

"Very much Worth it"
Jens Arnfelt , -. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (5/5/2014 til 9/5/2014)

"Like Nike says, "Just do it"!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (3/2/2014 til 7/2/2014)

"First time on a Firebrand course. Great concept. Would recommend to others."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"Its hard but its worth it"
Bjarne Warming . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"The course provided me with the right knowledge to get the job done."
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"Simply great training!"
Anonym - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/9/2013 til 6/9/2013)

"If you know what you want & are passionate about hacking this is the place to be"
Caj Abrahamsson, Betsson. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (4/3/2013 til 8/3/2013)

"Intense - time flyes when you are having fun."
Lars Fischer , The Danish Board of Technology. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Very good intensive training. Good hands-on training"
Anonym, Ficora NCSA-FI - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Awesome training and personell. Wonderful to be able to loose yourself in the subject. "
Thomas Eriksen, FDE A/S. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (14/5/2012 til 18/5/2012)

"Nice to get to an isloated studyplace, and to focus 100% on the material. Good teacher, with experiance from the realworld."
Nils Bystrom , Uppsala University. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (13/2/2012 til 17/2/2012)

"Great training and a great instructor who often uses real worldscenarios, and not only training material."
Giuliano Maras, Onevinn AB. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (13/2/2012 til 17/2/2012)

"Great Course, Great Tutor - Second time at firebrand, and the general organisation and implementation of the courses is very well put together - takes all stresses out of the course. "
M.G.. - EC-Council Certified Network Defender (CND) (4 dage) (20/5/2019 til 23/5/2019)

"Excellent learning facility, great teacher and delivery of training."
J.M.. - EC-Council Certified Network Defender (CND) (4 dage) (20/5/2019 til 23/5/2019)

"Good facilities, good instructor and good course material."
M.B., Yorkshire Water. - EC-Council Certified Network Defender (CND) (4 dage) (20/5/2019 til 23/5/2019)

"Great course, make sure you sleep first as there are long days!"
Tim Smith, AJ Bell. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"One of the best courses I've ever done. This is the second time I have done it, absolutely fabulous!"
Samuel-Alexander Couchman. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"Very focused, intense with rich learning opportunities. Very knowledgeable instructor."
G.M.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"Facilities excellent"
Andrew Wilson, Gen2 City and Guilds Group. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (21/1/2019 til 25/1/2019)

"This is a great way to really get under the covers and deep into the technical subject of ethical hacking. You will come away armed with great tools and a solid understanding of the issues and technology, backed up by a practical skills that you have developed on the training. Come prepared to work!"
L.R.. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (17/12/2018 til 21/12/2018)

"First course, great instructor, definitely will recommend to friends, and hopefully I will do some more courses."
Samuel-Alexander Couchman, N/A. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (17/12/2018 til 21/12/2018)

Se priser