EC-Council Certified Secure Programmer (ECSP) - Only 5 Days

Seven reasons why you should sit your ECSP course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You'll be ECSP certified in just 5 days. With us, you’ll be ECSP trained in record time
  2. Our ECSP course is all-inclusive. A one-off fee covers all course materials, exams, accommodation and meals. No hidden extras
  3. Pass ECSP first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  4. You’ll learn more ECSP. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn ECSP faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying ECSP with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 64,490 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study ECSP courseware. We use practical exercises to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

When do you want to sit your accelerated course?

Start

Finish

Status

Book now

Open

Book now

Here's the Firebrand Training review section. Since 2001 we've trained exactly 64,490 students and asked them all to review our Accelerated Learning. Currently, 96.53% have said Firebrand exceeded their expectations:



"Good facilities, very knowledgeable instructor."
Anonymous - EC-Council Certified Secure Programmer (ECSP) (5 days) (27/4/2015 to 1/5/2015)

"Every professional .Net programmer should have a security qualification. ECSP will give you that."
S.R. - EC-Council Certified Secure Programmer (ECSP) (5 days) (27/4/2015 to 1/5/2015)

"The trainer is a great instructor. He teached us very well!"
J. M.. - EC-Council Certified Secure Programmer (ECSP) (5 days) (24/10/2016 to 28/10/2016)

"Firebrand training is an exceptional way to get certified."
Mark Clifford, Real Time Travel Connections. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/7/2017 to 28/7/2017)

"The Firebrand reputation is very well known. To experience it is something else. Is there any thing about security that the instructor did not know? The course delivery is fantastic! "
Dee Baglee, Bishops Veseys Grammar Schoo. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/7/2017 to 28/7/2017)

"Firebrand provided me with a well formatted course with excellent facilities. Really suited my needs and happy with results."
Alex Smith, Maplin. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/7/2017 to 28/7/2017)

"The training given surpassed what I expected. Hard work, but worth the sweat."
Jon Dempsey, YMA Associates Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/7/2017 to 28/7/2017)

"Very good instructor, with massive experience and knowledge. Great personality to help carry you through the long days. Instructor was very helpful and informative throughout the entire course. The course was delivered inside a week, which is fantastic for those that struggle with finding time in their normal routines."
C.C.. - EC-Council Certified Ethical Hacker (CEH) (5 days) (24/7/2017 to 28/7/2017)

"I have many certifications through Firebrand and have passed 1st time every time. It has been invaluable to my career and knowledge."
R.B.. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (19/6/2017 to 21/6/2017)

"Firebrand training is one of the best that facilities fast learning in an easy environment. Accommodation and food here are superb. Im back again for my (ICS)2 CISSP later on in the year."
Mathew Batchelor, Network UK Consultancy Ltd. - EC-Council Certified Network Defender (CND) (4 days) (22/5/2017 to 25/5/2017)

"Very quick and information heavy, but very well explained. The instructors knowledge and understanding is brilliant and he was very helpful."
J.G.. - EC-Council Certified Network Defender (CND) (4 days) (22/5/2017 to 25/5/2017)

"A great way to learn and obtain new certifications, ideal for busy professionals due to the condensed timescales. Hands-on labs with 24 hour access help to learn the material too."
A.A-R. - EC-Council Certified Network Defender (CND) (4 days) (22/5/2017 to 25/5/2017)

"Ive been successfully training with Firebrand for some years now. Cisco up till now (CCNA, CCDA, CCNP & CCDP), so CEH this time round was something totally different. Hard work and challenging, but really enjoyed it. Firebrand have certainly got this type of training sorted!"
Andrew Ian Trow, Harmonic. - EC-Council Certified Ethical Hacker (CEH) (5 days) (8/5/2017 to 12/5/2017)

"Firebrand has best place, friendly environment and best instructors"
Rami Aldhafiri, Boubyan Bank. - EC-Council Certified Ethical Hacker (CEH) (5 days) (8/5/2017 to 12/5/2017)

"Excellent instructor, excellent facilities, fantastic experience. Highly recommended to anybody considering training. The best learning experience by far."
J.L, cybsec. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Firebrand as a whole experience has been an eye-opener not only the course but the rest of the class learning, the instructor was really easy to talk to and go to for anything. The whole stay has been something that I would recommend to anyone who is trying improve their career. Firebrand, for my personal opinion, have been as professional as one can except (and some). Everyone from Firebrand has been really helpful and especially the Instructor. It doesn`t matter what time of the day it was he was there for you for literally anything - not just question about the courseware. If there was 11 I would have said 11/10. "
Artur Ramadani, Contractor. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Starting as a very newbie to much of the material, I come out so much more able and knowledgeable in this arena. The practical exercises coupled with great presentation of the material and the clear deep expertise of the instructor meant the course flew by but delivered great learning"
Timothy Canning, GTE Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Firebrand is exactly what is says on the tin. It's hard work and intense but by far the best way of working. "
Chris Owen, BeyondTrust. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/4/2017 to 18/4/2017)

"Wonderful trainer, really focusing on the individual. It is a tough week but the insight you get and things you learn go way beyond any other courses I have attended."
C.G, GCASSOCIATES GmbH. - EC-Council Certified Ethical Hacker (CEH) (5 days) (27/3/2017 to 31/3/2017)

"This is the second time I have taken a Firebrand course and have enjoyed my time at Wyboston again. The instructor is extremely knowledgeable and the content of the course was very engaging."
Tom Sweet, Software Escrow Solutions. - EC-Council Certified Ethical Hacker (CEH) (5 days) (27/3/2017 to 31/3/2017)

"Firebrand is an excellent choice for IT specialists in the UK. Very professional and highly recommended, the number 1 choice for my company. Having experienced the training first hand I will not hesitate to recommend this company, the courses, and the staff, with the excellent facilities provided to my employees and any anybody considering taking certified training in the UK"
John Lynch, CybSec Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (27/3/2017 to 31/3/2017)

"If you know what you are doing and want to get certified quickly, Firebrand is your best option."
C.G., GCASSOCIATES. - EC-Council Certified Network Defender (CND) (4 days) (27/2/2017 to 2/3/2017)

"Hard work, long hours, but interesting and fun! Great instructor!"
Mark Elvidge, Uplinkman Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Wonderfull training.The trainer provided so much technical informations and Lab exercices. The course was really hands-on. "
Gbessi Vincent TOH, T-Inet Consulting. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Bootcamp style, intensive training. Very experienced trainer - extremely knowledgable. Good material, nice location and amenities."
N.H. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"The material was appropriate, the delivery excellent. Loved the practices and the exercises. "
I.Y, Go Live UK Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (20/2/2017 to 24/2/2017)

"Amazing stay Very friendly staff Well presented course Always helpful & very informative Would come again :)"
Richard Howard, Microcomms. - EC-Council Certified Ethical Hacker (CEH) (5 days) (12/12/2016 to 16/12/2016)

"The instructor's knowledge and experience was very clear. The demonstrations and labs were very well constructed. The training facility was excellent."
T.W. - EC-Council Certified Ethical Hacker (CEH) (5 days) (28/11/2016 to 2/12/2016)

"I wouldn't get trained anywhere else."
R.B. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"The tutor has formidable knowledge. The environment was superb. I really enjoyed the course and content "
A.K. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"Excellent facilities that take care of all small stuff so you can concentrate on the learning."
Iain Bowker, Sopra Steria. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (28/11/2016 to 2/12/2016)

"Very good course, excellent anecdotal reinforcement from instructor. A good balance of theory and practical exercises. Facilities at Wyboston excellent."
James Metcalfe, 4secure Ltd. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/11/2016 to 18/11/2016)

"Another great course here at Firebrand, its tough but enjoyable!"
Lee Carter. - EC-Council Certified Ethical Hacker (CEH) (5 days) (14/11/2016 to 18/11/2016)

"A very good course and an excellent trainer. "
N.M. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (17/10/2016 to 19/10/2016)

"Excellent course, very experienced trainer "
Anonymous - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (17/10/2016 to 19/10/2016)

"The instructor was vastly experienced which was invaluable in relaying real-world examples into his instruction."
P.S.. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (17/10/2016 to 19/10/2016)

"Very intense, yet enjoyable. The information given on this course is very useful, and also includes extras from the instructor. 24-hour labs support learning all the way through."
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Its been an intense week of interesting training, the food was great and the instructor was excellent, with a full understanding of the subject matter and the transfer skills to go with it. It is rare to find such a high level of instructor ability coupled with real life experience and knowledge."
A.L.C. - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Overall good experience. Staff are helpful. "
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"As always, a great instructor and a great group to train with!"
Anonymous - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Intense training, but well paced and set out, everything explained and facilities and tutor available 24-7 for your convenience."
Anonymous, Corby Business Academy - EC-Council Certified Ethical Hacker (CEH) (5 days) (3/10/2016 to 7/10/2016)

"Good methods used for intensive training. Hard work but worth doing."
David Pe, Yorkshire Building Society. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (15/8/2016 to 19/8/2016)

"Great knowledgeable instructor who used to work for the vendor. Always extremely helpful. Never had a bad Firebrand instructor on a Firebrand course and I am now a veteran."
Adele Reed, N/A. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (25/7/2016 to 27/7/2016)

"Good facilities and staff are very knowledgeable."
Rolston Wiltshire, Rolston Wiltshire LTD. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (25/7/2016 to 27/7/2016)

"It is an excellent place to be for training due to the experience of teachers and the level and quality of training. Training centre is at a good location with very academic and teaching environment."
Gyanu Raut, QA Client - NHS Kings College Hospital. - EC-Council Certified Chief Information Security Officer (CCISO) (3 days) (25/7/2016 to 27/7/2016)

"At times this was intense, eye opening but always fun. Thank you :-)"
N.Y. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Intensive courses with all the support that you need. Just bring will power!"
David Hull. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Firebrand Training are really on the top of their profession with loads of experience."
T.B. - EC-Council Certified Ethical Hacker (CEH) (5 days) (13/6/2016 to 17/6/2016)

"Firebrand provides a very good environment to fast-track your exam without any worries."
D.S. - EC-Council Computer Hacking Forensics Investigator (CHFI) (5 days) (23/5/2016 to 27/5/2016)

"Training was brilliant, had a brilliant week. Would definitely recommend to family/friends and look forward to coming back to Firebrand."
Sultan Khan, Laing. - EC-Council Certified Ethical Hacker (CEH) (5 days) (9/5/2016 to 13/5/2016)

Learn how to code and develop secure applications with greater stability and posing minimal security risks to the consumer. Get your EC-Council Certified Secure Programmer certification in just five days. Depending on whether you're used to working with .NET or Java, you'll be able to tailor your course based on the environment you work in. Choose either the .NET or Java labs and exam - and get the accreditation you want.

As an ECSP you'll improve the overall quality of your products and applications by identifying security flaws and implementing security countermeasures throughout the software development life cycle. This course is based on the OWASP (Open Web Application Security Project) Top Ten Threats, a guide to the most common categories of application security problems.

What you'll learn

This course builds on your development skills in C#, C++, Java, PHP, ASP, .NET and SQL. You'll learn about key secure programming topics, including:

  • Framework Security
  • .NET Authentication and Authorisation
  • .NET & Java Cryptography
  • Secure File Handling

If you're designing and building Windows/Web based applications with .NET/Java, the ECSP certification is for you. You'll learn the latest techniques and strategies in secure programming through classroom discussions and a series of practical labs.

8x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to eight years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Read more ...

Interested? See prices or call 080 80 800 888

This course will significantly benefit programmer and developers concerned about the security of their code.

Technical certification is a sound investment in your career - and your organisation. Although certification does not guarantee success, research has shown that it can have a significant impact on:

  • Morale and confidence
  • Efficiency and productivity on the job: 85% of managers view certified employees as more productive (Gartner Study)
  • Career advancement: 70.8% of IT managers view certification as a criteria for promotion (Gartner Study)
  • Financial rewards

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 080 80 800 888

The curriculum will focus on your chosen ECSP certification language of either .NET or Java.

Introduction to Application Security

  • Become Familiar with. Application Security
  • Understand the Need for Application Security
  • Key Elements of Framework Architecture Security
  • Framework Security Features
  • Top 10 Security Attacks For OWASP
  • Secure Development Lifecycle (SDL)
  • Threat Modeling Process
  • Security Testing
  • Learn Various Secure Coding Principles
  • Guidelines for Developing Secure Codes
  • Confidentiality
  • Integrity
  • Availability
  • Minimal attack surface areas
  • Secure defaults
  • Principle of least privilege
  • Principle of defense in depth
  • Fail securely
  • External systems are insecure
  • Separation of duties
  • No security by obscurity
  • Simplicity
  • Fix security issues correctly

Framework Security

  • Become Familiar with Framework Architecture
  • Learn Framework Runtime Security Model
  • Understanding you’re only as secure as your Framework
  • Role-Based Security
  • Code Access Security (CAS)
  • Evidence-Based Security
  • Permissions and Permissions Classes
  • Become Familiar with Stack Walking Process
  • Isolated Storage
  • Learn About Class Libraries Security
  • .NET Assembly Security
  • Understand Common Threats To .NET Assemblies and Classes

Input Validation and Output Encoding

  • Understand Need of Input Validation
  • Various Input Validation Approaches
  • Learn Various Validation Controls
  • Understand Common Input Validation Attacks
  • Learn Defensive Techniques for XSS Attacks
  • Validation Control’s Vulnerabilities
  • Learn Mitigation Techniques for Validation Control’s Vulnerabilities
  • Learn Defensive Techniques for SQL Injection Attacks
  • Learn Output Encoding To Prevent Input Validation Attacks
  • Sandboxing to Prevent Input Validation Attacks
  • Various Sandboxing Software
  • Best Practices for Input Validation

.NET Authentication and Authorization

  • Authorization and Authentication Processes
  • Understand Common Threats on Authorization and Authentication
  • Authentication and Authorization Security Architecture
  • Understanding the Security Relationship between IIS and ASP.NET
  • Authentication and Its Modes in Detail
  • Authorization and Its Types in Detail
  • Become Familiar with Impersonation and Delegation Concepts
  • Mitigate Authentication and Authorization Vulnerabilities
  • Best Practices for Authentication and Authorization
  • Become Familiar with Secure Communication Concepts

Secure Session and State Management

  • Session Management Concepts
  • Security Principles for Session Management Tokens
  • Common Threats on Session Management
  • The Session Management Techniques
  • Various Session Attacks
  • Defensive Techniques against Session Attacks
  • Become Familiar with Cookie-Based Session Management
  • Cookie Security
  • Viewstate in .NET or HTTP Session Class in Java - Based Session Management
  • Common Threats on Viewstate in .NET or HTTP Session Class in Java
  • Viewstate in .NET or HTTP Session Class in Java Security
  • Guidelines for Secure Session Management

.NET & Java Cryptography

  • Become Familiar with Cryptography in .NET and Java
  • Understand Different Types of Cryptographic Attacks In .NET and Java
  • Become Familiar with Symmetric Encryption
  • Learn How to Secure Symmetric Encryption
  • Become Familiar with Asymmetric Encryption
  • Learn How to Secure Asymmetric Encryption
  • Become Familiar with the Hashing Concept
  • Reversing Hashing - EG. Cracking Passwords

Quick Overview on Password Cracking and how it affects programmers

  • Learn How to Implement Security in Hashing
  • Digital Signatures – If it is valid does that mean it’s not malicious?
  • Digital Certificates – The process start to finish
  • XML Signatures

Error Handling, Auditing, and Logging

  • Errors and Exception Handling
  • The Principles of Secure Error Handling
  • Different Levels of Exception Handling
  • Mitigate Vulnerabilities in Class Level Exception Handling
  • Manage Unhandled Errors
  • Guidelines and Checklists for Proper Exception Handling
  • Become Familiar with Logging and Auditing Process
  • Common Threats to Logging and Auditing
  • Become Familiar with Log Throttling Process
  • Learn How to Implement Windows Log Security against Various Attacks
  • Best Practices and Checklists for Auditing and Logging Security
  • Various Logging Tools

Secure File Handling

  • File Handling Concepts
  • Understand File Handling Security Concerns
  • Path Traversal Attacks on File Handling
  • Learn Defensive Techniques against Path Traversal Attack
  • Canonicalization Attack on File Handling
  • Learn Defensive Techniques against Canonicalization Attack
  • Static Files and their Security
  • The Security of File I/O Using Absolute Path and Map path
  • Security While Uploading Files
  • Become Familiar with the File Extension Handling Concept
  • File ACLS
  • Checklist for Securely Accessing Files

Configuration Management and Secure Code Review

  • Configuration Management
  • Common Threats on Configuration Management
  • Machine Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in Machine Config Files or Web XML or Properties Class in JAVA
  • Application Configuration Files or Web XML or Properties Class in JAVA
  • Mitigate the Vulnerabilities in App Config Files or Web XML or Properties Class in JAVA
  • Code Access Security Configuration Files or Web XML or Properties Class or Web XML or Properties Class in JAVA
  • Policy Configuration Files
  • Best Practices for Configuration Management
  • Become Familiar with Secure Code Review
  • Security Code Review Approaches
  • Various Static Code Analysis Tools

JavaScript – Just don’t do it, but if you have to…

  • XSS
  • Reflected
  • Stored
  • DOM
  • XSRF
  • Click Jacking
  • Script Injection

Buffer Overflow

  • Write and implement a buffer overflow on various vulnerabilities

Reversing Java and .NET

  • Both Java and .NET compile to byte code which can be reversed
  • Learn techniques to secure your hard earned code.

OWASP Hands-On Labs:

Unvalidated Redirects and Forwards Lab

  • Testing the attack
  • Fixing the problem on the client side
  • Fixing the problem on the server side

Insufficient Transport Layer Protection Lab

  • Insecure pages
  • Secure login cookies
  • Secure other cookies

A8 Failure to Restrict URL Access Lab

  • Mounting the attack
  • Another hole

Insecure Cryptographic Storage Lab

  • Mounting the attack
  • Preparing to encrypt the file
  • Encrypting the file
  • Decrypting the file
  • Replaying the attack
  • Zeus

Security Misconfiguration Lab

  • Problem 1
  • Problem 2
  • Problem 3
  • Problem 4
  • Mounting an attack
  • Hardening the site

Cross Site Request Forgery Lab

  • Preparing
  • Mounting the attack
  • Hardening the site with a CAPTCHA
  • Re-running the attack
  • Protecting CSRF with synchronizer token pattern
  • Re-running the attack

Insecure Direct Object Reference Lab

  • Mounting the attack
  • Hardening the site
  • Hardening in .Net

Broken Authentication and Session Management Lab

  • Mounting the attack
  • Hardening the site with IP checking
  • Hardening the site with authentication

Cross-Site Scripting Lab

  • Testing for a vulnerability
  • Mounting the attack
  • Hardening the site – encoding output
  • Hardening the site – Using the Anti-XSS library

Injection Flaws Lab

  • Mounting the attack
  • Advanced attack vectors
  • Hardening the site with parameters
  • Bonus! Hardening the site with a whitelist
  • Protecting your update with a whitelist
  • Protecting your update with parameters

Information Leakage and Improper Error Handling Lab

  • Mounting the attack
  • Turning specific errors on
  • Create custom error pages
  • Capturing the error

Cryptography Lab

  • Exploring existing controls

Provider Model Lab

  • Exploring existing controls
  • Add the link
  • Add the page

Click jacking Lab

  • Testing the vulnerability
  • Protecting with X-Frame-Options
  • Protecting with frame-breaking JavaScript

Phishing Lab

  • Creating an uncomplicated site
  • Routes and default values
  • Sending an email

Static Code Analysis Lab

  • Testing the attack

Read more ...

Interested? See prices or call 080 80 800 888

Depending on the environment you're used to working in, you'll choose and sit one of the following exams:

  • EC-Council ECSP Java Exam: 312-94
  • EC-Council ECSP .NET Exam: 312-93

Read more ...

Interested? See prices or call 080 80 800 888

Included:

Depending on the environment you're used to working in, you'll choose one of the following sets of courseware:

EC-Council ECSP Java

EC-Council ECSP .NET

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 080 80 800 888.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, GIAC, CISA, CISM, CGEIT, CRISC, CISSP CBK Review and CSX Practitioner Level 1,2 and 3
  • *** On site testing is not included for our PMI, GIAC, CSX Practitioner or ITIL Managers and Revision Certification Courses.
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 080 80 800 888

The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET/Java Framework. It is designed for developers who have C#, C++, Java, PHP, ASP, .NET and SQL development skills.

In order to attend successfully you must have programming fundamental knowledge.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on 080 80 800 888 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call 080 80 800 888