In partnership with EC-Council, Secureway NL provides intensive, immersion training courses designed to help you and your staff master the practical steps necessary for defending applications, systems and networks.
Secureway NL offers courses across several formats to fit your schedule. Take your course in a classroom or online (self paced).
IT Security Management: Certified Chief Information Security Officer
The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. The EC-Council CCISO Body of Knowledge covers all five the CCISO Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.
Ethical Hacking: Certified Ethical Hacker
CEHv10 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed to the content presented in the CEHv10 courseware. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community
Certified Network Defender (CND)
This is the world’s most advanced Certified Network Defense course with 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks.
Computer Forensics: Computer Hacking Forensic Investigator (CHFI)
This computer forensics course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?”
Pen Testing: Certified Security Analyst/Licensed Pen Tester
EC Council Certified Security Analyst, ECSA complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies.
Computer Security Incident Handling: Certified Incident Handler
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.
Core Concepts: EC-Council Core Concepts
EC-Council’s Core Concepts course is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security. Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training.
Security Awareness: Certified Secure Computer User
The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats.
Certified Encryption Specialist (ECES)
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES.
EC-Council Disaster Recovery Professional (EDRP)
EC Council Disaster Recovery Professional (EDRP) is a compressive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans.
Advanced Penetration Testing
This course will teach you how to perform a professional security test as well as how to produce the next most important thing: the findings and the report!