Cyber Security № 05 of 14 ATC Accredited

EC-Council
Programs

Mac Jason Academy is an EC-Council Accredited Training Center (ATC). We deliver the official Certified Ethical Hacker, Computer Hacking Forensic Investigator and Certified SOC Analyst programs — backed by EC-Council's ANSI 17024 standard.

3
Programs
ATC
Accredited
17024
ANSI Standard
92+
Countries Served
№ 01 / Overview

An Accredited Training Center.

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various information security and e-business skills. EC-Council has been certified by the American National Standards Institute to meet its ANSI 17024 standard — the global benchmark for personnel certification bodies.

EC-Council is the owner and creator of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), and Certified SOC Analyst (CSA) programs — alongside many others — offered in over 92 countries through a global training network. As of October 2023, Mac Jason Academy is approved as an EC-Council Accredited Training Center (ATC), authorized to deliver official EC-Council training and testing for the CEH, CHFI and CSA programs.

"To beat a hacker, you need to think like a hacker." That's the philosophy that runs through every EC-Council program. We teach it the way EC-Council intends — with official courseware, hands-on labs, and instructors who've worked the threat landscape rather than read about it.

Who this is for: Aspiring cyber security professionals, IT staff moving into security roles, SOC analysts who need formal credentialing, incident response and forensics specialists, network admins ready to upskill, and career-changers from any background — the field is hiring.

№ 03 / CEH v12

Certified Ethical Hacker.

The C|EH course provides learners with an understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. EC-Council calls it "the pinnacle of the most desired information security training program any information security professional will ever want to be in." No formal prerequisites are required — though networking fundamentals are a helpful starting point.

The course immerses you in the hacker mindset so you can defend against future attacks — across vendors, technologies and equipment. Twenty modules, hands-on labs, official EC-Council courseware.

Information security overview, hacking concepts, hacker classes, the ethical hacker's responsibilities, applicable laws.
OSINT methodology, footprinting through search engines, social media, websites, email and DNS — the work the attacker does before they touch your network.
Network scanning techniques, host discovery, port scanning, OS fingerprinting, banner grabbing, network mapping. Nmap and friends, properly.
NetBIOS, SNMP, LDAP, NTP, SMTP, DNS, IPsec, VoIP and other enumeration techniques. Countermeasures.
Vulnerability assessment concepts, classifications, scoring (CVSS), tools and reports.
Gaining access, escalating privileges, maintaining access, clearing logs. The full intrusion lifecycle.
APTs, trojans, viruses, worms, fileless malware. Analysis approaches and countermeasures.
Network sniffing, MAC attacks, DHCP attacks, ARP poisoning, MAC spoofing, DNS poisoning. Defences.
Phishing, spear phishing, vishing, impersonation, identity theft. The human-layer attack surface.
DoS / DDoS concepts, attack techniques, botnets, attack tools, countermeasures.
Application-level and network-level hijacking, tools, countermeasures.
IDS / IPS, firewall and honeypot evasion techniques — and how defenders catch the attempts.
Web server attacks, vulnerabilities, attack methodology, countermeasures and patch management.
OWASP Top 10, authentication and authorization attacks, client-side and web services attacks.
SQLi concepts, types, methodology, tools, evasion and countermeasures.
Wireless concepts, encryption, threats, hacking methodology, Bluetooth attacks, defences.
Android and iOS attack vectors, mobile device management, mobile pen-testing.
IoT and OT (operational technology) attack surface, methodology, tools, countermeasures.
Cloud computing concepts, container technologies, serverless computing, cloud threats and security.
Encryption algorithms, cryptography tools, PKI, email and disk encryption, attacks on cryptosystems.
№ 04 / CHFI

Computer Forensics.

Through CHFI, students learn the skills to identify, prosecute, and track down the cybercriminal. The certification is ideal for experts from the banking, legal, insurance and e-business security sectors. Prerequisite: knowledge of Certified Ethical Hacker (CEH) content. Most students take CEH first or in parallel.

Sixteen modules covering hard disks and file systems, data acquisition, anti-forensics defeat, Windows / Linux / Mac forensics, network and dark web investigations, and forensics across email, malware, mobile and IoT.

The forensics discipline, types of investigations, legal context, the chain of custody.
Phases of investigation — preparation, on-scene response, evidence acquisition, analysis, reporting.
Storage media internals, FAT, NTFS, ext family, HFS+, APFS. Knowing where the artefacts actually live.
Imaging techniques, write blockers, forensic hashes (MD5/SHA), validation. Evidence handling that survives court.
Steganography, encryption, secure deletion, log tampering — and how to detect and recover anyway.
Registry analysis, event logs, prefetch, shellbags, USB artefacts, memory forensics.
Filesystem analysis, log files, user artefacts, persistence mechanisms across Unix-style hosts.
Packet captures, flow analysis, log correlation, intrusion timeline reconstruction.
Web server logs, application logs, attack pattern recognition, root-cause analysis.
Tor network investigations, cryptocurrency tracing, marketplace analysis.
SQL and NoSQL forensics, transaction logs, data recovery, exfiltration analysis.
Acquisition and analysis across AWS, Azure and GCP. Provider responsibility models and evidence retention.
Header analysis, spoofing detection, phishing attribution, mailbox forensics.
Static and dynamic analysis, sandboxing, behaviour profiling, IOC extraction.
iOS and Android acquisition, logical and physical extraction, app artefact analysis.
Smart devices, embedded systems, firmware analysis, evidence preservation in IoT environments.
№ 05 / CSA

Certified SOC Analyst.

The fastest route into a Security Operations Center seat. Six tightly-scoped modules covering SOC fundamentals, threat intel, logging, SIEM-driven detection, and incident response. Built for new SOC analysts, tier-1 candidates, and IT staff pivoting into security operations.

SOC fundamentals, types of SOCs, the analyst's role across tiers, operating models, common tooling.
Threat actors, threat categories, attack lifecycle, kill chain and MITRE ATT&CK framework.
Log sources, log types, formatting standards, centralised log management, retention requirements.
SIEM architecture, correlation rules, alert tuning, dashboard building, common platforms in production.
Threat intel feeds, IOC management, enrichment, TIP integration, intelligence-driven detection.
Incident response lifecycle, playbooks, escalation, communication, post-incident lessons learned.
№ 06 / Faculty

SMEs who've worked the threat.

Our cyber instructors carry over 40 years combined industry experience — including offensive engagements, forensic investigations, and SOC operations. Read about us, then read what our graduates say.

Lead Instructor · CEH · CHFI · CISSP
Senior Cyber Practice Lead

Two decades across pen-testing, incident response and forensic investigation for energy, healthcare and federal clients. Designs and runs our hands-on lab exercises personally.

SOC Lead · CSA · GCIH
CSA Track Mentor

Active SOC analyst lead at a Fortune 100 financial services firm. Walks CSA students through real (sanitised) SIEM alerts, playbooks, and threat-intel-driven detections.

№ 07 — From a graduate
"The knowledge I gained doesn't compare to other sources I tried. The mentorship and tutoring, I wouldn't trade for nothing. You definitely don't have to have a background in IT."
SL
Samuel Lawson
Cyber Security Graduate
№ 08 / Questions

The questions we hear most.

Yes. As of October 4, 2023, Mac Jason Academy is approved as an EC-Council Accredited Training Center (ATC), authorized to deliver the official EC-Council CEH, CHFI and CSA certification training and testing programs. Our ATC certificate is available on request.
ANSI 17024 is the international standard for bodies that certify individuals. EC-Council meets it, which means its credentials are recognised by federal agencies and large enterprises that require accredited certification — including DoD 8570/8140 baselines for some roles.
CEH has no formal prerequisite, though networking fundamentals help. CHFI assumes CEH-level knowledge. CSA is suitable for new analysts and IT staff pivoting into security. We have graduates from non-IT backgrounds — career-changers do well here.
Exam vouchers are available — sometimes bundled, sometimes added at cost depending on the program and cohort. Call admissions on 832-757-9988 for current pricing on the program you're targeting.
Yes, and many students do. The natural sequence is CEH → CHFI (with CHFI requiring CEH knowledge), with CSA running in parallel for those moving into SOC roles. Bundle pricing is available — call admissions.
All three. Live in our Sugar Land classroom, simultaneously online via webinar, or a mix. Lab access is the same in either format.
Yes. Students route through our Mac Jason Consult Cyber Security Internship Program, working on real engagements for Fortune 100 firms. That direct work experience materially improves your placement odds.
Yes — Mia-Share / Meritize for tuition financing. See Financial Aid or call 832-757-9988 for advice.
№ 09 — Enroll

Train where the threat lives.

Hold your seat or call admissions for a quick fit-check. We'll tell you which program (or which order) makes sense given your background and where you're trying to land.