Torque IT – The Technology Skills Factory EC-Council

Torque IT – The Technology Skills Factory EC-Council

EC-Council Overview

To beat a hacker, you need to think like one…

Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.

Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.

Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.

These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.

EC-Council ​Course Outlines

Information Security
Certified Secure Computer User
Certified Network Defender
Ethical Hacking and Countermeasures
Computer Hacking Forensic Investigator
Certified Security Analyst / LPT Bootcamp
Certified Chief Information Security Officer
Application Security
Certified Secure Programmer (ECSP).NET

EC-Council Certifications

Please note that certification paths have links to course outlines:
Hover your mouse pointer over courses. You pointer ​changes to a hand icon where links are enabled.

EC-Council training, through Torque IT, is extremely practical in nature and the resultant skills, when combined with internationally recognized EC-Council certifications, serves to validate the critical skills and knowledge needed to develop, test and manage an organization’s security posture.