EC-Council Certified Incident Handler (ECIH) - فقــط ٢ أيـــام

Why

سبعة أسباب تدعو إلى ضرورة التحاقك بدورة ECIH التدريبية مع فايربراند للتدريب

إكتشف كيف يمكن أن نساعدك تعلم مهارات جديدة و بسرعةإكتشف كيف يمكن أن نساعدك تعلم مهارات جديدة و بسرعة

  1. سوف تحصل على شهادة ECIH المعتمدة معنا خلال ٢ أيام. وسوف يتم تدريبك على ECIH خلال فترة قياسية
  2. دورتنا التدريبية ECIH شاملة جامعة. وبدفع الرسوم مرة واحدة فقط سوف يتم تغطية كل مواد الدورة والامتحانات والإقامة والوجبات الغذائية. لا توجد مصاريف إضافية خفية
  3. النجاح في امتحان ECIH من المرة الأولى أو سيتم تدريبك مرة أخرى مجاناً. هذا هو ضماننا. إننا على يقين أنك سوف تنجح في الدورة من المرة الأولى. ولكن إذا لم يحالفك الحظ ، عد مرة أخرى خلال سنة وستدفع فقط نظير الإقامة والامتحانات. وكل شيء آخر سيكون مجاناً
  4. سوف تتعلم المزيد من ECIH. إن يوم الدراسة مع مراكز التدريب التقليدي عادة ما يكون من الساعة التاسعة صباحاً وحتى الساعة الخامسة بعد الظهر مع فترات إضاعة للوقت أما مع فايربراند للتدريب فسوف تحصل على فترة تعلم مكثفة لمدة لا تقل عن ١٢ ساعة في اليوم مع مدربك
  5. سوف تتعلم ECIH بسرعة أكثر. وبالتأكيد سوف يتوفر لديك نمط تعليم مختلف عن أولئك الموجودين حولك. فإننا نجمع بين الطريقة المرئية والسمعية والتجريبية لتقديم المادة بطريقة تضمن تعلمك بسرعة وسهولة أكبر
  6. سوف تدرس ECIH مع الأفضل. فلقد حصلنا على جائزة "من أفضل شركات التدريب" في العالم في تدريبات تقنية المعلومات لثلاث مرات وهذا رقم قياسي. وبالإضافة إلى الفوز بالعديد من الجوائز الأخرى، فلقد قمنا بتدريب واعتماد ٣٠٫٠٠٠ مهني ولدينا شركاء مع كل الأسماء الكبرى في عالم الشركات
  7. سوف نُقدم ما هو أكثر من مواد الدراسة في ECIH. إننا نستخدم التمرينات العملية للتأكد من تطبيقك لمعرفتك الجديدة في أجواء العمل. ويستخدم مدربونا العروض التجريبية والتجربة في العالم الواقعي لجعل يومك مثيراً للاهتمام حيث تستمتع بالمشاركة

فكر أن تكون جاهزاً للدورة التدريبية ؟ التحق باختبار تمرين مجاني لتقييم معرفتك

What

On this two day EC-Council Certified Incident Handler (ECIH) course, you’ll gain skills to handle and respond to a range of information security incidents.

Through accelerated learning you'll get 50% more training time than traditional 9-5pm courses. Meaning you'll spend more time learning and applying principles and techniques to detecting and respond to current and emerging computer security threats.

During the ECIH certification course you’ll learn to tackle a wide range of incident types that threaten your organisation including:

  • Network security incidents
  • Malicious code incidents
  • Insider attacks

As well as handling the incidents directly, you’ll develop the skills to prepare for and recover from incidents. This will include:

  • Risk assessment
  • Providing incident reports
  • Incident recovery plans
  • Incident recovery testing
  • Security policies

The ECIH course is perfect if you're an incident handler, risk assessment administrator, pen tester, cyber forensic investigator, venerability assessment auditor, system administrator, system engineer, firewall administrator or network manager. It will also benefit you if you're interested in incident handling and response.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

هل أنت مهتم؟ شاهد أسعارنا

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a certification guarantee. Pass first time or train again for free (just pay for accommodation and exams on your return). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

هل أنت مهتم؟ شاهد أسعارنا

1 - Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

2 - Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

3 - Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

4 - CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

5 - Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

6 - Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

7 - Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

8 - Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

9 - Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 - Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 - Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Read more ...

هل أنت مهتم؟ شاهد أسعارنا

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Read more ...

هل أنت مهتم؟ شاهد أسعارنا

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Certification Programs includes

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • Near site testing, Transportation to/from Testing Center are provided ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Examination Passing Policy

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMP, CAPM and CISSP CBK Review
  • *** Not included in our PMP, CAPM, CISA, CISM, CGEIT, CRISC, or ITIL Managers and Revision Certifications
  • **** Accommodation not included on the CISSP CBK Review Seminar

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Read more ...

هل أنت مهتم؟ شاهد أسعارنا

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on +٩٧١ ٤ ٣١٩٩٠١٩ and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

هل أنت مهتم؟ شاهد أسعارنا

When

When do you want to sit your accelerated course?

Start

Finish

Status

Location

Book now

Finished

-

 

Wait list

Dubai/UK

 

Open

Dubai/UK

Book now

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 67,286 students and asked them all to review our Accelerated Learning. Currently, 96.67% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"Good training, Knowledgeable and experienced instructor. Etisalat Academy in Dubai is a quiet place to study and stay. Labs time is open time for trainees. I recommend the training for security professionals."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/9/2013 to 3/10/2013)

"The Instructor is probably the most knowledgeable guy in the Security field with immense amount of experience. The way he trains his students is simply brilliant as he explains what is what and why along with the concept also maintaining a light mood in the hall. "
Ankit Satsangi. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/9/2013 to 3/10/2013)

"If you're lucky enough to get this instructor, you can look forward to a fun, insight filled and thoroughly rewarding 5 days. My third time at Firebrand, first time outside the UK, and another great training experience. "
F.M. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/9/2013 to 3/10/2013)

"The course is great and I recommend the instructor for this course. I have been on other courses but the instructors were good but they don’t make it fun and they don’t make you enjoy it while learning at the same time. I recommend our instructor. He delivers the whole thing plus makes you enjoy it at the same time."
Khalifa Al Maskari, Pension Fund. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/3/2012 to 15/3/2012)

"I had good experience in dealing and training with Firebrand."
Anon.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/3/2012 to 15/3/2012)

"I really enjoyed the course with Firebrand Training. Thank you."
A.D, ADRPBF. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/3/2012 to 15/3/2012)

"Extraordinary good trainer! He was skilled, well educated and made course material a lot more understandable by giving examples from his own professional experience. The training itself was well prepared and well organized."
Malte Fiedler , T-Systems. - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"Courses are given in an interactive way by a highly qualified trainer which makes the courses very lively and interesting to follow."
Anonymous - EC-Council Certified Network Defender (CND) (4 days) (28/5/2018 to 31/5/2018)

"This was my first Firebrand course, I found it intense but very rewarding when I successfully passed at the end of the week. "
Richard Matthew, Lloyds Banking Group. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic training, very long hours but worth it in the end. Will be booking my next course here."
Ian Lindley, Innogy Business Services. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Extremely good knowledgeable trainer, good course great location to the hotel. I feel like I have learnt a lot in the 5 days that I have been here ."
Mark Ben Langley, NMI metrology and gaming . - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Our instructor is incredible, cant say I've ever learned more on a course. We covered the course material but he added real life experience for pen testing which is invaluable. He is great at motivating people."
A.M. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"Fantastic course delivered by a true expert."
Andrew Starr, OpenIP Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/4/2018 to 4/5/2018)

"As the first external training by the company, i can report back and give some very positive feedback :-)"
Steven Davies, S-Connect. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"In short it was a very pleasant stay at the hotel, and the instructor was great."
Anonymous - EC-Council Computer Hacking Forensics Investigator (CHFI v9) (5 days) (16/4/2018 to 20/4/2018)

"Great experience, intense at time but worth it. Enjoyed all the hands on experience "
Enda Dorrian, NS + I. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/4/2018 to 13/4/2018)

"First time in Benelux and have been impressed by the facilities, supportive and friendly staff of both the hotel and Firebrand. A lot of material to cover however, the instructor equips you with experience and knowledge to build upon. "
Jeremy Green, Firebrand Training. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/4/2018 to 13/4/2018)

"Firebrand Training fulfilled my expectations and then some. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/4/2018 to 13/4/2018)

"While hard work, the course was engaging and very informative. The new skills learnt will be very useful in my role at work and have already given me an appetite to learn more. The instructor made the subject matter both entertaining and interesting at the same time, breaking up the long days with plenty of demonstrations on the subjects being covered. I'd recommend Firebrand to anyone who needs to learn a subject quickly and is willing to put in the work to attain their certification."
K.C.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"The scope of course was very comprehensive with lots of useful real world material and concepts even for novice security students or students with limited knowledge and experience. Friendly and helpful colleagues and very knowledgeable tutor. Recommended."
Nicholas Mills. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Reading books and course study notes will get you through the CEH exam. However, the experience that Firebrand and especially my tutor gave me lifted my skills to a new level. I will be back for more training. Thank you"
Barry Starling. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Excellent course material with an enthusiastic engaging trainer, would happily train here again! "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"I've never used Firebrand before but I was very impressed with the excellent training and awesome trainer! "
Andrew Cocking, NHS. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30/3/2018 to 3/4/2018)

"Firebrand is a professional training provider which provides training courses by fields experts in awesome and distraction less locations."
Yahya Alazri. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29/1/2018 to 2/2/2018)

"Many thanks for the firebrand training. I achieved the CND Course and i really thanking the Instructor for his efforts to get more and more knowledge about the course - he is a great lecturer. I appreciate all firebrand team efforts for providing whatever makes us happy and enjoying the course. "
Ashraf Alkalbani, ITA. - EC-Council Certified Network Defender (CND) (4 days) (26/2/2018 to 1/3/2018)

"My experience at firebrand training has always been positive. The training is excellent, the staff are kind, and the accommodation is very good. Its the best way to learn and certify."
Armand Tusha, Reliance acsn. - EC-Council Certified Network Defender (CND) (4 days) (26/2/2018 to 1/3/2018)

"Excellent instructors who are always happy to give advice and guidance."
Jamie Ridings. - EC-Council Certified Network Defender (CND) (4 days) (26/2/2018 to 1/3/2018)

"Having just completed a week of intense but enjoyable training, for the EC Councils Certified Ethical Hacker v9 at Firebrand Training Ltds Wyboston Lakes facilities and passed the exam on the final day. I can thoroughly recommend the company, facilities, support staff and World Class Instructors at firebrand. I successfully studied and completed my ISC2 CCSP there previously and once again the overall package could not have been bettered anywhere. I have recently experience training with another very well known supplier and frankly Firebrand is in a totally different league with every regard. If you want to obtain IT or Cyber certifications then I suggest you train with the best at Firebrand Wyboston Lakes. I shall be recommending to my colleagues, that they don't even consider this type of training elsewhere. I cant recommend them highly enough. Thanks again Firebrand."
G.H. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"Very good, intense training"
Dave Cleaver. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"The trainer was exceptional. Extremely engaging and really made me feel like he cares about what he does. He imparts a great deal of passion in his teaching."
Imran Mughal. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"Having been to several companies this is still the best. Can't recommend it highly enough!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"This was the most comprehensive, well organised course I've ever attended. Firebrand have done a fantastic job of logistics and the instructors' encyclopedic knowledge of security has made me feel that the CEH delivered much more for me than friends of mine who used other trainers. I would definitely recommend Firebrand, and the CEH. "
Barry Johnson, ampsandvolts. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19/2/2018 to 23/2/2018)

"Great experience, friendly and confident instructor."
Alexander Rambart, Aiutd Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/1/2018 to 26/1/2018)

"An intense way to learn but if you can put in the effort and commitment it is an excellent way to learn. "
David Stewart. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/1/2018 to 26/1/2018)

"Hard work but gets results!"
Peter Kelly, DWP. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/1/2018 to 26/1/2018)

"Firebrand's approach is a good way forward for students to fully focus and concentrate on the course and the exam!"
Tajinderpal Shahi. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/12/2017 to 15/12/2017)

"Great trainer , long days but really enjoyed this. Hope to see you again soon. "
Stew Evans, LBG(. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11/12/2017 to 15/12/2017)

"Real world training with plenty of practical examples and not entirely focused on teaching to pass exams."
Kristofer Donaghy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (6/11/2017 to 10/11/2017)

"Very happy with the training and trainer."
Jamie Ridings, Bartec Paper & Packaging LTD. - EC-Council Certified Ethical Hacker (CEH) (5 days) (6/11/2017 to 10/11/2017)

"Greatly organised, well taught, great content and the instructor was really engaging. "
Phil Watson, Lloyds. - EC-Council Certified Ethical Hacker (CEH) (5 days) (23/10/2017 to 27/10/2017)

"I attended the CEH course at De Ruwenberg Hotel. Since it was the first time I attended a course in order to be certified in something related to my professional field, I did not know what to expect. Luckily for me, I didn't turn out to be a twelve-hours-a-day boring and endless course. Thanks to the instructor, the lessons went smoothly and were very entertaining, but without forgetting the main purpose of the course: pass the exam! For this, he proved that he knew what he was talking about, focusing on what was important and always providing practical situations. De Ruwenberg is the perfect hotel to organize these kind of events. Kind staff, quality facilities and surrounded by nature. Firebrand has its own house at the hotel, also with quality facilities, computer rooms with all the software that you might need already installed, snacks and beberages so that you dont have to worry about anything, just learn! In the end I passed the exam and I can say I am CEH certified ! Thank you Firebrand ! "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/10/2017 to 6/10/2017)

"16 hours a day of packed and intense learning but still a big smile at the end and still asking for more."
Stephane Giuliani, Amadeus Data Processin. - EC-Council Certified Ethical Hacker (CEH) (5 days) (2/10/2017 to 6/10/2017)

"Really enjoyable and useful course - an eye-opener to the threats present in today's digital world."
Chris Connor, Manx Telecom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

"Fast-paced but satisfying and informational course. The instructor was knowledgeable and provided so much information regarding the tools of the trade as well as real-time experiences."
John Beck, USAF. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

"Loved the course. learnt so much."
Mark Kneen, Manx Telecom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

"The instructor was very knowledgeable and a great guy to present CEH, I learned a lot this week and proud to see that I have passed the examination. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

"I've left it too long to return to Firebrand! Whilst in nearly 9 years the place has changed quite a bit, the quality of the training has not changed even slightly in a negative way. My experience has been as brilliant as it was in 2009!!"
Mark Cameron. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

"The training enter is very accommodating and excellent instructor."
A.K.K.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

"Great experience. I will recommend Firebrand and their instructors any day and any time. "
B.D.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

"The trainer was extremely experienced and communicated effectively. I think the course should have span over 2 weeks as there was lots material to go through. Nonetheless I still think it was a great course. Learnt a lot and meet some great people. "
Michael Abiola, Merchants (Dimension Data). - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/9/2017 to 29/9/2017)

See prices