EC-Council Certified Secure Programmer (ECSP) - Only 5 Days

Why

Four reasons why you should sit your ECSP course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be ECSP trained and certified faster. Learn more on this 5-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your ECSP course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass ECSP first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study ECSP with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 67.286 students saving more than one million hours since 2001

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

What

Learn how to code and develop secure applications with greater stability and posing minimal security risks to the consumer. Get your EC-Council Certified Secure Programmer certification in just five days. Depending on whether you're used to working with .NET or Java, you'll be able to tailor your course based on the environment you work in. Choose either the .NET or Java labs and exam - and get the accreditation you want.

As an ECSP you'll improve the overall quality of your products and applications by identifying security flaws and implementing security countermeasures throughout the software development life cycle. This course is based on the OWASP (Open Web Application Security Project) Top Ten Threats, a guide to the most common categories of application security problems.

What you'll learn

This course builds on your development skills in C#, C++, Java, PHP, ASP, .NET and SQL. You'll learn about key secure programming topics, including:

  • Framework Security
  • .NET Authentication and Authorisation
  • .NET & Java Cryptography
  • Secure File Handling

If you're designing and building Windows/Web based applications with .NET/Java, the ECSP certification is for you. You'll learn the latest techniques and strategies in secure programming through classroom discussions and a series of practical labs.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call 0720-880599

This course will significantly benefit programmer and developers concerned about the security of their code.

Technical certification is a sound investment in your career - and your organisation. Although certification does not guarantee success, research has shown that it can have a significant impact on:

  • Morale and confidence
  • Efficiency and productivity on the job: 85% of managers view certified employees as more productive (Gartner Study)
  • Career advancement: 70.8% of IT managers view certification as a criteria for promotion (Gartner Study)
  • Financial rewards

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 0720-880599

The curriculum will focus on your chosen ECSP certification language of either .NET or Java.

Introduction to Application Security

  • Become Familiar with. Application Security
  • Understand the Need for Application Security
  • Key Elements of Framework Architecture Security
  • Framework Security Features
  • Top 10 Security Attacks For OWASP
  • Secure Development Lifecycle (SDL)
  • Threat Modeling Process
  • Security Testing
  • Learn Various Secure Coding Principles
  • Guidelines for Developing Secure Codes
  • Confidentiality
  • Integrity
  • Availability
  • Minimal attack surface areas
  • Secure defaults
  • Principle of least privilege
  • Principle of defense in depth
  • Fail securely
  • External systems are insecure
  • Separation of duties
  • No security by obscurity
  • Simplicity
  • Fix security issues correctly

Framework Security

  • Become Familiar with Framework Architecture
  • Learn Framework Runtime Security Model
  • Understanding you’re only as secure as your Framework
  • Role-Based Security
  • Code Access Security (CAS)
  • Evidence-Based Security
  • Permissions and Permissions Classes
  • Become Familiar with Stack Walking Process
  • Isolated Storage
  • Learn About Class Libraries Security
  • .NET Assembly Security
  • Understand Common Threats To .NET Assemblies and Classes

Input Validation and Output Encoding

  • Understand Need of Input Validation
  • Various Input Validation Approaches
  • Learn Various Validation Controls
  • Understand Common Input Validation Attacks
  • Learn Defensive Techniques for XSS Attacks
  • Validation Control’s Vulnerabilities
  • Learn Mitigation Techniques for Validation Control’s Vulnerabilities
  • Learn Defensive Techniques for SQL Injection Attacks
  • Learn Output Encoding To Prevent Input Validation Attacks
  • Sandboxing to Prevent Input Validation Attacks
  • Various Sandboxing Software
  • Best Practices for Input Validation

.NET Authentication and Authorization

  • Authorization and Authentication Processes
  • Understand Common Threats on Authorization and Authentication
  • Authentication and Authorization Security Architecture
  • Understanding the Security Relationship between IIS and ASP.NET
  • Authentication and Its Modes in Detail
  • Authorization and Its Types in Detail
  • Become Familiar with Impersonation and Delegation Concepts
  • Mitigate Authentication and Authorization Vulnerabilities
  • Best Practices for Authentication and Authorization
  • Become Familiar with Secure Communication Concepts

Secure Session and State Management

  • Session Management Concepts
  • Security Principles for Session Management Tokens
  • Common Threats on Session Management
  • The Session Management Techniques
  • Various Session Attacks
  • Defensive Techniques against Session Attacks
  • Become Familiar with Cookie-Based Session Management
  • Cookie Security
  • Viewstate in .NET or HTTP Session Class in Java - Based Session Management
  • Common Threats on Viewstate in .NET or HTTP Session Class in Java
  • Viewstate in .NET or HTTP Session Class in Java Security
  • Guidelines for Secure Session Management

.NET & Java Cryptography

  • Become Familiar with Cryptography in .NET and Java
  • Understand Different Types of Cryptographic Attacks In .NET and Java
  • Become Familiar with Symmetric Encryption
  • Learn How to Secure Symmetric Encryption
  • Become Familiar with Asymmetric Encryption
  • Learn How to Secure Asymmetric Encryption
  • Become Familiar with the Hashing Concept
  • Reversing Hashing - EG. Cracking Passwords

Quick Overview on Password Cracking and how it affects programmers

  • Learn How to Implement Security in Hashing
  • Digital Signatures – If it is valid does that mean it’s not malicious?
  • Digital Certificates – The process start to finish
  • XML Signatures

Error Handling, Auditing, and Logging

  • Errors and Exception Handling
  • The Principles of Secure Error Handling
  • Different Levels of Exception Handling
  • Mitigate Vulnerabilities in Class Level Exception Handling
  • Manage Unhandled Errors
  • Guidelines and Checklists for Proper Exception Handling
  • Become Familiar with Logging and Auditing Process
  • Common Threats to Logging and Auditing
  • Become Familiar with Log Throttling Process
  • Learn How to Implement Windows Log Security against Various Attacks
  • Best Practices and Checklists for Auditing and Logging Security
  • Various Logging Tools

Secure File Handling

  • File Handling Concepts
  • Understand File Handling Security Concerns
  • Path Traversal Attacks on File Handling
  • Learn Defensive Techniques against Path Traversal Attack
  • Canonicalization Attack on File Handling
  • Learn Defensive Techniques against Canonicalization Attack
  • Static Files and their Security
  • The Security of File I/O Using Absolute Path and Map path
  • Security While Uploading Files
  • Become Familiar with the File Extension Handling Concept
  • File ACLS
  • Checklist for Securely Accessing Files

Configuration Management and Secure Code Review

  • Configuration Management
  • Common Threats on Configuration Management
  • Machine Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in Machine Config Files or Web XML or Properties Class in JAVA
  • Application Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in App Config Files or Web XML or Properties Class in JAVA
  • Code Access Security Configuration Files or Web XML or Properties Class or Web XML or Properties Class in JAVA
  • Policy Configuration Files
  • Best Practices for Configuration Management
  • Become Familiar with Secure Code Review
  • Security Code Review Approaches
  • Various Static Code Analysis Tools

JavaScript – Just don’t do it, but if you have to…

  • XSS
  • Reflected
  • Stored
  • DOM
  • XSRF
  • Click Jacking
  • Script Injection

Buffer Overflow

  • Write and implement a buffer overflow on various vulnerabilities

Reversing Java and .NET

  • Both Java and .NET compile to byte code which can be reversed
  • Learn techniques to secure your hard earned code.

OWASP Hands-On Labs:

Unvalidated Redirects and Forwards Lab

  • Testing the attack
  • Fixing the problem on the client side
  • Fixing the problem on the server side

Insufficient Transport Layer Protection Lab

  • Insecure pages
  • Secure login cookies
  • Secure other cookies

A8 Failure to Restrict URL Access Lab

  • Mounting the attack
  • Another hole

Insecure Cryptographic Storage Lab

  • Mounting the attack
  • Preparing to encrypt the file
  • Encrypting the file
  • Decrypting the file
  • Replaying the attack
  • Zeus

Security Misconfiguration Lab

  • Problem 1
  • Problem 2
  • Problem 3
  • Problem 4
  • Mounting an attack
  • Hardening the site

Cross Site Request Forgery Lab

  • Preparing
  • Mounting the attack
  • Hardening the site with a CAPTCHA
  • Re-running the attack
  • Protecting CSRF with synchronizer token pattern
  • Re-running the attack

Insecure Direct Object Reference Lab

  • Mounting the attack
  • Hardening the site
  • Hardening in .Net

Broken Authentication and Session Management Lab

  • Mounting the attack
  • Hardening the site with IP checking
  • Hardening the site with authentication

Cross-Site Scripting Lab

  • Testing for a vulnerability
  • Mounting the attack
  • Hardening the site – encoding output
  • Hardening the site – Using the Anti-XSS library

Injection Flaws Lab

  • Mounting the attack
  • Advanced attack vectors
  • Hardening the site with parameters
  • Bonus! Hardening the site with a whitelist
  • Protecting your update with a whitelist
  • Protecting your update with parameters

Information Leakage and Improper Error Handling Lab

  • Mounting the attack
  • Turning specific errors on
  • Create custom error pages
  • Capturing the error

Cryptography Lab

  • Exploring existing controls

Provider Model Lab

  • Exploring existing controls
  • Add the link
  • Add the page

Click jacking Lab

  • Testing the vulnerability
  • Protecting with X-Frame-Options
  • Protecting with frame-breaking JavaScript

Phishing Lab

  • Creating an uncomplicated site
  • Routes and default values
  • Sending an email

Static Code Analysis Lab

  • Testing the attack

Read more ...

Interested? See prices or call 0720-880599

Depending on the environment you're used to working in, you'll choose and sit one of the following exams:

  • EC-Council ECSP Java Exam: 312-94
  • EC-Council ECSP .NET Exam: 312-93

Read more ...

Interested? See prices or call 0720-880599

Included:

Depending on the environment you're used to working in, you'll choose one of the following sets of courseware:

EC-Council ECSP Java

EC-Council ECSP .NET

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 0720-880599.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC and CISSP CBK Review
  • *** On site testing is not included for our PMI, GIAC, (ISC)2, CREST, CSX Practitioner or ITIL Managers and Revision Certification Courses
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 0720-880599

The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET/Java Framework. It is designed for developers who have C#, C++, Java, PHP, ASP, .NET and SQL development skills.

In order to attend successfully you must have programming fundamental knowledge.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on 0720-880599 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call 0720-880599

When

When do you want to sit your accelerated course?

Start

Finish

Status

Location

Book now

19.2.2018 (Monday)

23.2.2018 (Friday)

Finished

-

 

25.6.2018 (Monday)

29.6.2018 (Friday)

Wait list

Nationwide

 

6.8.2018 (Monday)

10.8.2018 (Friday)

Limited availability

Nationwide

 

17.9.2018 (Monday)

21.9.2018 (Friday)

Open

Nationwide

 

29.10.2018 (Monday)

2.11.2018 (Friday)

Open

Nationwide

 

10.12.2018 (Monday)

14.12.2018 (Friday)

Open

Nationwide

 

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 67.286 students and asked them all to review our Accelerated Learning. Currently, 96.64% have said Firebrand exceeded their expectations:



"The trainer is a great instructor. He teached us very well!"
J. M.. - EC-Council ECSP Fortbildung (5 days) (24.10.2016 to 28.10.2016)

"Good facilities, very knowledgeable instructor."
Anonymous - EC-Council ECSP Fortbildung (5 days) (27.4.2015 to 1.5.2015)

"Every professional .Net programmer should have a security qualification. ECSP will give you that."
S.R. - EC-Council ECSP Fortbildung (5 days) (27.4.2015 to 1.5.2015)

"Firebrand recommended! Good enviroment, good instruction."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (15.5.2017 to 19.5.2017)

"A great training with several additional information not covered by the official documentation. Hard, long, but worth it. Would recommend to everyone who knows a bit about system administration and some networking."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (1.8.2016 to 5.8.2016)

"I liked the course week. It is much more interesting than doing self-study. Instructor has a lot of experience and shares a lot with students (lunch time discussion, interactive courses, etc)."
Anonymous - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (6.6.2016 to 10.6.2016)

"The training was so intensive and effective. With Firebrand Training it's always the fastest way to get valuable knowledge."
Martin Dlouhy, T-Mobile Cyech Republic a.s. / Deutsche Telekom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.5.2015 to 15.5.2015)

"Everything went smoothly, I passed the exam - thanks, Firebrand!"
Julia Juraszek, T-Mobile Polska. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.5.2015 to 15.5.2015)

"I felt like being in another university. Four days full of information before the exam. Very good training and facilities. Very good trainer."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (5.11.2012 to 9.11.2012)

"Very good training to prepare for the exam!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (5.11.2012 to 9.11.2012)

"Very well organised!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (5.11.2012 to 9.11.2012)

"While hard work, the course was engaging and very informative. The new skills learnt will be very useful in my role at work and have already given me an appetite to learn more. The instructor made the subject matter both entertaining and interesting at the same time, breaking up the long days with plenty of demonstrations on the subjects being covered. I'd recommend Firebrand to anyone who needs to learn a subject quickly and is willing to put in the work to attain their certification."
K.C.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"The scope of course was very comprehensive with lots of useful real world material and concepts even for novice security students or students with limited knowledge and experience. Friendly and helpful colleagues and very knowledgeable tutor. Recommended."
Nicholas Mills. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"Reading books and course study notes will get you through the CEH exam. However, the experience that Firebrand and especially my tutor gave me lifted my skills to a new level. I will be back for more training. Thank you"
Barry Starling. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"Excellent course material with an enthusiastic engaging trainer, would happily train here again! "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"I've never used Firebrand before but I was very impressed with the excellent training and awesome trainer! "
Andrew Cocking, NHS. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"Firebrand is a professional training provider which provides training courses by fields experts in awesome and distraction less locations."
Yahya Alazri. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29.1.2018 to 2.2.2018)

"Many thanks for the firebrand training. I achieved the CND Course and i really thanking the Instructor for his efforts to get more and more knowledge about the course - he is a great lecturer. I appreciate all firebrand team efforts for providing whatever makes us happy and enjoying the course. "
Ashraf Alkalbani, ITA. - EC-Council Certified Network Defender (CND) (4 days) (26.2.2018 to 1.3.2018)

"My experience at firebrand training has always been positive. The training is excellent, the staff are kind, and the accommodation is very good. Its the best way to learn and certify."
Armand Tusha, Reliance acsn. - EC-Council Certified Network Defender (CND) (4 days) (26.2.2018 to 1.3.2018)

"Excellent instructors who are always happy to give advice and guidance."
Jamie Ridings. - EC-Council Certified Network Defender (CND) (4 days) (26.2.2018 to 1.3.2018)

"Having just completed a week of intense but enjoyable training, for the EC Councils Certified Ethical Hacker v9 at Firebrand Training Ltds Wyboston Lakes facilities and passed the exam on the final day. I can thoroughly recommend the company, facilities, support staff and World Class Instructors at firebrand. I successfully studied and completed my ISC2 CCSP there previously and once again the overall package could not have been bettered anywhere. I have recently experience training with another very well known supplier and frankly Firebrand is in a totally different league with every regard. If you want to obtain IT or Cyber certifications then I suggest you train with the best at Firebrand Wyboston Lakes. I shall be recommending to my colleagues, that they don't even consider this type of training elsewhere. I cant recommend them highly enough. Thanks again Firebrand."
G.H. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"Very good, intense training"
Dave Cleaver. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"The trainer was exceptional. Extremely engaging and really made me feel like he cares about what he does. He imparts a great deal of passion in his teaching."
Imran Mughal. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"Having been to several companies this is still the best. Can't recommend it highly enough!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"This was the most comprehensive, well organised course I've ever attended. Firebrand have done a fantastic job of logistics and the instructors' encyclopedic knowledge of security has made me feel that the CEH delivered much more for me than friends of mine who used other trainers. I would definitely recommend Firebrand, and the CEH. "
Barry Johnson, ampsandvolts. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"Great experience, friendly and confident instructor."
Alexander Rambart, Aiutd Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22.1.2018 to 26.1.2018)

"An intense way to learn but if you can put in the effort and commitment it is an excellent way to learn. "
David Stewart. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22.1.2018 to 26.1.2018)

"Hard work but gets results!"
Peter Kelly, DWP. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22.1.2018 to 26.1.2018)

"Firebrand's approach is a good way forward for students to fully focus and concentrate on the course and the exam!"
Tajinderpal Shahi. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.12.2017 to 15.12.2017)

"Great trainer , long days but really enjoyed this. Hope to see you again soon. "
Stew Evans, LBG(. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.12.2017 to 15.12.2017)

"Real world training with plenty of practical examples and not entirely focused on teaching to pass exams."
Kristofer Donaghy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (6.11.2017 to 10.11.2017)

"Very happy with the training and trainer."
Jamie Ridings, Bartec Paper & Packaging LTD. - EC-Council Certified Ethical Hacker (CEH) (5 days) (6.11.2017 to 10.11.2017)

"Greatly organised, well taught, great content and the instructor was really engaging. "
Phil Watson, Lloyds. - EC-Council Certified Ethical Hacker (CEH) (5 days) (23.10.2017 to 27.10.2017)

"I attended the CEH course at De Ruwenberg Hotel. Since it was the first time I attended a course in order to be certified in something related to my professional field, I did not know what to expect. Luckily for me, I didn't turn out to be a twelve-hours-a-day boring and endless course. Thanks to the instructor, the lessons went smoothly and were very entertaining, but without forgetting the main purpose of the course: pass the exam! For this, he proved that he knew what he was talking about, focusing on what was important and always providing practical situations. De Ruwenberg is the perfect hotel to organize these kind of events. Kind staff, quality facilities and surrounded by nature. Firebrand has its own house at the hotel, also with quality facilities, computer rooms with all the software that you might need already installed, snacks and beberages so that you dont have to worry about anything, just learn! In the end I passed the exam and I can say I am CEH certified ! Thank you Firebrand ! "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (2.10.2017 to 6.10.2017)

"16 hours a day of packed and intense learning but still a big smile at the end and still asking for more."
Stephane Giuliani, Amadeus Data Processin. - EC-Council Certified Ethical Hacker (CEH) (5 days) (2.10.2017 to 6.10.2017)

"Really enjoyable and useful course - an eye-opener to the threats present in today's digital world."
Chris Connor, Manx Telecom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"Fast-paced but satisfying and informational course. The instructor was knowledgeable and provided so much information regarding the tools of the trade as well as real-time experiences."
John Beck, USAF. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"Loved the course. learnt so much."
Mark Kneen, Manx Telecom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"The instructor was very knowledgeable and a great guy to present CEH, I learned a lot this week and proud to see that I have passed the examination. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"I've left it too long to return to Firebrand! Whilst in nearly 9 years the place has changed quite a bit, the quality of the training has not changed even slightly in a negative way. My experience has been as brilliant as it was in 2009!!"
Mark Cameron. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"The training enter is very accommodating and excellent instructor."
A.K.K.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"Great experience. I will recommend Firebrand and their instructors any day and any time. "
B.D.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"The trainer was extremely experienced and communicated effectively. I think the course should have span over 2 weeks as there was lots material to go through. Nonetheless I still think it was a great course. Learnt a lot and meet some great people. "
Michael Abiola, Merchants (Dimension Data). - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"Really enjoyable week with excellent labs. The tutor was very knowledgeable and answered every questions due to experience of working in the industry."
N.O., O D C I T. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"This was my second training course at Firebrand and very satisfied with the training and facilities both times. My trainer is very experienced and extremely knowledgable, and was happy to expand on any questions or points with lots of information, references and useful tips. "
N.V.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"I enjoyed the course though it is unbelievably fast paced. I feel it has given me some new skills which I can utilise in the future."
C.S., Manx Telecom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25.9.2017 to 29.9.2017)

"A great course backed up by real world experience. The instructor has a great way of delivering the content and injecting fun into the course. I will certainly use the knowledge gained moving forward."
C.S.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4.9.2017 to 8.9.2017)

"It was a great experience to attend this training. Although it was a lot of information in only 5 days, I have learned about a lot of tools, methodologies, devices. IT Security is a long journey and this was a great start for me. "
Kamil Bosowski, Akamai. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4.9.2017 to 8.9.2017)

"The CEH course was full of valuable content and in particular the delivery was flawless. This was due to the structure, facilities and especially the instructor who delivered the course. The instructor applied personal experience combined with course material. Ive gained phenomenal experience and skill set by attending and completing this course successfully. I would absolutely recommend this course with Firebrand to friends and colleagues."
O.A.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (21.8.2017 to 25.8.2017)

"The course was very fast paced but the instructor was extremely knowledgeable and passionate about the subject. He brought his real world experiences into the classroom and demonstrated lots of software and hardware to us. I would recommend him to any perspective student. "
Jason Lake, Frankton Group LTD. - EC-Council Certified Ethical Hacker (CEH) (5 days) (21.8.2017 to 25.8.2017)

See prices