Ethical hackers find vulnerable or unsecured entry points in computer networks, gain access to the network, then work to fix the weaknesses. Using the same tools as malicious hackers do, they scan network ports, examine software installed on the network and seek ways to find files, passwords, and information that could be stolen.
Hacking skills include identity and password spoofing, network traffic monitoring (sniffing), exploiting network overflows and injecting malicious code into network databases. Ethical hackers use all of these skills for the purpose of detecting and preventing intrusions and damage.
Ethical hacking involves access to extremely sensitive and valuable equipment, software and data. A certification such as the Certified Ethical Hacker (CEH) signals to the network security industry that an ethical hacker takes the commitment to diligence and integrity seriously.
Ethical hacking is a highly mobile profession that lends itself well to remote, contracting and freelance work.
- Learn key topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking
- Identify and defend against webserver attacks, including wireless and mobile hacking
- Be able to evade IDS, firewalls, and honeypots
- Recognize and address threats that accompany cloud computing and cryptography
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50
There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.
- Introduction to Ethical Hacking: Key InfoSec issues; incident management process and penetration testing
- Footprinting and Reconnaissance: Various types of footprinting, tools and countermeasures
- Scanning Networks: Network scanning techniques and countermeasures
- Enumeration: Enumeration techniques and countermeasures
- System Hacking: System hacking methodology, steganography and steganalysis
- Malware Threats: Analysis and countermeasure for malware types including trojans, viruses, and worms
- Evading IDS, Firewalls, AND Honeypots: IDS and honeypot evasion tools, techniques, and countermeasures
- Sniffing: Packet sniffing techniques and defense
- Social Engineering: Techniques and countermeasures for social engineering and identify theft
- Denial of Service: DoS/DDoS attack tools, techniques, and countermeasures
- Session Hijacking: Session hijacking techniques and countermeasures
- Hacking Web Servers: Methodology and countermeasures for webserver attacks
- Hacking Web Applications: Methodology and countermeasures for web application attacks
- SQL Injection: SQL injection attacks and detection tools
- Hacking Wireless Networks: Wireless encryption hacking tools, techniques, and methodology; WiFi security
- Hacking Mobile Platforms: Mobile platform attack vector; mobile security guidelines and tools; and Android, iOS and Windows vulnerabilities
- Cloud Computing: Cloud computing concepts, threats and attacks; security techniques and tools
- Cryptography: Cryptography ciphers, attack and tools; public key infrastructure (PKI)
Since 2005, Eric Reed has provided security consulting to large organizations including Fortune 500 companies and the United States military. His pass rate for CEH, CHFI, and ECSA/LPT exams is 95%. He is a member of the EC-Council certification organization’s Circle of Excellence.
Registration and Enrollment
This course is 100% online. Start any time.