Companies are falling victim to data breaches at an alarming rate. By 2020, enterprises and governments will fail to protect 75% of sensitive data (Gartner). Become a part of the solution by training to be an asset in this critical industry.
Enter the world of ethical hacking by learning to understand and identify weaknesses and vulnerabilities in target systems. You will use the same methods and tools as a malicious hacker, but in a lawful and ethical manner to evaluate the target system’s security. This class will help prepare you to take the Certified Ethical Hacker (CEH) certification exam. Textbook and iLabs are included in the course price. Internet access is also required. It is strongly recommended that students have a background or interest in information security.
The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. You can find more information about this certification by visiting https://www.eccouncil.org
Prerequisite: High school diploma or equivalent. Working knowledge of computers and access to computer and Internet are required. Students should have a basic understanding of network operations and security terminology. Textbooks and iLabs are included in the course price.
- Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
- Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information systems.
- Compare and contrast different hacking techniques and analyze the legal implications of hacking.
- Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.
- Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information.
- Compare and contrast various network security assessments and hacking tools.
- Assess various network security techniques and tools, and implement the appropriate level of information security controls based on evidence, information, and research.