top of page

EC-Council Certifications

As the only EC-Council authorized reseller for Seychelles, OnPoint Tech Services facilitates and provide training materials as well as exam vouchers for all EC-Council certifications.

NDE.png

The Network Defense Essentials course gives a holistic overview of the key components of information security, which include identification, authentication, and authorization, virtualization and cloud computing, wireless networks, mobile and loT devices, and data security. The interactive labs component ensures that learners receive the hands-on, practical experience required for a future in cybersecurity.

EHE.png

Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more.

DFE.png

The Digital Forensics Essentials course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, Linux, Malware Forensics, and so much more! The interactive labs component of this course ensures that learners receive the hands-on, practical experience required for a future in digital forensics.

DSE.png

The DevSecOps Essentials program will provide you with the foundation knowledge and essential aspects of secure application development, or DevSecOps. In this course, you will gather key insights into identifying application development risk and securing and testing applications within on-premises, cloud providers, and hybrid infrastructures.

SCE.png

In this program students will learn the basics of computer networks, TCP/IP model, OSI model, Windows/Linux/Unix security concepts, threats, vulnerabilities, and attack concepts in terms of cyber threats. Further, students will go through the complete SOC architecture: its importance, workflow, and processes of SOC. Students will learn more advanced architectural concepts like SIEM architecture and deployment models, and data sources that are commonly used. Learn everything about Log Management like; dashboards, reports, and incident escalation in terms of dealing with real positive and false alerts. This course will also teach you sources, types, and lifecycle of threat intelligence and give an introduction to threat hunting as well while diving deep into incident response lifecycle processes.

CSE.png

The Cloud Security Essentials course will provide you with the skills that you need to understand the foundational and essential aspects of Cloud Security. You will learn the fundamentals of cloud computing and the essential aspects of securing identities, data, and applications within cloud providers and hybrid infrastructures.

ISE.png

EC-Council’s IoT Security Essentials provides comprehensive coverage of essential topics in securing Internet of Things (IoT) systems. From understanding the fundamental concepts of IoT to addressing advanced security threats, students will gain the knowledge and skills necessary to design, deploy, and maintain secure IoT solutions. Through a combination of theoretical learning and hands-on exercises, participants will explore IoT fundamentals, networking and communication protocols, cloud integration, threat intelligence, incident response, and security engineering principles.

TIE.png

The Threat Intelligence Essentials course aims to enhance your understanding and implementation of foundational threat intelligence concepts, including differentiating intelligence from data or information and highlighting its vital role in modern cybersecurity. Additionally, the program enables students to thoroughly explore the threat intelligence lifecycle, understand its significance in shaping team roles, delve into the ethical and legal considerations, and understand the importance of measuring threat intelligence effectiveness.

CSCU.png

The C|SCU curriculum is designed to educate computer users on the more practical aspects of networking and security, allowing them to expand their computer skills. Students will develop a foundational understanding of a variety of computer and network security concerns, including identity theft, credit card fraud, online banking phishing scams, malware, loss of sensitive information, and social engineering. 

ECSS.png

​​EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls.

CCT.png

The Certified Cybersecurity Technician is an entry-level cybersecurity program engineered by EC-Council, to address the global need and demand for cybersecurity technicians with strong foundational skills. It develops participants' fundamental cybersecurity skills across the fields of network defense, ethical hacking, digital forensics, and security operations giving leaners the foundation they need to kickstart a career in cybersecurity.

ECDE.png

The Certified DevSecOps Engineer course covers the integration and automation of all the widely used DevSecOps tools, processes, and methodologies that help organizations quickly build secure applications. E|CDE trains students in DevSecOps for cloud-based networks, including Amazon Web Services and Microsoft Azure.

CCSE.png

Certified Cloud Security Engineer (C|CSE) is a hands-on course designed and developed by cloud security professionals in association with subject matter experts across the globe. The C|CSE combines vendor-neutral and vendor-specific cloud security concepts and strengthens foundational knowledge and practical skills for working with popular cloud platforms like AWS, AZURE, and GCP.

ECES.png

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Functions, DES, and AES.

EDRP.png

The EC-Council Disaster Recovery Professional course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of an organization, implementation of a plan, and recovering from a disaster.

CSA.png
CPENT.png

The Certified SOC Analyst (C|SA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level
operations.

The dynamic pen testing course culminates in a brand new 24-hr practical exam, hosted on the new EC-Council Cyber Range platform, CyberQ. Certified Penetration Testing Professional provides the capability to assess a pen tester's skills across a broad spectrum of "network zones," with each zone representing a distinct type of testing. The pen testing challenges shall truly test a candidate's ability to think-on-their-feet and perform real world maneuvers.

ECIH.png

EC-Council's Certified Incident Handler program equips students with the knowledge, skills, and abilities to effectively handle and neutralize threats and threat actors in real-time incidents. It covers the entire process of incident handling and response, including hands-on labs that teach tactical procedures and techniques for planning, recording, triage, notification, and containment.

CND.png

Students will learn the critical skills required to defend their networks and operating environments across local networks, endpoints, cloud infrastructure, applications, OT, and mobile. They will also acquire knowledge of effective proper log analysis, network traffic monitoring, basic investigation and response, as well as business continuity and disaster recovery. Additionally, they will dive into threats, analyzing the attack surface, and studying threat prediction and threat intelligence as it relates to their administration and defense responsibilities.

CEH.png

The Certified Ethical Hacker v13 is a specialized, one-of-a kind training program that helps you gain expertise in ethical hacking, AI, and machine learning. With hands-on training labs, knowledge-based and practical exams, a mock ethical hacking engagement on live networks, and a global hacking competition, this program ensures you master the most in-demand skills needed to excel and stand out in the cybersecurity industry.

CHFI.png

This intense hands-on digital forensics program immerses students in over 68 forensic labs, enabling them to work on crafted evidence files and utilize the tools employed by the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics and learn current topics such as cloud forensics, mobile and IoT, investigating web application attacks, and malware forensics. C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence.

CTIA.png

The Certified Threat Intelligence Analyst course covers a wide range of topics, including the fundamentals of threat intelligence, the use of threat intelligence tools and techniques, and the development of a threat intelligence program. C|TIA course focuses on refining data and information into actionable intelligence that can be used to prevent, detect, and monitor cyber-attacks. 

CCISO.png

The Certified CISO course provides an executive management perspective that incorporates information security management principles, business acumen, and general technical knowledge within five crucial domains encompassing business functions, strategic security portfolio management, and the latest technology shifts within the security industry.  The comprehensive curriculum covers information security governance, risk and compliance, security program management and operations, security controls and audit management, core competencies of information security, and much more.

BDC.png

The Blockchain Developer Certification course aims to provide developers with a comprehensive understanding of blockchain technology, including its impact and applications in business and finance. Students will learn about cryptography, cryptomining, quantum computing, blockchain project implementation, Ethereum, and more.

BFC.png

The Blockchain Fintech Certification course will enable financial professionals to utilize blockchain technology to improve financial services and the insurance industry. Students learn the laws and regulations related to financial applications of blockchain and how to use PoW and PoS consensus mechanisms. In addition, the program provides in-depth insights into cryptocurrencies, including Bitcoin wallets and exchanges, among other topics.

BBLC.png

The Blockchain Leader Certification course aims to teach business leaders how to use blockchain technology to improve business operations by equipping them with technical knowledge and hands on experience with blockchain technologies. The curriculum covers Ethereum and Bitcoin in detail, in addition to issues such as blockchain security and Blockchain as a Service (BaaS).

CASE-JAVA.png

The C|ASE Java program is designed to be a hands-on, comprehensive application security training course that will help software professionals create secure applications. It trains software developers on the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices required in
today’s insecure operating environment.

CASE.NET.png

The comprehensive curriculum covers input validation, defensive coding practices, authentication and authorization, cryptographic attacks, error handling techniques, session management techniques and more. The hands-on training program encompasses security activities involved in all phases of the Secure Software Development Life Cycle (SDLC): planning, creating, testing, and deploying an application.

WAHS.png

The Web Application Hacking and Security curriculum covers application vulnerabilities and web application hacking concepts including Advanced Web Application Penetration Testing, Advanced SQL Injection (SQLi), Reflected, Stored, and DOM-based Cross-Site Scripting (XSS), Dictionary Attack, and much more. 

Contact us for more information.

bottom of page