Cybercrime is on the rise all over the world. We hear about people and companies being victimized by hackers every day. Companies are recognizing the fact that in order to defend against these criminals, we must think like the criminal. We must know the tools and skills of malicious hackers in order to defend against these attacks. This course will teach you the skills and techniques that malicious hackers use so we can better understand how to defend against them. This course is essential for people entering the cybersecurity world. This certification can be used to apply for positions, such as a network penetration tester or a cybersecurity analyst. This is a condensed version of the 15-week course and would be a good course to use as a refresher or exam prep. We will spend 5 days going over all the material needed to become a certified ethical hacker.
Digital copy of textbook, lunch, access to iLabs, and a CEH voucher are included in the course price.
The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. You can find more information about this certification by visiting https://www.eccouncil.org
Prerequisite: High school diploma or equivalent. This is a fast-paced bootcamp. Working knowledge of computers and access to computer and Internet are required. Students should have a strong understanding of network operations and security terminology prior to enrolling. Some experience with Linux command line and command line tools is required. An interest in cybersecurity and cybersecurity knowledge is encouraged.
- Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
- Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information systems.
- Compare and contrast different hacking techniques and analyze the legal implications of hacking.
- Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.
- Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information.
- Compare and contrast various network security assessments and hacking tools.
- Assess various network security techniques and tools, and implement the appropriate level of information security controls based on evidence, information, and research.