EC-Council Certifications

Whether you want to be an Ethical Hacker or a Network Defender, EC-Council offers a wide array of certifications to kick-start your cyber security career. Prep with Pluralsight's security professional training to build the toolkit you need to take on EC-Council certifications like Certified Ethical Hacker and more!

EC-Council Certifications

Courses
Newest Courses
Beginner
Jul 7, 2016
2h 59m
(56)
Beginner
Oct 8, 2015
4h 49m
(311)
Beginner
May 19, 2015
5h 25m
(385)
Beginner
May 3, 2016
52m 45s
(51)
Beginner
May 27, 2016
4h 2m
(31)
Beginner
Mar 21, 2016
2h 49m
(72)
Beginner
Feb 4, 2016
4h 36m
(82)
Beginner
Jul 18, 2016
4h 43m
(25)
This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the...
Welcome to the world of ethical hacking. This series will teach you the basic concepts, techniques, concerns, tools and technologies involved in ethical hacking. The courses in this path are aligned to v9.
Great! You have just finished setting up your wireless network. You did everything you were suppose to, like giving your SSID a unique name and securing your network with a strong password, so that someone can't piggyback off your network. Now that you are "safe and secure," you don't have to...
"The Cloud" is revolutionizing how we run software and services by providing low cost, flexible, and innovative alternatives to traditional hosting models. However, with the shift to cloud comes new security considerations. The cloud isn't more secure or less secure, rather it's differently...
The security profile of web applications is enormously important when it comes to protecting sensitive customer data, financial records, and reputation. Yet, web applications are frequently the target of malicious actors who seek to destroy these things by exploiting vulnerabilities in the...
Ever since we started connecting websites to databases, SQL injection has been a serious security risk with dire ramifications. The ability for attackers to run arbitrary queries against vulnerable systems can result in data exposure, modification, and in some cases, entire system compromise....
In this course, you will learn to understand and apply fundamental concepts of cryptography, the learner will understand requirements for cryptography, understand and support secure protocols, and will gain an understanding of how to operate and implement cryptographic systems. This course is...
Buffer overflow is a topic that only software developers using low-level programming languages really get an opportunity to fully understand. However, IT security professionals are increasingly called upon to better understand how vulnerabilities created by poor software design and...
Denial of service attacks typically seek to render a service unavailable by flooding it with malicious traffic so that it becomes unresponsive to legitimate requests. In this course, Ethical Hacking: Denial of Service (part of the Ethical Hacking series), you'll look at the purposes of these...
Security defenses within information systems focus primarily on technology controls, that is, security is implemented within physical appliances and software. These controls are frequently bypassed when the humans themselves are compromised by a social engineering attack. Social engineering...