Dive into an interactive environment and learn how to scan, test, and secure systems from hackers. Our hands-on lab gives each student in-depth knowledge and practical experience with the current essential security systems.
Learn how perimeter defenses work and then scan and attack your own networks (no real network is harmed). Understand how intruders escalate privileges and what steps can be taken to secure a system. Study Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and Cloud Computing. After completion of the course, you will be eligible to schedule the CEH exam through the UAH Testing and Certification Services. Go to www.eccouncil.org for complete certification information.
Learning Objectives
Certification Test Preparation
Framework Connections
Specialty Areas
- All-Source Analysis
- Cyber Defense Analysis
- Cyber Defense Infrastructure Support
- Cyber Operations
- Cybersecurity Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.