MasterClass Training at Hacker Halted

We are so excited to announce that MasterClass Training at Hacker Halted is returning to Atlanta in October 2026! Enter the Hackerverse and get Cybersecurity Training Live Online or In Person!

When you take training at Hacker Halted, you get so much more than a class.

Community


Hacker Halted Training is the largest gathering of EC-Council students all year. No matter what program you enroll in, you’ll network with students from all courses.

Certification


Learn new skills from the best instructors in the industry as you earn one of EC-Council’s array of leading programs. Take training, take the exam, and walk into the two days of Hacker Halted conference newly certified!

Conference Included


All students of Hacker Halted Training are invited to attend the full Hacker Halted conference (CCISO students are invited to attend the Global CISO Forum) at no additional cost – conference shirt included!

STORM


Take your skills to the next level with EC-Council’s mobile hacking device! Hacker Halted CEH & CHFI Courses include a STORM device at no additional charge when class is purchased at full price! (Applies to In-Person courses only.)

Certified Ethical Hacker MasterClass

Sunday, October 4th – Wednesday, October 7th | Westin Peachtree Plaza Atlanta
Training times will be from 9am – 5pm EST

Register for Training

The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. CEH v13 powered with AI capabilities will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.

CEH v13 powered with AI capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker.

Course Outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography
  • Courseware
  • Exam Voucher
  • Hands-On Labs

STORM CTF – After class on Day 2 (October 5th) there will be a Capture the Flag event utilizing the STORM device. Competing is free, but must have a STORM and there will be VISA gift card prizes for 1st, 2nd and 3rd place!

Executive Management MasterClass

Sunday, October 4th – Wednesday, October 7th | Westin Peachtree Plaza Atlanta
Training times will be from 9am – 5pm EST!

Register for Training

The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.

Course Outline

  • Domain 1: Governance and Risk Management
  • Domain 2: Information Security Controls, Compliance, and Audit Management
  • Domain 3: Security Program Management & Operations
  • Domain 4: Information Security Core Competencies
  • Domain 5: Strategic Planning, Finance, Procurement and Vendor Management
  • Courseware
  • Exam Voucher

Computer Forensics MasterClass

Sunday, October 4th – Wednesday, October 7th | Westin Peachtree Plaza Atlanta
Training times will be from 9am – 5pm EST!

Register for Training

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

The CHFI certification gives participants (Law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.) the necessary skills to perform an effective digital forensics investigation.

CHFI presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence.

Course Outline

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Data Acquisition and Duplication
  • Defeating Anti-forensics Techniques
  • Windows Forensics
  • Linux and Mac Forensics
  • Network Forensics
  • Investigating Web Attacks
  • Dark Web Forensics
  • Database Forensics
  • Cloud Forensics
  • Investigating Email Crimes
  • Malware Forensics
  • Mobile Forensics
  • IoT Forensics

[/su_column][/su_row]

  • Courseware
  • Exam Voucher
  • Hands-On Labs

STORM CTF – After class on Day 2 (October 5th) there will be a Capture the Flag event utilizing the STORM device. Competing is free, but must have a STORM and there will be VISA gift card prizes for 1st, 2nd and 3rd place!

Cloud Security MasterClass

Sunday, October 4th – Wednesday, October 7th | Westin Peachtree Plaza Atlanta
Training times will be from 9am – 5pm EST!

Register for Training

Certified Cloud Security Engineer (CCSE) is a hands-on course designed and developed by cloud security professionals in association with subject matter experts across the globe. This course includes both vendor neutral and vendor specific cloud security concepts. Vendor neutral concepts include universally applicable general cloud security best practices, technology, frameworks, and principles that help individuals to strengthen their fundamentals. It helps professionals to develop and enhance their knowledge and skills in planning, configuring, implementing, and maintaining a secure cloud environment for their organizations, and validates their knowledge, skills, and abilities in protecting, detecting, and responding to threats in the cloud network infrastructure.

Course Outline

  • Module 01: Introduction to Cloud Security
  • Module 02: Cloud Platform and Infrastructure Security in Cloud
  • Module 03: Application Security in Cloud
  • Module 04: Data Security in Cloud
  • Module 05: Security Operations in Cloud
  • Module 06: Cloud Penetration Testing in Cloud
  • Module 07: Incident Response in Cloud
  • Module 08: Forensic Investigation in Cloud
  • Module 09: Business Continuity and Disaster Recovery in Cloud
  • Module 10: Governance, Risk Management, and Compliance (GRC) in Cloud
  • Module 11: Standards, Policies, and Legal Issues in Cloud
  • Courseware
  • Exam Voucher
  • Hands-On Labs

STORM CTF – After class on Day 2 (October 5th) there will be a Capture the Flag event utilizing the STORM device. Competing is free, but must have a STORM and there will be VISA gift card prizes for 1st, 2nd and 3rd place!

Certified Responsible AI Governance & Ethics

Sunday, October 4th – Wednesday, October 7th | Westin Peachtree Plaza Atlanta
Training times will be from 9am – 5pm EST!

Register for Training

Enterprises need leaders who can embed governance throughout the AI life cycle, from ideation to deployment. This credential validates your ability to operationalize governance aligned with NIST AI RMF and ISO/IEC 42001, helping enterprises scale AI with accountability.

  • 11 Comprehensive Modules
  • Framework-Driven, Regulation-Aligned Curriculum
  • Scenario-Based Governance and Risk Analysis

Course Outline

  • AI Foundations and Technology Ecosystem
  • AI Concerns, Ethical Principles, and Responsible AI
  • AI Strategy and Planning
  • AI Governance and Frameworks
  • AI Regulatory Compliance
  • AI Risk and Threat Management
  • Third-Party AI Risk Management and Supply Chain Security
  • AI Security Architecture and Controls
  • Building Privacy, Trust, and Safety in AI Systems
  • AI Incident Response and Business Continuity
  • AI Assurance, Testing, and Auditing

Certified AI Program Manager

Sunday, October 4th – Wednesday, October 7th | Westin Peachtree Plaza Atlanta
Training times will be from 9am – 5pm EST!

Register for Training

EC-Council’s Certified AI Program Manager (C|AIPM) is a comprehensive certification designed to transform experienced professionals into enterprise-ready AI program managers. Participants will develop the strategic skills to adopt, apply, and secure AI initiatives across real-world organizations.

This program bridges the gap between technical AI knowledge and business execution, equipping you to align artificial intelligence with strategy, people, governance, risk management, and measurable ROI.

Course Outline

  • AI Fundamentals for Business Adoption
  • Organizational Readiness and AI Maturity Assessment
  • AI Use Case Identification and Value Prioritization
  • AI Strategy and Adoption Roadmap Design
  • Change Management and AI Enablement
  • AI Platforms, Tools, and Ecosystem
  • Governance, Ethics, and Safe AI Adoption
  • AI Pilot Execution and Scaled Deployment
  • Measuring AI Adoption Impact and Value
  • Sustaining AI Transformation

Certified Offensive AI Security Professional

Sunday, October 4th – Wednesday, October 7th | Westin Peachtree Plaza Atlanta
Training times will be from 9am – 5pm EST!

Register for Training

LLMs are vulnerable. Prompt injection bypasses guardrails. Data poisoning corrupts models. This credential enables you to red-team AI systems, exploit vulnerabilities in LLMs and agents, and build defenses that survive real-world attacks.

  • Red-team LLMs: prompt injection, jailbreaking, guardrail bypass
  • Exploit AI agents: tool manipulation, memory poisoning, chain attacks
  • Master OWASP LLM Top 10 & MITRE ATLAS attack frameworks

Course Outline

  • Offensive AI and AI System Hacking Methodology
  • AI Reconnaissance and Attack Surface Mapping
  • AI Vulnerability Scanning and Fuzzing
  • Prompt Injection and LLM Application Attacks
  • Adversarial Machine Learning and Model Privacy Attacks
  • Data and Training Pipeline Attacks
  • Agentic AI and Model-to-Model Attacks
  • AI Infrastructure and Supply Chain Attacks
  • AI Security Testing, Evaluation, and Hardening
  • AI Incident Response and Forensics