CAST Programs

CAST programs are designed and developed by EC-Council in collaboration with well-respected subject-matter experts and industry practitioners. Theories are limited to the bare essentials, and the bulk of the training session will be focused on a participant’s individualized involvement in “getting their hands dirty”. CAST will offer programs that will cover important domains such as advanced penetration testing training, malware analysis, advanced social engineering, cryptography, digital forensics deep dive, web application security, among others

·         CAST 611: Advanced Penetration Testing, Attacking Hardened Defense Systems

·         CAST 612: Advanced Mobile Hacking & Forensics, Elevating Mobile Forensics & Investigation To An Art Form

·         CAST 613: Hacking and Hardening your Corporate WebApplication, A Developer Perspective

·         CAST 614: Advanced Network Defense, Hardening Your Enterprise

·         CAST 616: Securing Windows Infrastructure, Attack Based Defense from the Ground Up

·         CAST 618: Designing and Implementing Cloud Security, Advanced Security Training

·         CAST 619: Advanced SQLi Attacks and Countermeasures, CENTER FOR ADVANCED SECURITY TRAINING

CAST 611
Advanced Penetration Testing

Attacking Hardened Defense Systems


CAST 611 will teach you how to do a professional security test and produce the most important thing from a test ... the findings and the report!

The ranges progresses in difficulty and reflect an enterprise level architecture. There will be defenses to defeat and challenges to overcome. This is not your typical FLAT network! As the range levels increase you will encounter the top defenses of today and learn the latest evasion techniques.

The format you will use has been used to train 1000s penetration testers globally, it is proven and effective!

CAST 612
Advanced Mobile Hacking & Forensics

Elevating Mobile Forensics & Investigation To An Art Form


Mobile Forensics is defined as “the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods.” (NIST)

This Three-day instructor-led course provides students with the knowledge and real world hands-on practical skills for performing Mobile Forensic Investigations. The course is based on vendor neutral Digital Forensic principals, with a great deal of focus on Apple, Google Android, RIM Blackberry and an array of other mobile devices.
In order to successfully complete a Mobile Forensics investigation it is imperative that you learn both the hardware and software design intricacies of these platforms as well as the common investigation protocols currently recognized and accepted for court trials.

CAST- 613
Hacking and Hardening your Corporate WebApplication

A Developer Perspective


A completely unique approach to making internally developed code safe. Sure we all know the basics but have we ever walked a mile in the hacker’s shoes.

How would they go about Hacking our Corporate Developed Web Site/Web App? Our Developers are schooled in what they would try? Aren’t they?

How can you possibly know how to protect your home if you don’t know how the burglar breaks into it? It’s impossible! We are taking the unusual approach of hacking our own code using very simple tools that the developer uses every day.

CAST 614
Advanced Network Defense

Hardening Your Enterprise


This is a comprehensive fast pacedtechnical security trainingprogram that will take the perspective of the “hacker”, and use that for the foundation of defending against the latest attacks. It is fun to be on offense and do the hacking and penetration testing, but for most us the reality is we have to play defense. This program provides an offensive mindset to provide a robust and solid defense.

While there is no such thing as perfect security, there are best practices and methodologies you can follow to secure most environments and provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. Thetechnical security trainingprogram starts with an introduction to advanced “hacks” and how you can fortify your defenses.

CAST 616
Securing Windows Infrastructure
Attack Based Defense from the Ground Up

This 3 day technical course focuses on the key aspects of Windows Infrastructure Security, applying best practices to secure interconnected information systems within your organization providing a holistically reliable framework to support an entire enterprise structure

CAST 618
Designing and Implementing Cloud Security

Advanced Security Training


The Designing and Implementing Cloud Security course provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. The course will help professionals understand the risks and threats associated with cloud service adoption and migrating business-critical data to third party systems.

The program covers planning, designing, and implementing cloud security controls. It delves in to various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, fail-over policy, and how cloud security strengthens the business case for cloud adoption.


Read More


CAST 619
Advanced SQLi Attacks and Countermeasures

·         The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies. CAST was created to address the need for quality advanced technical training for information security professionals who aspire to acquire the skill sets required for their job functions. CAST courses are advanced and highly technical training programs co-developed by EC-Council and well-respected industry practitioners or subject matter experts. CAST aims to provide specialized training programs that will cover key information security domains, at a advanced level