EC-Council Certified Network Defender (CND) - Only 4 Days

Why

Four reasons why you should sit your CND course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be CND trained and certified faster. Learn more on this 4-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your CND course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass CND first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study CND with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 67.286 students saving more than one million hours since 2001

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

What

On this accelerated 4 day Certified Network Defender course you will develop your understanding of network security technologies and operations.

We live in a digital age where cyber crime poses an ever increasing threat to individuals and businesses alike. In order to prevent costly and destructive breaches, you and your organisation must be appropriately skilled and aware of the potential threats. The CND course will teach you the critical skills necessary to protect detect and respond to cyber attacks.

Your EC-Council certified instructor will employ Firebrand’s unique Lecture | Lab | Review technique, making use of theoretical content as well as hands-on tasks on major network security tools and techniques. Made up of 50% practical work this course will provide network administrators with real-world expertise on current network security technologies and operations such as:

  • Network security controls, protocols and devices
  • Security policies for your organisation
  • Choosing appropriate firewall solution, topology and configurations
  • Risk and vulnerability assessment
  • First response to a network security incident

On this course you’ll be prepared to sit the Certified Network Defender (CND) 312-38 exam. You’ll sit this on-site, during the course, covered by your Certification Guarantee.

This course, which is 20% faster than traditional training, is ideal if you're a Network Administrator, Network Security Administrator, Network Security Engineer or you're involved in network operations.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

EC-Council's CND certification is accredited by the American National Standard Institute (ANSI). Organisations with ANSI accreditation are required to undergo stringent quality reviews and assessments. EC-Council is one of just a handful of certification bodies to achieve ANSI accreditation.

Read more ...

Interested? See prices or call 0720-880599

  • Get certified 20% faster: Get trained in just 4 days compared with 5 days on other traditional courses. This means you’ll be back at work sooner, applying your new found skills.
  • EC-Council Official Curriculum: You will have access to official EC-Council curriculum, which means the content will be the most current and up-to-date.
  • EC-Council Certified Instructors: Our EC-Council instructors have years of industry-relevant knowledge, which can be used to provide valuable context to the course material.
  • Lecture | Lab | Review: This Firebrand technique employs a mixture of theoretical and practical work designed to help you retain information and develop the skills to apply your knowledge to real-world scenarios.

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 0720-880599

In preparing you to become a Certified Network Defender, the CND course will cover the following domains in Cyber defence:

Module 01: Computer Network Defense Fundamentals

  • Network Fundamentals
  • Network Components
  • TCP/IP Networking Basics
  • TCP/IP Protocol Stack
  • IP Addressing
  • Computer Network Defense (CND)
  • CND Triad
  • CND Process
  • CND Actions
  • CND Approaches

Module 02: Network Security Threats, Vulnerabilities, and Attacks

  • Essential Terminologies
  • Network Security Concerns
  • Network Security Vulnerabilities
  • Network Reconnaissance Attacks
  • Network Access Attacks
  • Denial of Service (DoS) Attacks
  • Distributed Denial-of-Service Attack (DDoS)
  • Malware Attacks

Module 03: Network Security Controls, Protocols, and Devices

  • Fundamental Elements of Network Security
  • Network Security Controls
  • User Identification, Authentication, Authorisation and Accounting
  • Types of Authorisation Systems
  • Authorisation Principles
  • Cryptography
  • Security Policy
  • Network Security Devices
  • Network Security Protocols

Module 04: Network Security Policy Design and Implementation

  • What is Security Policy?
  • Internet Access Policies
  • Acceptable-Use Policy
  • User-Account Policy
  • Remote-Access Policy
  • Information-Protection Policy
  • Firewall-Management Policy
  • Special-Access Policy
  • Network-Connection Policy
  • Business-Partner Policy
  • Email Security Policy
  • Passwords Policy
  • Physical Security Policy
  • Information System Security Policy
  • Bring Your Own Devices (BYOD) Policy
  • Software/Application Security Policy
  • Data Backup Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Internet Usage Policies
  • Server Policy
  • Wireless Network Policy
  • Incidence Response Plan (IRP)
  • User Access Control Policy
  • Switch Security Policy
  • Intrusion Detection and Prevention (IDS/IPS) Policy
  • Personal Device Usage Policy
  • Encryption Policy
  • Router Policy
  • Security Policy Training and Awareness
  • ISO Information Security Standards
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Information Security Acts: Sarbanes Oxley Act (SOX)
  • Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
  • Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Other Information Security Acts and Laws

Module 05: Physical Security

  • Physical Security
  • Access Control Authentication Techniques
  • Physical Security Controls
  • Other Physical Security Measures
  • Workplace Security
  • Personnel Security: Managing Staff Hiring and Leaving Process
  • Laptop Security Tool: EXO5
  • Environmental Controls
  • Physical Security: Awareness /Training
  • Physical Security Checklists

Module 06: Host Security

  • Host Security
  • OS Security
  • Linux Security
  • Securing Network Servers
  • Hardening Routers and Switches
  • Application/software Security
  • Data Security
  • Virtualisation Security

Module 07: Secure Firewall Configuration and Management

  • Firewalls and Concerns
  • What Firewalls Does?
  • What should you not Ignore?: Firewall Limitations
  • How Does a Firewall Work?
  • Firewall Rules
  • Types of Firewalls
  • Firewall Technologies
  • Firewall Topologies
  • Firewall Rule Set & Policies
  • Firewall Implementation
  • Firewall Administration
  • Firewall Logging and Auditing
  • Firewall Anti-evasion Techniques
  • Why Firewalls are Bypassed?
  • Full Data Traffic Normalisation
  • Data Stream-based Inspection
  • Vulnerability-based Detection and Blocking
  • Firewall Security Recommendations and Best Practices
  • Firewall Security Auditing Tools

Module 08: Secure IDS Configuration and Management

  • Intrusions and IDPS
  • IDS
  • Types of IDS Implementation
  • IDS Deployment Strategies
  • Types of IDS Alerts
  • IPS
  • IDPS Product Selection Considerations
  • IDS Counterparts

Module 09: Secure VPN Configuration and Management

  • Understanding Virtual Private Network (VPN)
  • How VPN works?
  • Why to Establish VPN ?
  • VPN Components
  • VPN Concentrators
  • Types of VPN
  • VPN Categories
  • Selecting Appropriate VPN
  • VPN Core Functions
  • VPN Technologies
  • VPN Topologies
  • Common VPN Flaws
  • VPN Security
  • Quality Of Service and Performance in VPNs

Module 10: Wireless Network Defense

  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standard
  • Wireless Topologies
  • Typical Use of Wireless Networks
  • Components of Wireless Network
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access) Encryption
  • WPA2 Encryption
  • WEP vs. WPA vs. WPA2
  • Wi-Fi Authentication Method
  • Wi-Fi Authentication Process Using a Centralised Authentication Server
  • Wireless Network Threats
  • Bluetooth Threats
  • Wireless Network Security
  • Wi-Fi Discovery Tools
  • Locating Rogue Access points
  • Protecting from Denial-of-Service Attacks: Interference
  • Assessing Wireless Network Security
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyser
  • WPA Security Assessment Tool
  • Wi-Fi Vulnerability Scanning Tools
  • Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
  • WIPS Tool
  • Configuring Security on Wireless Routers
  • Additional Wireless Network Security Guidelines

Module 11: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)
  • Network Monitoring: Positioning your Machine at Appropriate Location
  • Network Traffic Signatures
  • Packet Sniffer: Wireshark
  • Detecting OS Fingerprinting Attempts
  • Detecting PING Sweep Attempt
  • Detecting ARP Sweep/ ARP Scan Attempt
  • Detecting TCP Scan Attempt
  • Detecting SYN/FIN DDOS Attempt
  • Detecting UDP Scan Attempt
  • Detecting Password Cracking Attempts
  • Detecting FTP Password Cracking Attempts
  • Detecting Sniffing (MITM) Attempts
  • Detecting the Mac Flooding Attempt
  • Detecting the ARP Poisoning Attempt
  • Additional Packet Sniffing Tools
  • Network Monitoring and Analysis
  • Bandwidth Monitoring

Module 12: Network Risk and Vulnerability Management

  • What is Risk?
  • Risk Levels
  • Risk Matrix
  • Key Risk Indicators(KRI)
  • Risk Management Phase
  • Enterprise Network Risk Management
  • Vulnerability Management

Module 13: Data Backup and Recovery

  • Introduction to Data Backup
  • RAID (Redundant Array Of Independent Disks) Technology
  • Storage Area Network (SAN)
  • Network Attached Storage (NAS)
  • Selecting Appropriate Backup Method
  • Choosing the Right Location for Backup
  • Backup Types
  • Conducting Recovery Drill Test
  • Data Recovery
  • Windows Data Recovery Tool
  • RAID Data Recovery Services
  • SAN Data Recovery Software
  • NAS Data Recovery Services

Module 14: Network Incident Response and Management

  • Incident Handling and Response
  • Incident Response Team Members: Roles and Responsibilities
  • First Responder
  • Incident Handling and Response Process
  • Overview of IH&R Process Flow

Read more ...

Interested? See prices or call 0720-880599

You will sit the Certified Network Defender (CND) 312-38 exam on-site as part of the course. This is covered by your Certification Guarantee.

  • Exam Title: CND
  • Exam code: 312-38
  • Number of questions: 100
  • Duration: 4 Hours
  • Availability: ECC Exam
  • Test Format: Interactive Multiple Choice Questions

Read more ...

Interested? See prices or call 0720-880599

As part of your accelerated course, you'll get access to EC-Council Official Curriculum.

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 0720-880599.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC and CISSP CBK Review
  • *** On site testing is not included for our PMI, GIAC, (ISC)2, CREST, CSX Practitioner or ITIL Managers and Revision Certification Courses
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 0720-880599

There are currently no prerequisites for this course but having a basic understanding of Network Security will help.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on 0720-880599 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call 0720-880599

When

When do you want to sit your accelerated course?

Start

Finish

Status

Book now

Finished

 

Open

Book now

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 67.286 students and asked them all to review our Accelerated Learning. Currently, 96.67% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"Extraordinary good trainer! He was skilled, well educated and made course material a lot more understandable by giving examples from his own professional experience. The training itself was well prepared and well organized."
Malte Fiedler , T-Systems. - EC-Council Certified Network Defender (CND) (4 days) (28.5.2018 to 31.5.2018)

"Courses are given in an interactive way by a highly qualified trainer which makes the courses very lively and interesting to follow."
Anonymous - EC-Council Certified Network Defender (CND) (4 days) (28.5.2018 to 31.5.2018)

"Many thanks for the firebrand training. I achieved the CND Course and i really thanking the Instructor for his efforts to get more and more knowledge about the course - he is a great lecturer. I appreciate all firebrand team efforts for providing whatever makes us happy and enjoying the course. "
Ashraf Alkalbani, ITA. - EC-Council Certified Network Defender (CND) (4 days) (26.2.2018 to 1.3.2018)

"My experience at firebrand training has always been positive. The training is excellent, the staff are kind, and the accommodation is very good. Its the best way to learn and certify."
Armand Tusha, Reliance acsn. - EC-Council Certified Network Defender (CND) (4 days) (26.2.2018 to 1.3.2018)

"Excellent instructors who are always happy to give advice and guidance."
Jamie Ridings. - EC-Council Certified Network Defender (CND) (4 days) (26.2.2018 to 1.3.2018)

"Firebrand training is one of the best that facilities fast learning in an easy environment. Accommodation and food here are superb. Im back again for my (ICS)2 CISSP later on in the year."
Mathew Batchelor, Network UK Consultancy Ltd. - EC-Council Certified Network Defender (CND) (4 days) (22.5.2017 to 25.5.2017)

"Very quick and information heavy, but very well explained. The instructors knowledge and understanding is brilliant and he was very helpful."
J.G.. - EC-Council Certified Network Defender (CND) (4 days) (22.5.2017 to 25.5.2017)

"A great way to learn and obtain new certifications, ideal for busy professionals due to the condensed timescales. Hands-on labs with 24 hour access help to learn the material too."
A.A-R. - EC-Council Certified Network Defender (CND) (4 days) (22.5.2017 to 25.5.2017)

"If you know what you are doing and want to get certified quickly, Firebrand is your best option."
C.G., GCASSOCIATES. - EC-Council Certified Network Defender (CND) (4 days) (27.2.2017 to 2.3.2017)

"Firebrand recommended! Good enviroment, good instruction."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (15.5.2017 to 19.5.2017)

"The trainer is a great instructor. He teached us very well!"
J. M.. - EC-Council ECSP Fortbildung (5 days) (24.10.2016 to 28.10.2016)

"A great training with several additional information not covered by the official documentation. Hard, long, but worth it. Would recommend to everyone who knows a bit about system administration and some networking."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (1.8.2016 to 5.8.2016)

"I liked the course week. It is much more interesting than doing self-study. Instructor has a lot of experience and shares a lot with students (lunch time discussion, interactive courses, etc)."
Anonymous - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (6.6.2016 to 10.6.2016)

"The training was so intensive and effective. With Firebrand Training it''s always the fastest way to get valuable knowledge."
Martin Dlouhy, T-Mobile Cyech Republic a.s. / Deutsche Telekom. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.5.2015 to 15.5.2015)

"Everything went smoothly, I passed the exam - thanks, Firebrand!"
Julia Juraszek, T-Mobile Polska. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.5.2015 to 15.5.2015)

"I felt like being in another university. Four days full of information before the exam. Very good training and facilities. Very good trainer."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (5.11.2012 to 9.11.2012)

"Very good training to prepare for the exam!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (5.11.2012 to 9.11.2012)

"Very well organised!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (5.11.2012 to 9.11.2012)

"Great instructor, who worked really hard to help us learn and develop after the course."
Andrew Moore, University of London. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4.6.2018 to 8.6.2018)

"Now on my fifth course with Firebrand. Feeling tired now, but definitely worthwhile."
Jonathan Freedman , Howard Kennedy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4.6.2018 to 8.6.2018)

"The trainer has been a very good. He has managed to make the course very interesting, providing his experience and real use cases. I''d recommend taking a course with him."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (4.6.2018 to 8.6.2018)

"Really enjoyed my second time here - really educational with lots of information, tools and help."
J.G.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (4.6.2018 to 8.6.2018)

"This was my first Firebrand course, I found it intense but very rewarding when I successfully passed at the end of the week. "
Richard Matthew, Lloyds Banking Group. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.4.2018 to 4.5.2018)

"Fantastic training, very long hours but worth it in the end. Will be booking my next course here."
Ian Lindley, Innogy Business Services. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.4.2018 to 4.5.2018)

"Extremely good knowledgeable trainer, good course great location to the hotel. I feel like I have learnt a lot in the 5 days that I have been here ."
Mark Ben Langley, NMI metrology and gaming . - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"Our instructor is incredible, cant say I''ve ever learned more on a course. We covered the course material but he added real life experience for pen testing which is invaluable. He is great at motivating people."
A.M. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.4.2018 to 4.5.2018)

"Fantastic course delivered by a true expert."
Andrew Starr, OpenIP Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.4.2018 to 4.5.2018)

"As the first external training by the company, i can report back and give some very positive feedback :-)"
Steven Davies, S-Connect. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"In short it was a very pleasant stay at the hotel, and the instructor was great."
Anonymous - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (16.4.2018 to 20.4.2018)

"Great experience, intense at time but worth it. Enjoyed all the hands on experience "
Enda Dorrian, NS + I. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9.4.2018 to 13.4.2018)

"First time in Benelux and have been impressed by the facilities, supportive and friendly staff of both the hotel and Firebrand. A lot of material to cover however, the instructor equips you with experience and knowledge to build upon. "
Jeremy Green, Firebrand Training. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9.4.2018 to 13.4.2018)

"Firebrand Training fulfilled my expectations and then some. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (9.4.2018 to 13.4.2018)

"While hard work, the course was engaging and very informative. The new skills learnt will be very useful in my role at work and have already given me an appetite to learn more. The instructor made the subject matter both entertaining and interesting at the same time, breaking up the long days with plenty of demonstrations on the subjects being covered. I''d recommend Firebrand to anyone who needs to learn a subject quickly and is willing to put in the work to attain their certification."
K.C.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"The scope of course was very comprehensive with lots of useful real world material and concepts even for novice security students or students with limited knowledge and experience. Friendly and helpful colleagues and very knowledgeable tutor. Recommended."
Nicholas Mills. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"Reading books and course study notes will get you through the CEH exam. However, the experience that Firebrand and especially my tutor gave me lifted my skills to a new level. I will be back for more training. Thank you"
Barry Starling. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"Excellent course material with an enthusiastic engaging trainer, would happily train here again! "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"I''ve never used Firebrand before but I was very impressed with the excellent training and awesome trainer! "
Andrew Cocking, NHS. - EC-Council Certified Ethical Hacker (CEH) (5 days) (30.3.2018 to 3.4.2018)

"Firebrand is a professional training provider which provides training courses by fields experts in awesome and distraction less locations."
Yahya Alazri. - EC-Council Certified Ethical Hacker (CEH) (5 days) (29.1.2018 to 2.2.2018)

"Having just completed a week of intense but enjoyable training, for the EC Councils Certified Ethical Hacker v9 at Firebrand Training Ltds Wyboston Lakes facilities and passed the exam on the final day. I can thoroughly recommend the company, facilities, support staff and World Class Instructors at firebrand. I successfully studied and completed my ISC2 CCSP there previously and once again the overall package could not have been bettered anywhere. I have recently experience training with another very well known supplier and frankly Firebrand is in a totally different league with every regard. If you want to obtain IT or Cyber certifications then I suggest you train with the best at Firebrand Wyboston Lakes. I shall be recommending to my colleagues, that they don''t even consider this type of training elsewhere. I cant recommend them highly enough. Thanks again Firebrand."
G.H. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"Very good, intense training"
Dave Cleaver. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"The trainer was exceptional. Extremely engaging and really made me feel like he cares about what he does. He imparts a great deal of passion in his teaching."
Imran Mughal. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"Having been to several companies this is still the best. Can''t recommend it highly enough!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"This was the most comprehensive, well organised course I''ve ever attended. Firebrand have done a fantastic job of logistics and the instructors'' encyclopedic knowledge of security has made me feel that the CEH delivered much more for me than friends of mine who used other trainers. I would definitely recommend Firebrand, and the CEH. "
Barry Johnson, ampsandvolts. - EC-Council Certified Ethical Hacker (CEH) (5 days) (19.2.2018 to 23.2.2018)

"Great experience, friendly and confident instructor."
Alexander Rambart, Aiutd Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22.1.2018 to 26.1.2018)

"An intense way to learn but if you can put in the effort and commitment it is an excellent way to learn. "
David Stewart. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22.1.2018 to 26.1.2018)

"Hard work but gets results!"
Peter Kelly, DWP. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22.1.2018 to 26.1.2018)

"Firebrand''s approach is a good way forward for students to fully focus and concentrate on the course and the exam!"
Tajinderpal Shahi. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.12.2017 to 15.12.2017)

"Great trainer , long days but really enjoyed this. Hope to see you again soon. "
Stew Evans, LBG(. - EC-Council Certified Ethical Hacker (CEH) (5 days) (11.12.2017 to 15.12.2017)

"Real world training with plenty of practical examples and not entirely focused on teaching to pass exams."
Kristofer Donaghy. - EC-Council Certified Ethical Hacker (CEH) (5 days) (6.11.2017 to 10.11.2017)

"Very happy with the training and trainer."
Jamie Ridings, Bartec Paper & Packaging LTD. - EC-Council Certified Ethical Hacker (CEH) (5 days) (6.11.2017 to 10.11.2017)

See prices