
Certified ethical hacker
Ethical hackers use the same tools and techniques as malicious hackers but deploy them to prevent intrusion and damage to IT systems. This 100% online course will prepare you for EC-Council’s Certified Ethical Hacker exam (312-50). You will master key concepts in ethical hacking, including scanning testing and hacking computer networks to devise and implement security measures.
Job Outlook for Certified ethical hacker
-
As a cybersecurity position, ethical hacking is considered among the most popular and potentially lucrative jobs of the 21st century. According to PayScale.com, ethical hackers earn over $80,000 per year on average, not including bonuses.
-
Cybersecurity experts note that the fluid, fast-changing nature of data protection ensures a dynamic and challenging career path for ethical hackers.
-
The US Bureau of Labor Statistics (BLS) lists cybersecurity among its fastest-growing career areas. The BLS expects 32% growth in information security jobs over the coming decade, over six times the growth rate for all jobs.
Course Objectives
-
Learn key topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking
-
Identify and defend against webserver attacks, including wireless and mobile hacking
-
Be able to evade IDS, firewalls, and honeypots
-
Recognize and address threats that accompany cloud computing and cryptography
-
Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50
Prerequisites and Requirements
There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.Curriculum
Key InfoSec issues; incident management process and penetration testing
FOOTPRINTING AND RECONNAISSANCE
Various types of footprinting, tools and countermeasures
SCANNING NETWORKS
Network scanning techniques and countermeasures
ENUMERATION
Enumeration techniques and countermeasures
SYSTEM HACKING
System hacking methodology, steganography and steganalysis
MALWARE THREATS
Analysis and countermeasure for malware types including trojans, viruses, and worms,
SNIFFING
Packet sniffing techniques and defense
SOCIAL ENGINEERING
Techniques and countermeasures for social engineering and identify theft
DENIAL OF SERVICE
DoS/DDoS attack tools, techniques, and countermeasures
SESSION HIJACKING
Session hijacking techniques and countermeasures
HACKING WEB SERVERS
Methodology and countermeasures for webserver attacks
HACKING WEB APPLICATIONS
Methodology and countermeasures for web application attacks
SQL INJECTION
SQL injection attacks and detection tools
HACKING WIRELESS NETWORKS
Wireless encryption hacking tools, techniques, and methodology; WiFi security
HACKING MOBILE PLATFORMS
Mobile platform attack vector; mobile security guidelines and tools; and Android, iOS and Windows vulnerabilities
CLOUD COMPUTING
Cloud computing concepts, threats and attacks; security techniques and tools
CRYPTOGRAPHY
Cryptography ciphers, attack and tools; public key infrastructure (PKI)
faqs
WHAT DO ETHICAL HACKERS DO?
WHAT SKILLS ARE IMPORTANT FOR ETHICAL HACKING?
Hacking skills include identity and password spoofing, network traffic monitoring (sniffing), exploiting network overflows and injecting malicious code into network databases. Ethical hackers use all of these skills for the purpose of detecting and preventing intrusions and damage.
IS CERTIFICATION IMPORTANT FOR AN ETHICAL HACKER POSITION?
IS ETHICAL HACKING A GOOD CAREER FOR REMOTE WORK?
Additional Course Information
100% online, completely self-paced with no meeting times and access to your course 24/7/365. Open entry--you can start as soon as your tuition is paid in full.Contact with your instructor is via email and a student advisor is assigned to each student.
Financial Assistance in the form of a low interest student loan is available. Please contact Program Coordinator for more information.
If you are unemployed or under-employed, you might be able to obtain training assistance from Utah Department of Workforce Services. Begin your application.
Instructors
Eric Reed
Since 2005, Eric Reed has provided security consulting to large organizations including Fortune 500 companies and the United States military. His pass rate for CEH, CHFI, and ECSA/LPT exams is 95%. He is a member of the EC-Council certification organization's Circle of Excellence.
Similar course
Certified Network Defender (CND), exam voucher included
Computer Hacking Forensics Investigator (CHFI), exam voucher included
CompTIA Certification Training: Network+, Security+, exam vouchers included
SSCP Systems Security Certified PractitionerOMCA Social Media Associate
Not what you’re looking for?
Explore our entire Advanced Career Training online course catalog