EC-Council Training

EC Council Training and Certifications

Learn More About EC-Council Training & Certifications

The International Council of Electronic Commerce Consultants (EC-Council) is a long-standing professional certification organization for IT Professionals. The EC-Council's goal is to provide support for individuals who create and maintain security and IT systems.

Download the EC-Council Program Guide


What is Ethical Hacking aka White Hat Hacking?

Ethical hacking describes hacking performed by an individual or group of individuals, usually hired by companies or governments, to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. Ethical Hacking, often applied in a method called Penetration Testing, is an act of forceful access into systems or networks to discover threats which may be exploited by malicious actors resulting in the loss of data, financial loss, or other major damages. Ethical hacking refers to the process of locating these weaknesses and vulnerabilities by duplicating the intent and actions of those they are seeking to counter. Watch this webinar on EC-Council Vulnerability Assessment and Penetration Testing (VAPT) Trends.


How to Become a Certified Ethical Hacker

Start with the basics: Earn your A+ Certification and get a tech support position. After some experience and additional certification (Network+ or CCNA), move up to a network support or admin role, and then to network engineer after a few years.

Next, or if you are already a few years into your IT career, put some time into earning security certifications (Security+, CISSP, or TICSA) and find an information security position. While you're there, try to concentrate on penetration testing and get some experience with the tools of the trade. Then work toward the Certified Ethical Hacker (CEH) certification. The CEH training course costs $3,395 and lasts for 40 hours over 5 days. At that point, you can start marketing yourself as an ethical hacker.

Networking know-how is vital; but make sure that you gain experience in related areas as well. Discover and play with Unix/Linux commands and distributions. Make sure you also learn some programming such as C/C++, Python, LISP, Ruby, Perl, or Java, and spend some time with databases such as SQL.

Start your journey toward an Ethical Hacking career today.


Certified Ethical Hacker Prerequisites

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. In order to be prepared, you'll want to ensure you have some exposure to the basics of information gathering, attacking computers or servers, wireless attacks, and social engineering. The certifications that form the building blocks of cybersecurity knowledge, such as CompTIA A+, Network+, and Security+, while not necessary are helpful in preparing you to take the CEH.

Find out if Ethical Hacking might be right for you.



What is a Computer Hacking Forensic Investigator? (CHFI)

Computer Investigation techniques are being used by police, government, and corporate entities globally, and many of them turn to EC-Council for the Computer Hacking Forensic Investigator CHFI Certification Program. A CHFI is responsible for obtaining information from remote servers, computers, flash drives, and other forms of data storage devices. A forensic analyst works with both law enforcement agencies as well as private organizations in hunting down criminal evidence hidden in the virtual world and tracing the evidence back to its owner in the real world.

In order to press criminal charges, the analyst will also, at times, have to personally testify in court to confirm the veracity of the evidence. All areas of cybercrime, from financial fraud, destruction of evidence, infringement of intellectual property, to corporate theft come under the surveillance of a Computer Hacking Forensic Investigator. The world of cyber security is witnessing a huge demand for skilled computer hacking forensic investigators (CHFI). With the citizens of the internet coming up with new ways every day to use the digital world for the purposes of hoodwinking strangers and performing crimes while sitting safely behind their computers, another army has risen on the other side that has been entrusted with the task of keeping virtual crimes in check.

Learn more about computer forensics here.


How to Become a Certified Hacking Forensic Investigator (CHFI)

A job with the kind of high pay and specialized skill set offered by a computer hacking investigator needs proper certification. The CHFI certificate is used to confirm the candidate’s skills in terms of cybersecurity and detection of an intruder's presence, as well as tracking the criminal back to his home computer, and gathering evidence to charge him with the crime. 


CHFI Prerequisites

The work of a computer hacking forensic investigator asks for highly skilled professionals with an excellent and intimate knowledge of cyber security. Candidates must also possess excellent auditing and reporting skills. They must possess the know-how to immediately detect a security breach and take steps to recover. A great deal of patience is required in order to sift through the mountain of information on the web to find evidence of a cybercrime. The ideal candidate to become a CHFI professional include:
  • Those involved in the field of defense and security.
  • Those familiar with the virtual world and online security issues.
  • Professionals from the world of banking and insurance.
  • Professionals with some experience in law and legal aid.
  • Government officials and IT persons with experience in dealing with cybercrimes.
  • Law enforcement personnel



Learn more about EC-Council certifications and associated training in the tabs below:

Certified Ethical Hacker (CEH)

Certified Ethical Hacker training and certification at New Horizons will help you learn to stop hackers by thinking and acting like one. The CEH training immerses students in an interactive environment where they will learn how to scan, test, hack, and secure their own systems. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

Course: Certified Ethical Hacker (CEH)
Exam: Certified Ethical Hacker (CEH)

The CEH certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

Computer Hacking Forensic Investigator (CHFI)

The CHFI certification from EC-Council is an advanced certification for forensic network security investigators. As cybercrime has increased, the need for computer forensic investigators has grown dramatically. CHFI certified candidates may investigate invasion or theft of intellectual property, misuse of IT systems and violations of corporate IT usage policies.

Course: Computer Hacking Forensic Investigator (CHFI)
Exam: Computer Hacking Forensic Investigator (CHFI)

The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal."

Licensed Penetration Tester (LPT)

EC-Council’s Licensed Penetration Tester (LPT) certification is a natural evolution and extended value addition to its series of security related professional certifications. The LPT standardizes the knowledge base for penetration testing professionals by incorporating best practices followed by experienced experts in the field.

Course: Complete Penetration Testing – 10 Day
Exam: Licensed Penetration Tester (LPT)

Gain the in-demand career skills of a professional security tester. Learn the methodologies, tools, and manual hacking techniques used by penetration testers.

EC-Council Certified Security Analyst (ECSA)

The ECSA certification is an advanced ethical hacking training certification that complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. The ECSA penetration testing course provides you with a real-world, hands-on penetration testing experience and is a globally accepted hacking and penetration testing class that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

Course: EC-Council ECSA/LPT V8.0
Exam: EC-Council Certified Security Analyst (ECSA)
Level: Advanced

From the commencement of the 5-day class and the activation of the ECSA Dashboard on EC-Council’s ASPEN platform, students will have 60 days in total to submit their penetration testing report based on the challenge scenario to EC-Council, which will prove that students understand the concepts taught in the course. This is the eligibility criterion to enable students to challenge the ECSA exam. The Final ECSA exam is a multiple-choice question exam. The ECSA v9 exam includes 2 required stages. Report writing stage requires candidates to perform various penetration testing exercises on EC-Council’s iLabs before submitting a penetration test report to EC-Council for assessment. Students who submit reports to the required standards will be provided with exam vouchers for the multiple-choice exam.

Certified Chief Information Security Officer (C|CISO)

The C|CISO certifcation is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the C|CISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the fnancial expertise vital for leading a highly successful IS program.

The C|CISO Training Program can be the key to a successful transition to the highest ranks of information security management.

Course: EC-Council Certified Chief Information Security Officer (C-CISO)
Exam: Certified Chief Information Security Officer (C|CISO)
Level: Advanced

Certified Network Defender (CND)

CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks.

The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations.

Course: Certified Network Defender (CND)
Exam: Certified Network Defender (CND)
Level: Advanced

Find A Location Near You

Ready to become an EC-Council certified professional? Looking to advance your career or start a new one? New Horizons Learning Group provides a clear learning path and training for professionals looking to master EC-Council. New Horizons Learning Group has 10 convenient locations in major west coast and southwestern cities. Each of our facilities are equipped with state-of-the-art technology and well versed instructors. Most of our courses can be taken in person or online. We provide hosted long distance courses, online live, dedicated and onsite training for groups, instructor led courses, and even custom courses. Find one of our convenient locations near you and start learning today:


Contact Us

EC-Council Courses

What Our Students Say

  • 79% of IT Professionals improved productivity from their training at New Horizons
  • 89% returned to New Horizons to further their skills
  • 90% of IT Professionals recommend New Horizons
  • 91% felt New Horizons content prepared them for certification
  • 92% took additional courses with New Horizons because of Instructor Quality
  • 98% would recommend New Horizons to others
  • 100% have increased their job security by taking a course

Learn More

Popular Upcoming EC-Council Courses

Course Starts Location Price
EC-Council Certified Ethical Hacker (CEH) v10.0 11/09/2020 Online LIVE - Remote Learning (Pacific Time)
EC-Council Certified Ethical Hacker (CEH) v10.0 11/09/2020 HDL - All Locations (Pacific Time)
EC-Council Certified Ethical Hacker (CEH) v10.0 12/07/2020 Online LIVE - Remote Learning (Pacific Time)
EC-Council Certified Ethical Hacker (CEH) v10.0 12/07/2020 HDL - All Locations (Pacific Time)
EC-Council Certified Ethical Hacker (CEH) v10.0 1/11/2021 Online LIVE - Remote Learning (Pacific Time)
EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0 12/07/2020 Online LIVE - Remote Learning (Pacific Time)
EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0 12/07/2020 HDL - All Locations (Pacific Time)
EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0 3/15/2021 Online LIVE - Remote Learning (Pacific Time)
EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0 3/15/2021 HDL - All Locations (Pacific Time)
EC-Council Computer Hacking Forensics Investigator (CHFI) v9.0 6/07/2021 Online LIVE - Remote Learning (Pacific Time)
EC-Council Certified Network Defender (CND) 11/09/2020 Online LIVE - Remote Learning (Pacific Time)
EC-Council Certified Network Defender (CND) 11/09/2020 HDL - All Locations (Pacific Time)
EC-Council Certified Network Defender (CND) 3/08/2021 Online LIVE - Remote Learning (Pacific Time)
EC-Council Certified Network Defender (CND) 3/08/2021 HDL - All Locations (Pacific Time)
EC-Council Certified Network Defender (CND) 5/17/2021 Online LIVE - Remote Learning (Pacific Time)

Trust Banner - CyberSecurity - EC Council637199935483888082

What Our Students Say About Cybersecurity Training and Certifications

"The training provided by the New Horizons professors have been integral in expanding my knowledge and skillset. I have a deeper and more granular comprehension of network protocols and Cyber Security practices and tools that enables me to support more advanced projects. I have taken over the chair position for Certified Ethical Hacker Workshop provided by Raytheon for internal employees. I am assisting senior engineers in focusing their studies to obtain their CEH certification."

Jonathan Chang
Systems Engineer
Raytheon IDS

"I was initially skeptical about bring a trainer in to train a significant amount of employees. However, after the first class was over, and I saw that people stayed with us the entire time, I was relieved. I heard nothing but positive comments about the sessions. The cost of training compared to the cost of technology solutions designed to combat phishing email is not even close. The training dollars spent will payback almost immediately."

Ron Boyer
IT Director
Summit County

“I took my Security+ classes at New Horizons to help me get ready for my certification. The computer based learning classes allowed me to learn at my own pace and as a Veteran I was able to use my GI Bill. Everything was too easy and worked out great! I plan to definitely go back to take other computer classes.”

Jerry Ventura