Gain the skills needed to qualify for certified ethical hacker jobs such as security analyst or networking professional.
Ethical hackers use the same tools and techniques as malicious hackers but deploy them to prevent intrusion and damage to IT systems. This 100% online course will prepare you for EC-Council’s Certified Ethical Hacker exam (312-50). You will master key concepts in ethical hacking, including scanning, testing and hacking computer networks to devise and implement security measures.
Total Hours: 100-hour course
Tuition: $3,299 includes course materials and voucher for the certifying exam.
This course is WIOA approved and is on the Maryland Eligible Training Provider List (ETPL).
This course is delivered by our education partners at ed2go.
|Open enrollment. Begin anytime.||Set your own. Must be completed within six months of registration.||Register|
Ethical hackers find vulnerable or unsecured entry points in computer networks, gain access to the network, then work to fix the weaknesses. Using the same tools as malicious hackers do, they scan network ports, examine software installed on the network and seek ways to find files, passwords, and information that could be stolen.
Hacking skills include identity and password spoofing, network traffic monitoring (sniffing), exploiting network overflows and injecting malicious code into network databases. Ethical hackers use all of these skills for the purpose of detecting and preventing intrusions and damage.
Ethical hacking involves access to extremely sensitive and valuable equipment, software and data. A certification such as the Certified Ethical Hacker (CEH) signals to the network security industry that an ethical hacker takes the commitment to diligence and integrity seriously.
Ethical hacking is a highly mobile profession that lends itself well to remote, contracting and freelance work.
This course will immerse you into the hacker mindset, putting you in the driver's seat of hands-on activities.
Module 1. Certified Ethical Hacking
Module 2. Footprinting and Reconnaissance
Module 3. Scanning Networks
Module 4. Enumeration
Module 5. System Hacking
Module 6. Malware Threats
Module 7. Evading IDS, Firewalls and Honeypots
Module 8. Sniffing
Module 9. Social Engineering
Module 10. Denial of Service
Module 11. Session Hijacking
Module 12. Hacking Web Servers
Module 13. Hacking Web Applications
Module 14. SQL Injection
Module 15. Hacking Wireless Networks
Module 16. Hacking Mobile Platforms
Module 17. Cloud Computing
Module 18. Cryptography
There are no mandatory prerequisites prior to taking Certified Ethical Hacker (CEH). However, you must have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.
Your voucher for the exam is included in the tuition. When you have successfully completed the course, you will be instructed in how to apply for the exam. Learn more about the certification exam.
*NOTE: WIOA, G.I. Bill®, and other specialized workforce assistance programs are not eligible for discounts.