• Classroom
Course Description

Dive into an interactive environment and learn how to scan, test, and secure systems from hackers. Our hands-on lab gives each student in-depth knowledge and practical experience with the current essential security systems.

Learn how perimeter defenses work and then scan and attack your own networks (no real network is harmed). Understand how intruders escalate privileges and what steps can be taken to secure a system. Study Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and Cloud Computing. After completion of the course, you will be eligible to schedule the CEH exam through the UAH Testing and Certification Services. Go to www.eccouncil.org for complete certification information.

Learning Objectives

Certification Test Preparation

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis
  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Operations
  • Cybersecurity Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.