© 2020 — SMT Academy - SMTGourp

SMT CENTER EC-COUNCIL THE EC-COUNCIL MISSION IS “TO VALIDATE INFORMATION SECURITY PROFESSIONALS
WHO ARE EQUIPPED WITH THE NECESSARY SKILLS AND KNOWLEDGE REQUIRED IN A SPECIALIZED
INFORMATION SECURITY DOMAIN THAT WILL HELP THEM AVERT A CYBER CONFLICT,
SHOULD THE NEED EVER ARISE.” EC-COUNCIL IS COMMITTED TO UPHOLD THE HIGHEST LEVEL OF
IMPARTIALITY AND OBJECTIVITY IN ITS PRACTICES, DECISION MAKING,
AND AUTHORITY IN ALL MATTERS RELATED TO CERTIFICATION.
Pick A Course
Free

Certified Secure Computer User

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

See more...

Free

Certified SOC Analyst

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

See more...

Free

Certified Network Defender

CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will always want to know when they are planning to protect, detect, and response to the network attacks. The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations.

See more...

Free

Certified Ethical Hacking

CEH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organization. The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.

See more...

Free

EC-Council Certified Security Analyst

ECSA is a globally accepted hacking and penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and write a penetration testing report. This program takes the tools and techniques covered in C|EH to next level by utilizing EC-Council’s published penetration testing methodology.

See more...

Free

Computer Hacking Forensics Investigator

Digital forensic practices stem from forensic science, the science of collecting and examining evidence or materials. Digital or computer forensics focuses on the digital domain including computer forensics, network forensics, and mobile forensics. As the cybersecurity profession evolves, organizations are learning the importance of employing digital forensic practices into their everyday activities. Computer forensic practices can help investigate attacks, system anomalies, or even help System administrators detect a problem by defining what is normal functional specifications and validating system information for irregular behaviors.

See more...

Free

EC-Council Certified Incident Handler

The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The comprehensive training program will make students proficient in handling as well as responding to various security incidents such as network security incidents, malicious code incidents, and insider attack threats.

See more...

Free

EC-Council Certified Secure Programmer

This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications. .Net is widely used by almost all organizations as the leading framework to build web applications. The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.

See more...


Type and press Enter to search