International Courses & Fee Structure

Our classes are online but for physical inquiry, visit our office at Town House, Room 12.


CEHCertified Ethical Hacker

Entry Requirement

Entry Requirement

KCSE Grade C- and above OR, A relevant degree diploma or certificate

Duration, 12-18 per level/section

Fee Structure

Compulsory Fees
Registration Fee 1,000.00
Administration Fee 5,035.00
Internal Exam Fee 5,035.00
External Exam Fee 0.00
Tuition Fee 60,000.00
Online Study Mode 0.00
Examining Body Membership Fee 0.00
TOTALS 71,070.00
Other Optional Fees
Online & Class Study Mode 10,000.00
Online & Executive Study Mode 20,000.00
Partial Scholarships Available, Apply Now!

*Note:

All Fees are payable in installements, for details check FAQs

Course Units/Overview

Certified Ethical Hacker

1.Intoduction to Ethical Hacking

2.Footprinting & Reconnaissance

3.Enumeration

4.System Hacking

5.Maloware Treats

6.Sniffing

7.Social Engeneering

8.Denial-of Service

9.Session Hijacking

10.Evading IDS,firewalls & honeypots

11.Hacking webservers

12.Hacking Web Application

13.SQL Injection

14.Hacking Wireless Networks

15.Hacking Mobile Platforms

16.IO Hacking

17.Cloud Computing

18.Crytography

19.Scanning Networks

Course Description

Certified Ethical Hacker

Course Instructor(s)

...Updating now

Examining Body

EC-COUNCIL

FAQs

1. What actually is an Ethical Hacker?

A. Ethical hackers attempt to penetrate a computer system or network with the aim of finding security vulnerabilities that could otherwise remain undetected. However, unlike malicious hackers, ethical hackers are given permission to undertake these controlled attacks.

Without these harmless penetration tests, security holes could remain unseen, leaving the organisation in a position that a malicious hacker could exploit.
2.Why should I get the CEH cert?

A. The CEH is a brilliant introduction into the world of Ethical Hacking. You’ll finish your certification with an in demand set of skills covering Intrusion Detection, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Plus, if you need to break into the field of ethical hacking or penetration testing, the CEH will put you ahead of other uncertified job applicants (assuming you similar experience).

It’s a benchmark certification for ethical hackers - “CEH is the original standard,” says Albert Whale, president and chief security officer at IT Security, Inc.
. Is the CEH necessary to get a job in Ethical Hacking?

A. The CEH is the most well-known certification in Ethical Hacking, but it’s not an absolute requirement. At their most basic, certifications are simply a supplement to real-world experience - without this you will only get so far.

This certification will help you break into the Ethical Hacking profession, but you’re not guaranteed a career. You’ll get great skills and a renowned certification, but you’ll still need experience to back it all up.


3. What prerequisites do I need to take an EC-Council course?

A. This cert sits in the sweet spot between entry level qualifications like CompTIA’s Security+ and advanced certs like the CISSP.

Before attending a CEH training course you should ideally possess at least two years IT experience, a good knowledge of TCP/IP, Windows Server and a basic familiarity with Linux and/or Unix.


4. Will I be taught by a real hacker?

A. At EC-Council’s accredited training centres you’ll be trained by experienced security professionals. You won’t be taught by a 17-year-old reformed hacker – EC-Council adheres to a strict code of ethics and employs experienced instructors with a clean reputation.


4. Isn’t it irresponsible to teach people how to hack?

A. The more we know about how the ‘bad guys’ operate, the more secure our systems, data and networks will be. Whilst the knowledge you’ll gain on a CEH course has the potential to be misused, many would argue this far outweighs the benefits of teaching thousands of IT professionals how to better protect their businesses.

To help highlight responsibility, EC-Council requires all of their students to sign an agreement, agreeing to respect the knowledge and not misuse it. You’ll also be required to agree to abide by all legal laws of the land in the use of your new knowledge and skills.


5. How is the exam structured?

A. To achieve your CEH v8 certification you’ll need to pass exam 315-50 at a Prometric or Pearson VUE test centre. This exam is a 125 question, multiple choice paper covering the 19 CEH domains. To gain your CEH cert, you’ll need to score at least 70%.

Take a look at EC-Council’s site for more information on your CEH exam.


6. What is the current version of the CEH certification?

A. Released in 2013, CEH v8 is the current version of the certification and introduced new modules in Social engineering and IPv6. CEH v7 retired on October 31st 2013 – you will no longer be able to take this exam.


7. Do I have to recertify my CEH?

A. As of January 1st 2009, all EC-Council certifications will be valid for three years. However, to maintain your certification you will be required to achieve 120 credits (per certification) during the three years after you certify.

These credits can be gained in the following ways:
  • Attending conferences
  • Writing research papers
  • Reading material on realated subjects
  • Attending webinars


Qualifying activities must have been completed during the three year window after you achieve your certification.



Register Now

CHFIComputer Hacking Forensics Investigator

Entry Requirement

Entry Requirement

Duration, 18

Fee Structure

Compulsory Fees
Registration Fee 1,000.00
Administration Fee 4,980.00
Internal Exam Fee 4,980.00
External Exam Fee 0.00
Tuition Fee 48,000.00
Online Study Mode 0.00
Examining Body Membership Fee 0.00
TOTALS 58,960.00
Other Optional Fees
Online & Class Study Mode 10,000.00
Online & Executive Study Mode 20,000.00
Partial Scholarships Available, Apply Now!

*Note:

All Fees are payable in installements, for details check FAQs

Course Units/Overview

  • Forensics Science
  • Computer Forensics
  • Security Incident Report
  • Aspects of Organizational Security
  • Evolution of Computer Forensics
  • Objective of Computer Forensics
  • Need for Compute Forensics
  • Forensics Readiness
    • Benefits of Forensics Readiness
    • Goals of Forensics Readiness
    • Forensics Readiness Planning
  • Cyber Crime
    • Computer Facilitated Crimes
    • Modes of Attacks
    • Examples of Cyber Crime
    • Types of Computer Crimes
    • Cyber Criminals
    • Organized Cyber Crime: Organizational Chart
    • How Serious are Different Types of Incidents?
    • Disruptive Incidents to the Business
    • Cost Expenditure Responding to the Security Incident
  • Cyber Crime Investigation
    • Key Steps in Forensics Investigation
    • Rules of Forensics Investigation
    • Need for Forensics Investigator
    • Role of Forensics Investigator
    • Accessing Computer Forensics Resources
    • Role of Digital Evidence
  • Corporate Investigations
    • Understanding Corporate Investigations
    • Approach to Forensics Investigation: A Case Study
    • Instructions for the Forensic Investigator to Approach the Crime Scene
    • Why and When Do You Use Computer Forensics?
    • Enterprise Theory of Investigation (ETI)
    • Legal Issues
    • Reporting the Results
  • Reporting a Cyber Crime
    • Why you Should Report Cybercrime?
    • Reporting Computer-Related Crimes
    • Person Assigned to Report the Crime
    • When and How to Report an Incident?
    • Who to Contact at the Law Enforcement?
    • Federal Local Agents Contact
    • More Contacts
    • CIO Cyberthreat Report Form
 
 
 

Course Description

Computer Hacking Forensics Investigator

Course Instructor(s)

Pending

Examining Body

EC-COUNCIL

FAQs

1.Should I attend training to attempt the CHFI exam?
EC-Council recommends, but not mandatory, that CHFI aspirants attend formal classroom training
to reap maximum benefit of the course and have a greater chance at clearing the examinations.
2.What are the pre-requisites for taking a CHFI exam?
If you attend CHFI training (online, instructor-led, computer-based, or academia learning),
you are eligible to attempt the CHFI examination. If you opt for self-study, you must have
minimum 2 years-experience in IT security, submit a complete eligibility form and email it to
https://eccouncil.zendesk.com/anonymous_requests/new for approval and remit USD100
eligibility fee through our website at www.eccouncil.org/orders.htm. Once approved, you will be
provided with an eligibility & voucher code that will allow you to register with ECC.
3.What is the eligibility criteria for self-study students?
It is mandatory for you to record two years of information security related work experience and
get the same endorsed by your employer.
4.Where do I purchase the prepaid examination vouchers?
You can purchase the vouchers directly from EC-Council through its website at
http://store.eccouncil.org/
5.I have just completed the training. Can I defer taking a test to a later date?
Yes, you can - subject to the expiry date of your exam voucher. Ensure that you obtain a certificate
of attendance upon completion of the training. You may contact your testing center at a later
date and schedule the exam.
6.Why are there different versions for the exam?
EC-Council certifications are under continuous development. We incorporate new techniques and
technology as they are made available and are deemed necessary to meet the exam objectives,
as students are tested on concepts, techniques and technology.
7.How many times can I attempt the examination in case I do not pass in the first attempt?
Kindly refer to the Exam Retake Policy on our website at https://cert.eccouncil.org/exam-retakepolicy.html
8.Do I have to recertify?
You will need to earn EC-Council Continuing Education Credits (ECE) to maintain the certification.
Go to https://cert.eccouncil.org/ece-policy.html for more information. If you require any assistance
on this, please contact https://eccouncil.zendesk.com/anonymous_requests/new

Register Now

ECSAEC-Council Certified Security Analyst

Entry Requirement

Entry Requirement

Duration, 18

Fee Structure

Compulsory Fees
Registration Fee 1,000.00
Administration Fee 4,980.00
Internal Exam Fee 4,980.00
External Exam Fee 0.00
Tuition Fee 60,000.00
Online Study Mode 0.00
Examining Body Membership Fee 0.00
TOTALS 70,960.00
Other Optional Fees
Online & Class Study Mode 10,000.00
Online & Executive Study Mode 20,000.00
Partial Scholarships Available, Apply Now!

*Note:

All Fees are payable in installements, for details check FAQs

Course Units/Overview

Module 00: Penetration Testing Essential Concepts (Self-Study)
Module 01: Introduction to Penetration Testing and Methodologies
Module 02: Penetration Testing Scoping and Engagement Methodology
Module 03: Open-Source Intelligence (OSINT) Methodology
Module 04: Social Engineering Penetration Testing Methodology
Module 05: Network Penetration Testing Methodology – External
Module 06: Network Penetration Testing Methodology – Internal
Module 07: Network Penetration Testing Methodology – Perimeter Devices
Module 08: Web Application Penetration Testing Methodology
Module 09: Database Penetration Testing Methodology
Module 10: Wireless Penetration Testing Methodology
Module 11: Cloud Penetration Testing Methodology
Module 12: Report Writing and Post Testing Actio

Course Description

EC-Council Certified Security Analyst 

Course Instructor(s)

Pending

Examining Body

EC-COUNCIL

Register Now

CSCUCertified Secure Computer User

Entry Requirement

Entry Requirement

Duration,

Fee Structure

Compulsory Fees
Registration Fee 1,000.00
Administration Fee 0.00
Internal Exam Fee 0.00
External Exam Fee 0.00
Tuition Fee 60,000.00
Online Study Mode 0.00
Examining Body Membership Fee 0.00
TOTALS 61,000.00
Other Optional Fees
Online & Class Study Mode 10,000.00
Online & Executive Study Mode 20,000.00
Partial Scholarships Available, Apply Now!

*Note:

Course Units/Overview

1.Introduction to Security
2.Securing Operating Systems
3.Malware and Antivirus
4.Internet Security
5.Security on Social Networking Sites
6.Securing Email Communications
7.Securing Mobile Devices
8.Securing the Cloud
9.Securing Network Connections
10.Data Backup and Disaster Recovery

Course Description

Course Instructor(s)

Examining Body

EC-COUNCIL

FAQs

Register Now