Certified Ethical Hacker

Program Description

With the onset and proliferation of technical security breaches across the country, major corporations, organizations, small businesses and even individuals are at risk of data breaches and exploitation by bad actors. The need for technicians with the skills to systematically penetrate organizations’ systems in order to expose any potential risk is greater than ever.

In this program, Learners will gain the skills necessary to systematically inspect an organization’s network and system infrastructures to locate vulnerabilities that malicious hackers could exploit. Upon assessing the system’s security to determine if unauthorized access is possible, learners will develop skills to close those security breaches.

This comprehensive program covers the CEH v10 exam objectives through online didactic instruction and labs that thoroughly teach the principles of ethical hacking. Earning this designation validates the application knowledge of auditors, security officers, and site administrators to establish and govern the minimum standards of credentialing professional information security specialists in ethical hacking measures. Passing the CEH exam certifies that individuals have the specific network security discipline of ethical hacking from a vendor-neutral perspective.

  • Ethical Hacking
  • Networking Foundations
  • Security Foundations
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware
  • Sniffing
  • Social Engineering
  • Wireless Security
  • Attack and Defense
  • Cryptography
  • Security Architecture and Design
  • Creating a Personal Linux Firewall Using iptables
  • Observing Syslog Messages
  • Using Event Viewer
  • Configuring Audit Policies in Windows
  • Using the whois Program
  • Using the theHarvester Tool to Gather Information about a Victim
  • Using Recon-ng
  • Using Maltego
  • Using the host Program
  • Using Nslookup for Passive Reconnaissance
  • Performing Zone Transfer Using dig
  • Using DNSRecon
  • Mirroring Sites with HTTrack
  • Using fping
  • Identifying Web Servers Using masscan
  • Scanning a Port Using nmap
  • Using Zenmap
  • Using OpenVAS
  • Using the hping Program
  • Using the Metasploit sunRPC Scanner
  • Using nmap for Enumerating Users
  • Enumerating Data Using enum4linux
  • Using Searchsploit
  • Grabbing a Screenshot of a Target Machine Using Metasploit
  • Exploiting Windows 7 Using Metasploit
  • Cracking a Linux Password Using John the Ripper
  • Cracking a Windows Password Using ophcrack
  • Scanning Malware Using Antivirus
  • Observing an MD5-Generated Hash Value
  • Using the msfvenom Program
  • Using Wireshark
  • Capturing Network Packets Using tcpdump
  • Performing ARP Spoofing
  • Using the SET Tool
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
  • Using OpenSSL to Create a Public/Private Key Pair
  • Observing an SHA-Generated Hash Value
Untitled design 3 1

Program Description

Intermediate

Cyber Security

4-6 Months

Cost

$2,100

Starting at $147.00/mo with nelnet Campus Commerce

Requirements

  • High School Diploma or GED

Program Details

  • Mobile-Ready
  • All Textbooks
  • 24/7 Learner Support
  • Certificate of Completion
  • Externship Opportunity

Questions before you Enroll? Our team is available from 8am to 9pm CST, Monday – Friday. Submit your message in the Request Information form or call us at 877.261.1484

Our Learner Support team is available from 8am to 9pm CST, Monday- Friday. Click below to contact Learner Support: support@edu2.com

Certification Opportunities

After completing this program, learners will have the option to take the leading national/industry-recognized certification exam(s) essential to entry-level employment in this fast-growing field.

 EC Council Certified Ethical Hacker (CEH)

Optional Volunteer Externship Opportunity

Learners who complete this program are eligible to participate in an optional volunteer externship opportunity with a local company/agency/organization whose work aligns with this area of study in order to gain valuable hands-on experience.  As learners progress through their eLearning program, an Externship Coordinator will reach out to coordinate placement.

Note: Additional documentation including health records, immunizations, drug-screening, criminal background checks, etc. may be required by the externship facility.