Online Certified Ethical Hacker Course

Gain the skills needed to qualify for certified ethical hacker jobs such as security analyst or networking professional.

 

Quick Details

Ethical hackers use the same tools and techniques as malicious hackers but deploy them to prevent intrusion and damage to IT systems. This 100% online course will prepare you for EC-Council’s Certified Ethical Hacker exam (312-50). You will master key concepts in ethical hacking, including scanning, testing and hacking computer networks to devise and implement security measures.

Total Hours: 100

Tuition: $3,299 includes course materials and voucher for the certifying exam.

Location: Online

This course is WIOA approved and is on the Maryland Eligible Training Provider List (ETPL).

This course is delivered by our education partners at ed2go.

Upcoming Date Schedule Register
Open enrollment. Begin anytime. Set your own. Must be completed within six months of registration. Register

We create opportunities for Greater Baltimore’s Workforce. 

Learn More

Have questions? We have answers.

Request Information

More About This Course

What do ethical hackers do?

Ethical hackers find vulnerable or unsecured entry points in computer networks, gain access to the network, then work to fix the weaknesses. Using the same tools as malicious hackers do, they scan network ports, examine software installed on the network and seek ways to find files, passwords, and information that could be stolen.

What skills are important for ethical hacking?

Hacking skills include identity and password spoofing, network traffic monitoring (sniffing), exploiting network overflows and injecting malicious code into network databases. Ethical hackers use all of these skills for the purpose of detecting and preventing intrusions and damage.

Is certification important for an ethical hacker position?

Ethical hacking involves access to extremely sensitive and valuable equipment, software and data. A certification such as the Certified Ethical Hacker (CEH) signals to the network security industry that an ethical hacker takes the commitment to diligence and integrity seriously.

Is ethical hacking a good career for remote work?

Ethical hacking is a highly mobile profession that lends itself well to remote, contracting and freelance work.

What is the job outlook for Certified Ethical Hackers?

  • As a cybersecurity position, ethical hacking is considered among the most popular and potentially lucrative jobs of the 21st century. According to PayScale.com, ethical hackers earn over $80,000 per year on average, not including bonuses.
  • Cybersecurity experts note that the fluid, fast-changing nature of data protection ensures a dynamic and challenging career path for ethical hackers.
  • The US Bureau of Labor Statistics (BLS) lists cybersecurity among its fastest-growing career areas. The BLS expects 32% growth in information security jobs over the coming decade, over six times the growth rate for all jobs.

There are no mandatory prerequisites prior to taking Certified Ethical Hacker (CEH). However, you must have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.

This course will immerse you into the hacker mindset, putting you in the driver's seat of hands-on activities.

  • Learn key topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking
  • Identify and defend against webserver attacks, including wireless and mobile hacking
  • Be able to evade IDS, firewalls, and honeypots
  • Recognize and address threats that accompany cloud computing and cryptography
  • Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50

Module 1. Certified Ethical Hacking

  • Key issues plaguing the information security world
  • Incident Management Process
  • Penetration Testing

Module 2. Footprinting and Reconnaissance

  • Various types of footprinting
  • Footprinting tools
  • Countermeasures

Module 3. Scanning Networks

  • Network scanning techniques
  • Scanning countermeasures

Module 4. Enumeration

  • Enumeration techniques
  • Enumeration countermeasures

Module 5. System Hacking

  • System hacking methodology
  • Steganography
  • Steganalysis
  • Attacks and covering tracks

Module 6. Malware Threats

  • Different types of Trojans
  • Trojan Analysis
  • Trojan Countermeasures
  • Working of Viruses
  • Virus Analysis
  • Computer Worms
  • Malware Analysis Procedure

Module 7. Evading IDS, Firewalls and Honeypots

  • Firewall
  • IDS and Honeypot Evasion Techniques
  • Evasion Tools
  • Countermeasures

Module 8. Sniffing

  • Packet sniffing techniques
  • How to defend against sniffing

Module 9. Social Engineering

  • Social Engineering techniques
  • Identify theft
  • Social Engineering
  • Countermeasures

Module 10. Denial of Service

  • DoS/DDoS attack techniques
  • Botnets
  • DDoS attack tools
  • DoS/DDoS Countermeasures

Module 11. Session Hijacking

  • Session hijacking techniques
  • Countermeasures

Module 12. Hacking Web Servers

  • Different types of webserver attacks
  • Attack methodology
  • Countermeasures

Module 13. Hacking Web Applications

  • Different types of web application attacks
  • Web Application
  • Hacking Methodology
  • Countermeasures

Module 14. SQL Injection

  • SQL injection attacks
  • Injection detection tools

Module 15. Hacking Wireless Networks

  • Wireless Encryption
  • Wireless hacking methodology
  • Wireless Hacking Tools
  • Wi-Fi- Security Tools

Module 16. Hacking Mobile Platforms

  • Mobile Platform Attack Vector
  • Android Vulnerabilities
  • Jailbreaking  D. iOS, windows phone 8 vulnerabilities
  • Mobile Security Guidelines and Tools

Module 17. Cloud Computing

  • Various Cloud Computing Concepts
  • Threats, Attacks, and Security
  • Techniques and Tools

Module 18. Cryptography

  • Different types of Cryptography Ciphers
  • Public Key Infrastructure (PKI)
  • Cryptography Attacks
  • Cryptanalysis Tools 

Download Course Outline (PDF)

Your voucher for the exam is included in the tuition. When you have successfully completed the course, you will be instructed in how to apply for the exam. Learn more about the certification exam.

Hardware Requirements

  • This course can be taken on either a PC or Mac.
  • Webcams are strongly recommended.

Software Requirements

  • PC: Windows 8 or later.
  • Mac: OS X Yosemite 10.10 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Flash Player. Download the Flash Player.
  • Adobe Acrobat Reader. Download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other

  • Email capabilities and access to a personal email account.

*NOTE: WIOA, G.I. Bill®, and other specialized workforce assistance programs are not eligible for discounts.