HPN Logo WF-01.png

MITT - EC-Council Course Catalogue 


Chief Information Security Officer (CISO) 

Course Description 

The CISO certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level position, the CISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital for leading a highly successful IS program. 

The CISO Training Program can be the key to a successful transition to the highest ranks of information security management. 

Key Learning Outcomes 

  • Establishes the role of CISO and models for governance. 

  • Core concepts of information security controls, risk management, and compliance 

  • Builds foundation for leadership through strategic planning, program management, vendor management and security management. 


Key Domains 

  • Governance 

  • Security Risk Management, Controls, & Audit Management 

  • Security Program Management & Operations 

  • Information Security Core Competencies 

  • Strategic Planning, Finance, & Vendor Management 




Course Description 

OhPhish covers phishing, smishing, and vishing solutions in a single revolutionary platform to help organizations and enterprises strengthen their most vulnerable asset, their people. It imitates real-world phishing scenarios. The platform equips employees with the most efficient solutions and products to combat phishing attacks and prevent data breaches. It caters to the need for businesses by creating a safe working environment from phishing, smishing, and vishing attacks. OhPhish integrates e-Learning and gamification modules in a Learning Management System (LMS), helping employees to stay aware of phishing attacks. 

Key Learning Outcomes 

  • Builds a user-friendly cybersecurity awareness training solution 

  • Maintains “Active Directory” to launch comprehensively laid out phishing templates 

  • Generates extensive reports in PDF and Excel formats 

  • Tracks real-time updates with snapshots (availability on Mobile Applications) 

  • Identifies trends based on user, department, and other critical demographics 



Certified Secure Computer User (CSCU) 

Course Description 

CSCU provides individuals with the necessary knowledge and skills to protect their information assets. The course covers fundamentals of various computer and network security threats such as identity theft, credit card fraud, phishing, virus and backdoors, email hoaxes, loss of confidential information, hacking attacks, and social engineering 

Key Learning Outcomes 

  • Fundamentals of various computer and network security threats 

  • Understanding of identity theft, phishing, scams, malware, social engineering, and financial frauds 

  • Learn to safeguard mobile, media, and protect data 

  • Protecting computers, accounts, and social networking profiles as a user 

  • Understand security incidents and reporting 


Certified Ethical Hacker (CEH) 

Course Description 

CEH is the world’s most advanced ethical hacking course that covers 20 of the most current security domains any individual needs to know when planning to strengthen the information security posture of their organization. This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals. 

Key Learning Outcomes 

  • Thorough knowledge of networking, telecom, web and computer systems 

  • Knowledge of current security protocols for multiple operating platforms 

  • Skills to “hack” an organization’s security system, with authorization, to audit existing and potential weaknesses 

  • Preventive, corrective, and protective countermeasures to safeguard systems against malicious cyber attacks 

  • Address issues in emerging areas of IoT, cloud, and mobile hacking 


Certified Network Defender (CND) 

Course Description 

CND covers 14 of the most current network security domains and is the world’s most advanced network defense course. It is best suited for individuals responsible in planning, protecting, detecting, and responding to network attacks. The course contains hands-on labs and is based on major network security tools to provide administrators real world experience on current network security technologies and operations. 

Key Learning Outcomes 

  • Knowledge on how to protect, detect, and respond to network attacks 

  • Computer network and defence fundamentals 

  • Network security threats, attacks, controls, protocols, and devices 

  • Use of secure firewall, VPN, and IDS configuration and management 

  • Wireless network defence 

  • Backup and data recovery 

  • Speculation and management of various network security risks and vulnerabilities 



Certified Security Analyst (CSA) 

Course Description 

CSA is a hacking and penetration testing program that covers the testing of modern infrastructures, operating systems and application environments, while teaching learners how to document and write a penetration testing report. The course builds on the tools and techniques covered in the Certified Ethical Hacker course. 

Key Learning Outcomes 

  • Manage a team of penetration testers 

  • Understand the business impact of a pen test 

  • Administer information security software and controls 

  • Analyze security system logs, security tools, and data 

  • Create, modify, and update Intrusion Detection Systems (IDS) and Security Information Event Management (SIEM) 


Certified Security Analyst (Practical) 

Course Description 

CSA Practical is a 12-hour practical exam built to test penetration-testing skills. Candidates are required to demonstrate the application of penetration testing methodology and are required to perform a comprehensive security audit of an organization. It starts with challenges requiring the performance of advanced network scans beyond perimeter defences, leading to automated and manual vulnerability analysis, exploit selection, customization, launch and post exploitation maneuvers 

Key Learning Outcomes 

  • Ability to perform threat and exploit research, understand exploits in the wild, write exploits, customize payloads and make critical decisions 

  • Create professional pen testing reports with essential elements 


Threat Intelligence Analyst (TIA)


Course Description 

This is a method-driven course that uses a holistic approach to cover concepts from planning the threat intelligence project, to building a report, to disseminating threat intelligence. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks. 

It addresses all the stages involved in the Threat Intelligence Life Cycle. This attention to a realistic and futuristic approach makes it one of the most comprehensive threat intelligence certifications available. 

Key Learning Outcomes 

  • The knowledge of different threat intelligence types, lifecycles, strategies, capabilities, maturity model and frameworks 

  • An understanding of different types of cyber threats, threat actors, their motives, goals, and objectives behind cyberattacks 

  • Cyber kill chain methodology, advanced persistent threat (APT) lifecycle, tactics, techniques & procedures (TTPs), Indicators of Compromise (IoCs), and pyramid of pain 

  • Complete threat analysis process which includes threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation 

  • Creating effective Threat Intelligence Reports 

  • Provide an invaluable ability of structured intelligence to enhance skills and employability 


SOC Analyst 

Course Description 

The SOC Analyst program is the first step to joining a security operations centre (SOC). It is engineered for current and aspiring Tier I and Tier II analysts, to achieve proficiency in performing entry level and intermediate level operations. This is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by industry experts. The material covers the fundamentals of SOC operations, knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. In addition, the candidate will learn to manage various SOC processes. 

Key Learning Outcomes 

  • Knowledge of SOC processes, procedures, technologies and workflows 

  • Ability to recognize attacker tools, tactics and procedures to identify indicators of compromise (IOCs) that can be utilized during and future investigations 

  • Gain experience and extensive knowledge of Security Information and Event Management 

  • Develop threat cases (correlation rules), reports, etc. 

  • Plan, organize and perform threat monitoring and analysis in the enterprise 

  • Prepare briefings and reports of analysis methodology and results 

  • Demonstrate understanding of SOC and IRT collaboration for better incident response 


Encryption Specialist 

Course Description 

This is an introductory course to the field of cryptography. Participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Functions, DES and AES. 

Key Learning Outcomes 

  • Develop skills to protect critical data in organizations with encryption 

  • Develop a deep understanding of essential cryptography algorithms and their applications 

  • Make informed decisions about applying encryption technologies 

  • Save time and cost by avoiding common mistakes in implementing encryption technologies effectively 

  • Develop working knowledge of cryptanalysis 

  • Overview of other algorithms such as Blowfish, Twofish, and Skipjack 

  • Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others 

  • Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA 

  • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle 

Participants will also learn practical application of the following: 

  • How to set up a VPN 

  • Encrypt a drive 

  • Hands-on experience with steganography 

  • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA 


Incident Handler 

Course Description 

This course provides fundamental skills to handle and respond to the computer security incidents in an information system. It addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Participants will become proficient in handling as well as responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats 

Key Learning Outcomes 

  • An understanding of how to address the key issues of the information security world 

  • Ways to combat different types of cybersecurity threats, attack vectors, threat actors and their motives 

  • Fundamentals of incident management including the scope and cost of an incident 

  • Steps involved in planning an incident, handling, and response program 

  • Detailed knowledge of computer forensics and forensic readiness 

  • Liaison with legal and regulatory bodies 


Computer Hacking Forensic Investigator 

Course Description 

This course provides strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. Moreover, it provides learners with a firm grasp on the domains of digital forensics.


Key Learning Outcomes 

  • How to conduct incident response and forensics (stepwise process) 

  • Perform digital forensic acquisitions 

  • Forensics of file systems, operating systems, network and database, websites, and email systems 

  • Techniques for investigating on cloud, malware, and mobile 

  • Data acquisition and analysis, as well as anti-forensic techniques 

  • Thorough understanding of chain of custody, forensic report, and presentation 


Disaster Recovery Professional 

Course Description 

This course provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization’s critical data in the aftermath of a disaster. 

Who is it for? 

  • IT Professionals in the BC/DR or System Administration domain 

  • Business Continuity and Disaster Recovery Consultants 

  • Individuals wanting to establish themselves in the field of IT Business Continuity and Disaster Recovery 

  • IT Risk Managers and Consultants 

  • CISOs and IT Directors 


Application Security Engineer.NET/Java 

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. 

The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment. 

The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally. It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. 

The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application. 

Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development. 

This makes CASE one of the most comprehensive certifications on the market today. It is desired by software application engineers, analysts, testers globally, and is respected by hiring authorities. 

The Purpose of CASE Is 

  • To ensure that application security is no longer an afterthought but a foremost one 

  • To lay the foundation required by all application developers and development organizations, to produce secure applications with greater stability and fewer security risks to the consumer, therefore making security a foremost thought 

  • To ensure that the organizations mitigate the risk of losing millions due to security compromises that may arise with every step of application development process 

  • To help individuals develop the habit of giving importance to security sacrosanct of their job role in the SDLC, therefore opening security as the main domain for testers, developers, network administrator etc. 


Licensed Penetration Tester (Master) – Advanced Penetration Testing 

Course Description 

This is a credential acquired as a capstone to the entire information security track from Ethical Hacker to the Security Analyst programs. The exam covers the skill sets, technical analysis and report writing required to be a true professional penetration tester. 

Key Learning Outcomes 

  • Mastery of penetration testing skills 

  • Ability to perform repeatable methodology 

  • Commitment to code of ethics 

  • Ability to present analyzed results through structured reports