Description
Duration: 5 days
Academy Florida is an authorized EC-Council training partner, offering the full EC-Council certification catalog through its online platform. EC-Council is the largest cybersecurity technical certification body in the world, with programs ranging from entry-level fundamentals to advanced practitioner and executive-level credentials. Course topics span ethical hacking, SOC operations, digital forensics, cloud security, threat intelligence, penetration testing, and more. All courses are delivered online and are designed to build practical, job-ready cybersecurity skills.
Target Audience
- Current and aspiring SOC analysts at the Tier I and Tier II levels
- Cybersecurity professionals pursuing advanced certifications
- IT security practitioners and network administrators
- Software developers and application security engineers
- Information security executives and CISOs
- Entry-level IT and cybersecurity professionals
- Incident handlers and forensic investigators
- Penetration testers and ethical hackers
Prerequisites
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing – (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Code Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Code Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
| Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
|---|---|---|---|---|---|
| 5/25/2026 | 5/29/2026 | ||||
| 6/15/2026 | 6/19/2026 | ||||
| 7/6/2026 | 7/10/2026 | ||||
| 7/27/2026 | 7/31/2026 | ||||
| 8/17/2026 | 8/21/2026 | ||||
| 9/7/2026 | 9/11/2026 | ||||
| 9/28/2026 | 10/2/2026 | ||||
| 10/19/2026 | 10/23/2026 | ||||
| 11/9/2026 | 11/13/2026 | ||||
| 11/30/2026 | 12/4/2026 | ||||
| 12/21/2026 | 12/25/2026 | ||||
| 1/11/2027 | 1/15/2027 | ||||
| 2/1/2027 | 2/5/2027 | ||||
| 2/22/2027 | 2/26/2027 | ||||
| 3/15/2027 | 3/19/2027 | ||||
| 4/5/2027 | 4/9/2027 | ||||
| 4/26/2027 | 4/30/2027 |
Learning Objectives
- Apply ethical hacking methodologies, understand attack vectors, and implement appropriate countermeasures
- Conduct digital forensics investigations and establish forensic readiness within an organization
- Detect, analyze, and respond to security incidents using SOC workflows and SIEM tools
- Use threat intelligence techniques to identify, assess, and address cybersecurity threats
- Design, deploy, and maintain secure cloud and IoT environments
- Build and deliver secure applications by integrating DevSecOps practices throughout the SDLC
- Perform penetration testing across network, web, and enterprise environments
- Manage information security programs at the executive level, including governance and risk management
- Apply vendor-neutral, hands-on techniques to defend and secure network infrastructure
- Respond to and manage a range of security incidents, including malware, web, cloud, and insider threats
Course Outline
Module 1: EC-Council Certified SOC Analyst (CSA v2)
This 3-day program is designed for current and aspiring Tier I and Tier II SOC analysts. It addresses SOC operations fundamentals, log management and correlation, SIEM deployment, advanced incident detection, and incident response procedures. Students also learn how to manage SOC workflows and coordinate with CSIRT teams.
Module 2: EC-Council Certified Threat Intelligence Analyst (CTIA)
Developed with input from cybersecurity and threat intelligence professionals worldwide, this 3-day course trains students to reduce business risk by translating internal and external threats into actionable threat entities. Coverage includes the threat intelligence lifecycle, strategic, operational, tactical, and technical intelligence categories, and Blue Team threat hunting and detection methods.
Module 3: EC-Council Certified Secure Computer User (CSCU) v3
This 2-day introductory course teaches students how to operate computers, devices, and networks safely. Students gain a working understanding of common security concerns such as identity theft, credit card fraud, phishing, malware, data loss, and social engineering. The course is well suited for knowledge workers and general end-users.
Module 4: EC-Council Certified Cloud Security Engineer (CCSE)
This 5-day hands-on course combines vendor-neutral and vendor-specific cloud security content. It addresses widely applicable cloud security best practices, technologies, and frameworks, while also developing practical skills for working with specific cloud platforms, using a structured approach to cloud security fundamentals.
Module 5: EC-Council Certified Cybersecurity Technician (C|CT)
This 5-day program pairs knowledge instruction with critical thinking exercises and hands-on lab work. Graduates will have a solid grounding in core cybersecurity principles and techniques, along with practical exposure to tasks representative of real-world cybersecurity roles.
Module 6: EC-Council Certified Incident Handler (ECIH)
This 3-day course prepares students to anticipate, respond to, and eliminate security threats and threat actors. It covers the complete incident handling and response lifecycle, risk assessment approaches, relevant laws and policies, and procedures for handling malware, email, network, web application, cloud, and insider threat incidents, including post-incident forensic activities.
Module 7: EC-Council Certified Chief Information Security Officer (C|CISO)
This 4-day course addresses all five CCISO domains, including audit management, governance, information security controls, human capital management, strategic program development, and financial expertise. It is intended to help sitting and aspiring CISOs connect executive management responsibilities with the technical knowledge required in senior security leadership roles.
Module 8: EC-Council Certified Network Defender (CND)
This 5-day vendor-neutral, instructor-led network security certification course is built around a job-task analysis and the NICE cybersecurity education framework. The curriculum maps to global job roles and DoD responsibilities for system and network administrators, and was developed using extensive industry research and survey data.
Module 9: EC-Council Certified Application Security Engineer (CASE).NET
This 3-day hands-on course addresses security practices across the full software development life cycle (SDLC), including secure requirements gathering, application design, coding practices, testing, and post-development security management. Security activities are covered for every SDLC phase: planning, development, testing, and deployment.
Module 10: EC-Council Certified Penetration Tester (CPENT)
This 5-day advanced penetration testing course trains students in thorough pen testing methodologies applicable to enterprise networks, web applications, and other environments, building the practical skills required for professional penetration testing engagements.
Module 11: EC-Council Certified Ethical Hacker (CEH) v12
This 5-day course delivers comprehensive coverage of ethical hacking phases, attack vectors, and defensive countermeasures through a hands-on, structured approach across all ethical hacking domains. Version 12 incorporates current operating systems, tools, tactics, exploits, and technologies to help security professionals strengthen their infrastructure defenses.
Module 12: EC-Council Computer Hacking Forensics Investigator (CHFI) v11
This 5-day intensive digital forensics course includes more than 68 hands-on labs covering hardware and memory forensics, cloud forensics, mobile and IoT forensics, web application attack investigation, and malware forensics. Students learn chain-of-custody procedures, evidence acquisition, preservation, analysis, and the legal standards required for court-admissible evidence.
Module 13: EC-Council Threat Intelligence Essentials (TIE)
This 2-day program builds foundational knowledge in threat intelligence, covering the threat intelligence lifecycle, ethical and legal considerations, intelligence types (strategic, operational, tactical, and technical), data collection and analysis, Threat Intelligence Platforms (TIPs), and threat hunting. A Capture the Flag (CTF) Capstone project offers hands-on practice in a sandbox environment.
Module 14: EC-Council SOC Essentials (SCE)
This 2-day course introduces essential security technologies and SOC concepts, including computer networking, TCP/IP and OSI models, Windows, Linux, and Unix security, SOC architecture, SIEM architecture and deployment, log management, incident escalation, threat intelligence lifecycle, threat hunting, and incident response. A CTF Capstone project provides hands-on application of course material.
Module 15: EC-Council Network Defense Essentials (NDE)
This 2-day introductory course covers core information security and network defense topics, including identification, authentication, and authorization, virtualization, cloud computing, wireless networks, mobile and IoT devices, and data security. Students gain practical experience through interactive labs and a CTF Capstone project.
Module 16: EC-Council IoT Security Essentials (ISE)
This 2-day course covers a broad range of IoT security subjects, including IoT fundamentals, networking and communication protocols, cloud integration, threat intelligence, incident response, and security engineering principles. Students practice identifying, assessing, and mitigating IoT security risks through a CTF Capstone project in a sandbox environment.
Module 17: EC-Council Ethical Hacking Essentials (EHE)
This 2-day introductory course addresses the basics of ethical hacking and penetration testing, including threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, and penetration testing fundamentals. Practical skills are developed through hands-on labs and a CTF Capstone project.
Module 18: EC-Council Digital Forensics Essentials (DFE)
This 2-day course introduces computer forensics fundamentals and the forensic investigation process, with coverage of Dark Web forensics, Windows forensics, Linux forensics, and malware forensics. Interactive labs and a CTF Capstone project using live virtual machines and real networks provide hands-on experience.
Module 19: EC-Council DevSecOps Essentials (DSE)
This 2-day program establishes foundational knowledge in secure application development using DevSecOps principles, addressing risk identification in application development and the security and testing of applications across on-premises, cloud, and hybrid environments. A Capstone project builds practical skills relevant to a career in secure application development.
Module 20: EC-Council Cloud Security Essentials (CSE)
This 2-day course covers foundational cloud security concepts, including cloud computing basics and the protection of identities, data, and applications within cloud provider and hybrid environments. A Capstone project gives students hands-on experience to prepare for roles in cloud security.
Module 21: EC-Council Certified Ethical Hacker (CEH) v13
This 5-day update to the CEH program integrates AI-powered tools and techniques for identifying, exploiting, and addressing vulnerabilities. Topics include using AI to automate threat detection, predict security breaches, accelerate incident response, secure AI-driven technologies, conduct proactive threat hunting, perform anomaly detection, and apply predictive analysis. An exam voucher is included.