Certified Ethical Hacker
Overview
Objective
What You’ll Learn…
Upon completion of this course you will learn:
- Learn key topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking
- Identify and defend against webserver attacks, including wireless and mobile hacking
- Be able to evade IDS, firewalls, and honeypots
- Recognize and address threats that accompany cloud computing and cryptography
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50
Outline
INTRODUCTION TO ETHICAL HACKING
Key InfoSec issues; incident management process and penetration testing
FOOTPRINTING AND RECONNAISSANCE
Various types of footprinting, tools and countermeasures
SCANNING NETWORKS
Network scanning techniques and countermeasures
ENUMERATION
Enumeration techniques and countermeasures
SYSTEM HACKING
System hacking methodology, steganography and steganalysis
MALWARE THREATS
Analysis and countermeasure for malware types including trojans, viruses, and worms
Evading IDS, Firewalls and Honeypots
IDS and honeypot evasion tools, techniques, and countermeasures
SNIFFING
Packet sniffing techniques and defense
SOCIAL ENGINEERING
Techniques and countermeasures for social engineering and identify theft
DENIAL OF SERVICE
DoS/DDoS attack tools, techniques, and countermeasures
SESSION HIJACKING
Session hijacking techniques and countermeasures
HACKING WEB SERVERS
Methodology and countermeasures for webserver attacks
HACKING WEB APPLICATIONS
Methodology and countermeasures for web application attacks
SQL INJECTION
SQL injection attacks and detection tools
HACKING WIRELESS NETWORKS
Wireless encryption hacking tools, techniques, and methodology; WiFi security
HACKING MOBILE PLATFORMS
Mobile platform attack vector; mobile security guidelines and tools; and Android, iOS and Windows vulnerabilities
CLOUD COMPUTING
Cloud computing concepts, threats and attacks; security techniques and tools
CRYPTOGRAPHY
Cryptography ciphers, attack and tools; public key infrastructure (PKI)
Prerequisites and Requirements
There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.
Instructor
Eric Reed has provided security consulting since 2005 to large organizations including Fortune 500 companies and the United States military. His pass rate for CEH, CHFI, and ECSA/LPT exams is 95%. He is a member of the EC-Council certification organization’s Circle of Excellence.
FAQs
- What do ethical hackers do?
Ethical hackers find vulnerable or unsecured entry points in computer networks, gain access to the network, then work to fix the weaknesses. Using the same tools as malicious hackers do, they scan network ports, examine software installed on the network and seek ways to find files, passwords, and information that could be stolen. - How long does it take to complete a program?
When you register, you’ll receive six (6) months to complete this program. - What skills are important for ethical hacking?
Hacking skills include identity and password spoofing, network traffic monitoring (sniffing), exploiting network overflows and injecting malicious code into network databases. Ethical hackers use all of these skills for the purpose of detecting and preventing intrusions and damage. - Is certification important for an ethical hacker position?
Ethical hacking involves access to extremely sensitive and valuable equipment, software and data. A certification such as the Certified Ethical Hacker (CEH) signals to the network security industry that an ethical hacker takes the commitment to diligence and integrity seriously. - Is ethical hacking a good career for remote work?
Ethical hacking is a highly mobile profession that lends itself well to remote, contracting and freelance work. - Can I get financial assistance?
ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. - What happens when I complete the program?
Upon successful completion of the program, you will be awarded a certificate of completion from the ECU Office of Continuing Professional Education. - When can I start the program?
Our programs are all open enrollment. You can register and start the program as soon as you are ready. Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.