EC-Council Certified Incident Handler (ECIH) - Only 2 Days

Seven reasons why you should sit your ECIH course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be ECIH certified in just 2 days. With us, you’ll be ECIH trained in record time
  2. Our ECIH course is all-inclusive. A one-off fee covers all course materials, exams, accommodation and meals. No hidden extras
  3. Pass ECIH first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  4. You’ll learn more ECIH. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn ECIH faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying ECIH with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 64,203 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study ECIH courseware. We use practical exercises to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

When do you want to sit your accelerated course?

Start

Finish

Status

Book now

Open

Book now

Here's the Firebrand Training review section. Since 2001 we've trained exactly 64,203 students and asked them all to review our Accelerated Learning. Currently, 96.51% have said Firebrand exceeded their expectations:



"Ive been successfully training with Firebrand for some years now. Cisco up till now (CCNA, CCDA, CCNP & CCDP), so CEH this time round was something totally different. Hard work and challenging, but really enjoyed it. Firebrand have certainly got this type of training sorted!"
Andrew Ian Trow, Harmonic. - EC-Council Certified Ethical Hacker (CEH) (5 days) (8/5/2017 to 12/5/2017)

"Firebrand has best place, friendly environment and best instructors"
Rami Aldhafiri, Boubyan Bank. - EC-Council Certified Ethical Hacker (CEH) (5 days) (8/5/2017 to 12/5/2017)

"Excellent instructor, excellent facilities, fantastic experience. Highly recommended to anybody considering training. The best learning experience by far."
J.L, cybsec. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Firebrand as a whole experience has been an eye-opener not only the course but the rest of the class learning, the instructor was really easy to talk to and go to for anything. The whole stay has been something that I would recommend to anyone who is trying improve their career. Firebrand, for my personal opinion, have been as professional as one can except (and some). Everyone from Firebrand has been really helpful and especially the Instructor. It doesn`t matter what time of the day it was he was there for you for literally anything - not just question about the courseware. If there was 11 I would have said 11/10. "
Artur Ramadani, Contractor. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Starting as a very newbie to much of the material, I come out so much more able and knowledgeable in this arena. The practical exercises coupled with great presentation of the material and the clear deep expertise of the instructor meant the course flew by but delivered great learning"
Timothy Canning, GTE Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Firebrand is exactly what is says on the tin. It's hard work and intense but by far the best way of working. "
Chris Owen, BeyondTrust. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Wonderful trainer, really focusing on the individual. It is a tough week but the insight you get and things you learn go way beyond any other courses I have attended."
C.G, GCASSOCIATES GmbH. - EC-Council Certified Ethical Hacker (CEH) (5 days) (27/3/2017 to 31/3/2017)

"This is the second time I have taken a Firebrand course and have enjoyed my time at Wyboston again. The instructor is extremely knowledgeable and the content of the course was very engaging."
Tom Sweet, Software Escrow Solutions. - EC-Council Certified Ethical Hacker (CEH) (5 days) (27/3/2017 to 31/3/2017)

"Firebrand is an excellent choice for IT specialists in the UK. Very professional and highly recommended, the number 1 choice for my company. Having experienced the training first hand I will not hesitate to recommend this company, the courses, and the staff, with the excellent facilities provided to my employees and any anybody considering taking certified training in the UK"
John Lynch, CybSec Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (27/3/2017 to 31/3/2017)

"Hard work, long hours, but interesting and fun! Great instructor!"
Mark Elvidge, Uplinkman Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Wonderfull training.The trainer provided so much technical informations and Lab exercices. The course was really hands-on. "
Gbessi Vincent TOH, T-Inet Consulting. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Bootcamp style, intensive training. Very experienced trainer - extremely knowledgable. Good material, nice location and amenities."
N.H. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"The material was appropriate, the delivery excellent. Loved the practices and the exercises. "
I.Y, Go Live UK Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Amazing stay Very friendly staff Well presented course Always helpful & very informative Would come again :)"
Richard Howard, Microcomms. - EC-Council Certified Ethical Hacker (CEH) (5 days) (12/12/2016 to 16/12/2016)

"The instructor's knowledge and experience was very clear. The demonstrations and labs were very well constructed. The training facility was excellent."
T.W. - EC-Council Certified Ethical Hacker (CEH) (5 days) (28/11/2016 to 2/12/2016)

"I wouldn't get trained anywhere else."
R.B. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"The tutor has formidable knowledge. The environment was superb. I really enjoyed the course and content "
A.K. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"Excellent facilities that take care of all small stuff so you can concentrate on the learning."
Iain Bowker, Sopra Steria. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"Very good course, excellent anecdotal reinforcement from instructor. A good balance of theory and practical exercises. Facilities at Wyboston excellent."
James Metcalfe, 4secure Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/11/2016 to 18/11/2016)

"Another great course here at Firebrand, its tough but enjoyable!"
Lee Carter. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/11/2016 to 18/11/2016)

"A very good course and an excellent trainer. "
N.M. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (17/10/2016 to 19/10/2016)

"Excellent course, very experienced trainer "
Anonymous - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (17/10/2016 to 19/10/2016)

"Very intense, yet enjoyable. The information given on this course is very useful, and also includes extras from the instructor. 24-hour labs support learning all the way through."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Its been an intense week of interesting training, the food was great and the instructor was excellent, with a full understanding of the subject matter and the transfer skills to go with it. It is rare to find such a high level of instructor ability coupled with real life experience and knowledge."
A.L.C. - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Overall good experience. Staff are helpful. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"As always, a great instructor and a great group to train with!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Intense training, but well paced and set out, everything explained and facilities and tutor available 24-7 for your convenience."
Anonymous, Corby Business Academy - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Good methods used for intensive training. Hard work but worth doing."
David Pe, Yorkshire Building Society. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (15/8/2016 to 19/8/2016)

"Good facilities and staff are very knowledgeable."
Rolston Wiltshire, Rolston Wiltshire LTD. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (25/7/2016 to 27/7/2016)

"It is an excellent place to be for training due to the experience of teachers and the level and quality of training. Training centre is at a good location with very academic and teaching environment."
Gyanu Raut, QA Client - NHS Kings College Hospital. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (25/7/2016 to 27/7/2016)

"At times this was intense, eye opening but always fun. Thank you :-)"
N.Y. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Intensive courses with all the support that you need. Just bring will power!"
David Hull. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Firebrand Training are really on the top of their profession with loads of experience."
T.B. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Firebrand provides a very good environment to fast-track your exam without any worries."
D.S. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (23/5/2016 to 27/5/2016)

"Training was brilliant, had a brilliant week. Would definitely recommend to family/friends and look forward to coming back to Firebrand."
Sultan Khan, Laing. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/5/2016 to 13/5/2016)

"It was enjoyable, hard and pressured but really worth it in the end."
Andrew Davis. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/5/2016 to 13/5/2016)

"Be prepared to work hard, lessons are long and the remaining time will be spent going over the masses of material in private study. But the course material is of excellent quality, instructor first class in subject and it is very high quality training."
Matt Williams, Evolved Intelligence. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"I really enjoyed the CEH course. The instructor was very helpful and clear when explaining information. In addition, the venue was great. I would always recommend Firebrand Training to a friend or colleague. "
Shola Abhulimhen, ink global. - EC-Council Certified Ethical Hacker (CEH) (5 days) (25/3/2016 to 29/3/2016)

"Fantastic experience. I'd been on holiday for six months and did this training as a way to kick start my brain back into the work mode and despite being very challenging and long hours it was extremely rewarding. It was in an area I wasn't very familiar with but at the end of the course I can walk away feeling confident and I need about a month to just play with all the new skills I've learnt. The friendliness of the class and the fully immersive learning style blew me away with what I was able to take away. Already planning my next training."
Dave Gibbons, Davinchio Tech LTD. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"Good course, but hard work."
T.W. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"The training was just excellent and the trainer very experienced and motivated as well, a great balance between theory and hands on exercises! I would be glad to come back to Firebrand again. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"The training is intense and the experience informative with all the necessary tools and techniques to give you confidence in the exam, which comes around way too fast, and beyond as you start using the knowledge in real life. I would recommend it to anyone committed enough to go through a short, sharp education."
Philip Bell, Oracle Corporation. - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"CEH - really great training. Intensive, hard work, lots of hands on, and tons of information. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"Great training course."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (18/4/2016 to 22/4/2016)

"Great training! It was a good refresher of what I already knew, but also an eye-opener on all the new hacking techniques and tools that I didn't know about. Definitely worth the time spent, and it prepares you very well for he certification."
Olivier Thonnard, AMADEUS SAS. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Very dense course, but very good overview."
S.F. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Firebrand training environment doesn't let down. The labs are well resourced and the instructors very knowledgeable. You cant fail."
Arnold Mangeni, National Information Technology Authority. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"I was a bit skeptical about the whole organisation and training as well. But quality of accommodation turned out to be excellent, staff very pleasant and ready to help. As for a training, pace is a bit frantic, but dynamic, full of right, tech information. We were participating, ask questions and gave answers when asked, energy was great. That is what I've like the most about the training. I've learned a lot and now have a good base to expand my knowledge."
Tamara Velanac, Telenor. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Excellent training, very detailed content, trainer had superb breadth of knowledge on the content being delivered. I would certainly attend another Firebrand training course, if this experience was representative of the quality and results they produce. Would also recommend highly to colleagues interested in training."
David Scott. - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

"Tutor very knowledgeable on subjects/modules within the course. Nothing was to much trouble for tutor, extra learning, tricky questions all taken care of."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (22/2/2016 to 26/2/2016)

On this two day EC-Council Certified Incident Handler (ECIH) course, you’ll gain skills to handle and respond to a range of information security incidents.

Through accelerated learning you'll get 50% more training time than traditional 9-5pm courses. Meaning you'll spend more time learning and applying principles and techniques to detecting and respond to current and emerging computer security threats.

During the ECIH certification course you’ll learn to tackle a wide range of incident types that threaten your organisation including:

  • Network security incidents
  • Malicious code incidents
  • Insider attacks

As well as handling the incidents directly, you’ll develop the skills to prepare for and recover from incidents. This will include:

  • Risk assessment
  • Providing incident reports
  • Incident recovery plans
  • Incident recovery testing
  • Security policies

The ECIH course is perfect if you're an incident handler, risk assessment administrator, pen tester, cyber forensic investigator, venerability assessment auditor, system administrator, system engineer, firewall administrator or network manager. It will also benefit you if you're interested in incident handling and response.

8x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to eight years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call 080 80 800 888

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 080 80 800 888

1 - Introduction to Incident Response and Handling

  • Defines computer security incident
  • Discusses the importance of data classification
  • Discusses information warfare
  • Discusses the key concepts of information security
  • Explains various vulnerability, threat, and attacks on information systems
  • Discusses types of computer security incidents with example
  • Explains different incident categories
  • Discusses incident prioritisation issues
  • Explains incident response, incident handling and computer forensics

2 - Risk Assessment

  • Explains risk policy
  • Discusses the risk assessment methodology
  • Outlines different steps to assess and mitigate risks at work place
  • Describes risk analysis
  • Discusses different risk mitigation strategies
  • Explains the importance of cost/benefit analysis in risk assessment process
  • Discusses various issues involved with control implementation
  • Explains the risk mitigation methodology
  • Discusses residual risk
  • Showcases risk assessment tools

3 - Incident Response and Handling Steps

  • Explains the need for incident response
  • Describes the incident response process
  • Explains the incident response components
  • Describes incident response methodology
  • Explains various incident response and handling stages
  • Defines the incident response plan
  • Outlines the steps for incident response plan
  • Discusses the importance of training and awareness for incident response and handling
  • Provides security awareness and training checklists
  • Explains incident response policy
  • Discusses about incident management and the purpose of incident management
  • Explains about incident response team structure, personnel, team dependencies and team services
  • Defines the relationship between incident response, incident handling, and incident management
  • Discusses about incident response best practices

4 - CSIRT

  • Discusses the need of an Incident Response Team (IRT)
  • Explains CSIRT goals and strategy
  • Explains CSIRT mission and vision
  • Explains CSIRT constituency
  • Discusses about the CSIRT place in the organisation
  • Explains the CSIRT relationship with peers
  • Defines the types of CSIRT environments
  • Explains the best practices for creating a CSIRT
  • Explains the role of CSIRTs
  • Defines the roles in an Incident Response Team
  • Illustrates different CSIRT services
  • Explains about CSIRT policies and procedures
  • Explains how CSIRT handles a case

5 - Handling Network Security Incidents

  • Defines DoS and DDoS attacks
  • Explains incident handling preparation for DoS attacks
  • Discusses different types of unauthorised access incident
  • Explains various stages involved in incident handling preparation for unauthorised access incident
  • Discusses different types of inappropriate usage incidents
  • Explains different steps of incident handling preparation for inappropriate usage incidents
  • Discusses about the multiple component incidents
  • Explains steps involved in incident handling preparation for multiple component incidents
  • Showcases network security assessment tools such as Nmap and Wireshark

6 - Handling Malicious Code Incidents

  • Explains about virus, worms, trojans and spywares
  • Explains the incident handling preparation for malicious code incidents
  • Discusses about the incident prevention, detection and analysis of malicious code incidents
  • Explains the containment strategy for the malicious code incidents
  • Explains the method of evidence gathering and handling the malicious code incidents
  • Defines the method of eradication and recovery from the malicious code incidents
  • Explains various countermeasures for the malicious code incidents

7 - Handling Insider Threats

  • Handling Insider Threats
  • Defines insider threats
  • Explains the anatomy of an insider attack
  • Explains different techniques for the insider threat detection
  • Explains the insider threats response
  • Describes the insider’s incident response plan
  • Provides guidelines for overcoming insider threats
  • Demonstrates various employee monitoring tools

8 - Forensic Analysis and Incident Response

  • Discusses computer forensics
  • Explains the objectives of forensics analysis
  • Discusses about the role of forensics analysis in incident response
  • Explains the types of computer forensics
  • Discusses about computer forensic investigator and other people involved in computer forensics
  • Defines the computer forensics process
  • Explains about the forensic policies
  • Discusses about the forensics in the information system life cycle
  • Demonstrates forensic analysis tools such as Helix and Sysinternals tools

9 - Incident Reporting

  • Defines the incident reporting
  • Outlines the details to be reported
  • Provides report formats
  • Discusses the information disclosure issues
  • Explains the issues involved in reporting work place incidents
  • Discusses about the federal agency incident categories
  • Provides the incident reporting guidelines

10 - Incident Recovery

  • Defines the incident recovery
  • Explains the principles of incident recovery
  • Illustrates different steps of incident recovery
  • Discusses about contingency/continuity of operations planning
  • Discusses about business continuity planning and business impact analysis
  • Describes the incident recovery plan
  • Discusses about the incident recovery planning team
  • Defines the incident recovery testing

11 - Security Policies and Laws

  • Defines the security policy
  • Explains the key elements of security policy
  • Describes the goals of a security policy
  • Explains the purpose of a security policy
  • Explains the characteristics of a security policy
  • Discusses about the implementation of security policies
  • Explains the access control policy and its importance
  • Explains the administrative security policy, asset control policy, audit trail policy, logging policy, documentation policy, evidence collection policy, information security policy, National Information Assurance Certification & Accreditation Process (NIACAP) policy, and physical security policy
  • Provides the physical security guidelines
  • Discusses about the personnel security policies & guidance
  • Explains the role of laws in incident handling
  • Discusses about the legal issues when dealing with an incident
  • Discusses about the law enforcement agencies

Read more ...

Interested? See prices or call 080 80 800 888

You'll sit the following exam on site as part of the course:

ECIH: exam code 212-89

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 hours
  • Test Format: Multiple choice

Read more ...

Interested? See prices or call 080 80 800 888

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 080 80 800 888.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC, CISA, CISM, CGEIT, CRISC, CISSP CBK Review and CSX Practitioner Level 1,2 and 3
  • *** On site testing is not included for our PMI, GIAC, CISA, CISM, CGEIT, CRISC, CSX Practitioner or ITIL Managers and Revision Certification Courses.
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 080 80 800 888

It is recommended you have the following experience before attending this course:

  • A minimum of one years experience managing Windows/Unix/Linux systems
  • An understanding of common network and security services

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on 080 80 800 888 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call 080 80 800 888