• Classroom
Course Description

Dive into an interactive environment where you will learn to scan, test and secure systems against hackers. Hands-on lab exercises provide in-depth knowledge and practical experience with the latest essential security systems.

Understand perimeter defenses, and then scan and attack your own networks (networks are not harmed). Learn how intruders escalate privileges and the critical steps to secure a system. Study intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, virus creation and cloud computing. Upon completion, you will be ready to schedule the CEH exam through the UAH Testing and Certification Services. Visit .eccouncil.org for complete certification information.

Learning Objectives

Upon Completion, you will demonstrate competence in:

  • Understanding ethical and legal frameworks in cybersecurity.
  • Gathering intelligence and scanning networks to find vulnerabilities.
  • Exploiting systems using hacking and enumeration techniques.
  • Identifying malware and using sniffing tools to detect threats.
  • Defending against denial-of-service (DoS) attacks and social engineering.
  • Preventing session hijacking and securing user sessions.
  • Identifying and mitigating web vulnerabilities, including SQL injection.
  • Securing wireless and mobile platforms from attacks.
  • Evading intrusion detection systems (IDS), firewalls and honeypots.
  • Securing cloud environments from cyber threats.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):