Hacking

Learn to think like a hacker.

We present the best in cyber security courses for those who want to stand out from the crowd. You will learn the techniques, principles and tools used in penetration testing and network vulnerability testing and testing.

Course offer

Management insight into hacking, scanning and vulnerabilities

IT security practically for beginners, but also non-security roles (project manager, enterprise architect)

E|H Intro

E|H Intro

Introduction to white hacking

Expertise
Ethical Hacking Foundation

Ethical Hacking Foundation

IT security for beginners, but also non-security roles

Expertise

Beating a hacker means learning to think like a hacker.

Basic course for further development. Immerse yourself in the life of a real Hacker. Only 10% theory and 90% practice.

Certified Ethical Hacker Pro | CEH v13

Certified Ethical Hacker Pro | CEH v13

The latest version of CEH training teaches you to think and work like a real hacker

Expertise
Mobile Ethical Hacking

Mobile Ethical Hacking

Master programming essentials in this CS course.

Penetration Testing courses

Learn how to perform an effective penetration test in an enterprise network environment.

CREST - CRT Certification (Registered Penetration Tester)

CREST - CRT Certification (Registered Penetration Tester)

Improve your skills to effectively penetrate computer systems and networks

Expertise

Application Security courses

Application security training and certification programs provide a comprehensive approach to application security.

Certified Application Security Engineer | CASE.NET

Certified Application Security Engineer | CASE.NET

The most comprehensive certification for secure software development

Expertise
Certified Application Security Engineer | CASE.Java

Certified Application Security Engineer | CASE.Java

The most comprehensive certification for secure software development

Expertise
Python Security Micro Degree

Python Security Micro Degree

Boost your coding skills with essential CS concepts.

Python for Absolute Beginners

Python for Absolute Beginners

Dive into computer science fundamentals and practical applications.

CREST - Practitioner Security Analyst

CREST - Practitioner Security Analyst

Improve your skills to effectively penetrate computer systems and networks.

Expertise

Prepare to handle security incidents

Comprehensive programs that impart the knowledge and skills needed to effectively manage the aftermath of an incident

Hacking

Hacking

Latest techniques and tools used in penetration testing and network vulnerability testing.

Adaptive comprehensive security strategy​

A comprehensive approach to effectively solving security problems in today's modern network

Certified Penetration Testing Professional | CPENT

Certified Penetration Testing Professional | CPENT

CPENT rewrites established penetration testing practices as we know them

Expertise

Cloud Security courses

Certified Cloud Security Engineer (C|CSE) is a specialized program curated by cloud security experts in collaboration with subject matter experts from around the world.

Certified Cloud Security Engineer | CCSE

Certified Cloud Security Engineer | CCSE

C|CSE is a specialized program curated by cloud security experts in collaboration with experts from around the world.

Expertise

Executive Management, Computer Forensics, Disaster Recovery, Encryption

More courses from the International Council of E-Commerce Consultants (EC-Council), the world's largest cybersecurity technical certification body.

Certified Chief Information Security Officer | CCISO

Certified Chief Information Security Officer | CCISO

Producing information security leaders at the highest level

Expertise
Cybersecurity for Businesses

Cybersecurity for Businesses

Unlock the fundamentals of computer science, from coding to algorithms.

Email Phishing

Email Phishing

Delve into computer science fundamentals and applications.

Forensics, Encryption & Recovery

Computer Forensics, Encryption, Blockchain, Business Continuity - Disaster Recovery

Windows Server: security audit ISO 27001

Windows Server: security audit ISO 27001

Security audit in Windows server environment according to ISO 27001 and 27002

Expertise

Subsidized courses

Gain transferable digital skills. Take educational or retraining courses at TAYLLORCOX and be on course in the labor market. The Labor Office reimburses 82% of the total amount of the course, up to 50.000 CZK! Courses subsidized by the Ministry of Labor and Social Affairs (MLSV) will improve your professional resume, supplement the knowledge necessary for career growth and increase your value on the labor market.

Hacking

Hacking

Latest techniques and tools used in penetration testing and network vulnerability testing.

What is EC-Council?

The International Council of E-Commerce Consultants is an international organization specializing in cybersecurity and information technology (IT) certification.

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.

How does the EC-Council final exam and certification work?

As part of the training, you will get access to virtual laboratories and you will receive an exam voucher. The exam can be taken in three ways:

• computer-based at TAYLLORCOX Campus

• computer-based at the Pearson VUE test center

• computer-based with an online proctor

You will get the results right after completing the exam. If you pass your exam, you will receive your EC-Council certificate within 2-3 working days.