• Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
START TYPING AND PRESS ENTER TO SEARCH
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
ADD ANYTHING HERE OR JUST REMOVE IT…
EC-Council Learning
  • Home
  • Courses
    • Courses
  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
Menu
EC-Council Learning
0 items $0.00
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
START TYPING AND PRESS ENTER TO SEARCH
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
Click to enlarge
Home Workshops Artificial Intelligence for IoT and the Cloud
Risk Management
Cyber Risk Management (RM) Unlimited Video Courses $3,499.00
Back to products
Dark Web Forensics for Ethical Hackers Promo $650.00 Original price was: $650.00.$499.00Current price is: $499.00.

Artificial Intelligence for IoT and the Cloud

$199.00

Compare
Add to wishlist
SKU: Iclass350199 Category: Workshops
Share:
  • Description
  • Shipping & Delivery
Description

If you still have questions and would like to talk to an Expert Training Consultant, click here or call 1-888-330-HACK.

Shipping & Delivery

Talk to an Expert

If you still have questions our Expert Training Consultancies are here to help.
Get in touch Call 1-888-333-HACK

Related products

Compare

Ethical Hacking Attack Phases Workshop

Workshops
$250.00
In this workshop you will learn system hacking, following this you will learn how to hack and assess web applications. Once you have practiced these hacks, you will learn attacks that target wireless devices as well as mobile devices. You will be introduced to techniques to identify the attack surface and then the vectors for attack depending on the device(s) encountered.
Add to wishlist
Add to cart
Quick view

Contact Us

New Mexico/Phoenix

101C Sun Ave NE Albuquerque, NM 87109
1-888-330-HACK

Florida

Suite 160
2502 North Rocky Point DR Tampa, FL 33607
1-844-HACK-CEH

Canada

40 Crowther Lane Fredericton
NB Canada E3C 2R2
+1 506-307-6586

  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
START TYPING AND PRESS ENTER TO SEARCH
  • Home
  • Courses
    • Courses

      Executive Management

      Certified Chief Information Security Officer (CCISO)

      Risk Management Approach and Practices (RM)

      Ethical Hacking

      Certified Ethical Hacker (CEH)

      Ethical Hacking Core Skills (EHCS)

      Network Security

      Certified Cybersecurity Technician (CCT)

      Certified Network Defender (CND)

      ICS/SCADA Cybersecurity

      Computer Forensics

      Computer Hacking Forensic Investigator (CHFI)

      Dark Web Forensics

      Malware and Memory Forensics

      Mobile Forensics

      Incident Handling

      Certified Incident Handler (ECIH)

      Certified SOC Analyst (CSA)

      Certified Threat Intelligence Analyst (CTIA)

      Pen Testing

      Certified Penetration Testing Professional (CPENT)

      Web Application | Hacking & Security

      Application Security

      Certified Application Security Engineer (CASE .NET)

      Certified Application Security Engineer (CASE Java)

      EC-Council Certified DevSecOps Engineer (ECDE)

      Encryption

      Certified Encryption Specialist (ECES)

      Mobile Security Toolkit

      STORM: Ethical Hacking Core Skills

      STORM: Ethical Hacking Intermediate Skills

      IT Project Management

      Certified Project Management (CPM)

      Cloud Security

      Certified Cloud Security Engineer (CCSE)

      Drone Program

      Drone Hacking

      Fundamentals

      Certified Secure Computer User (CSCU)

      Ethical Hacking Essentials

      Network Defense Essentials

      Digital Forensics Essentials

      EC-Council IoT Security Essentials

      EC-Council SOC Essentials

      EC-Council Threat Intelligence Essentials

      Cloud Security Essentials

      EC-Council DevSecOps Essentials

  • Training
    • Live Course Schedule
      • North America
    • Learning Options
    • Financing Options
    • First Look Series
    • Career Training Paths
    • Resources
      • Whitepapers
  • Security Channel
  • About
  • Store
    • Mobile Security Toolkit
    • Textbooks
    • T-Shirts & Merch
  • Contact Us
Search
Shopping cart
Close
Start typing to see posts you are looking for.
Shop
Wishlist
0 items Cart
My account