EC-Council creates content (course materials and exams) and certication delivered through our channel of authorized training centers which consists of over 700 partners representing over 2,000 physical locations in more than 145 countries across the globe. We are the owner and developer of the world-famous E-Council Certied Ethical Hacker (CEH), EC-Council Computer Hacking Forensics Investigator (CHFI), EC-Council Certied Security Analyst (ECSA), and EC-Council License Penetration Tester (LPT ) programs.
Our certication programs are recognized worldwide and have received endorsements from various government agencies, including the United States Federal Government (via the Montgomery GI Bill), the National Security Agency (NSA), and the Committee on National Security Systems (CNSS).
NEWORDER Training Academy is a EC-Council iLearn partner within the South African region, making distant self-paced learning possible and affordable for any person interested to become an Information Security Expert. iLearn is EC-Council's facilitated self-paced training option for Ethical Hacking, Computer Forensics, Pen Testing, Incident Handling and a variety of IT Security courses from the entry level Secure Computer User course to our series of advanced courses delivered through the Center for Advanced Security Training (CAST).Taught by our expert instructor who trains the likes of US DOD, Pentagon, FBI, NSA and many more. Facilitated in that all of the same modules taught in the live course are recorded and presented in a streaming video format. Self-paced in that a certification candidate can set their own learning pace by pausing the lectures and returning to their studies as their schedule permits!
The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.