• Classroom
Course Description

If you’re concerned about the integrity of your network’s infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v7 to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you’ll learn how intruders operate and the steps you can take to secure a system.

In the interactive, lab— filled environment of this ethical hacking course, you will gain In—depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC—Council. A VUE exam voucher is included with your course registration; however, the exam will not be administered in class to allow for maximum discussion opportunities and hands—on activities.

Learning Objectives

Footprinting and reconnaissance
Hacking web servers, web applications, and wireless networks
Cryptography
Penetration testing
Social engineering
Trojans, viruses, and worms
Evading IDS, firewalls, and honeypots
Enumeration
Buffer overflows

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Exploitation Analysis
  • Systems Administration
  • Systems Analysis
  • Threat Analysis
  • Vulnerability Assessment and Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.