Dive into an interactive environment where you will learn to scan, test and secure systems against hackers. Hands-on lab exercises provide in-depth knowledge and practical experience with the latest essential security systems.
Understand perimeter defenses, and then scan and attack your own networks (networks are not harmed). Learn how intruders escalate privileges and the critical steps to secure a system. Study intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, virus creation and cloud computing. Upon completion, you will be ready to schedule the CEH exam through the UAH Testing and Certification Services. Visit .eccouncil.org for complete certification information.
Learning Objectives
Upon Completion, you will demonstrate competence in:
- Understanding ethical and legal frameworks in cybersecurity.
- Gathering intelligence and scanning networks to find vulnerabilities.
- Exploiting systems using hacking and enumeration techniques.
- Identifying malware and using sniffing tools to detect threats.
- Defending against denial-of-service (DoS) attacks and social engineering.
- Preventing session hijacking and securing user sessions.
- Identifying and mitigating web vulnerabilities, including SQL injection.
- Securing wireless and mobile platforms from attacks.
- Evading intrusion detection systems (IDS), firewalls and honeypots.
- Securing cloud environments from cyber threats.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.