Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. ECPI University
  4. Ethical Hacking Lab

Ethical Hacking Lab

This course will provide students with practice and skill-building exercises required to identify and document security vulnerabilities. The student will learn penetration testing in a lab environment using ethical principles to secure a computer data environment. Upon completion students will be able to provide an in-depth understanding of secure communications channels, devices and media.

Course Overview

Overall Proficiency Level
3 - Advanced
Course Catalog Number
CIS403L
Course Prerequisites

CIS212

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
Online, Self-Paced
Classroom
Course Locations

10021 Balls Ford Rd
Suite 100
Manassas, VA 20109

5234 Airport Rd NW
Suite 200
Roanoke, VA 24012

11104 W Broad St
Glen Allen, VA 23060

800 Moorefield Park Dr.
Richmond, VA 23236

5555 Greenwich Rd
Virginia Beach, VA 23462

1001 Omni Blvd
Newport News, VA 23606

4800 Airport Center Pkwy
Suite 100
Charlotte, NC 28208

7802 Airport Center Dr
Greensboro, NC 27409

4101 Doie Cope Rd
Raliegh, NC 27613

1001 Keys Dr
Suite 100
Greenville, SC 29615

250 Berryhill Rd
Suite 300
Columbia, SC 29210

3800 Paramount Dr
Charleston, SC 29405

660 Century Point
Suite 1050
Lake Mary, FL 32746

4715 Fredericksburg Rd
San Antonio, TX 78229

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Online, Instructor-Led
  • Online, Self-Paced
  • Classroom

Learning Objectives

Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements. Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system. Compare and contrast different hacking techniques and analyze the legal implications of hacking. Examine different vulnerabilities, threats and attacks to information systems and recommend countermeasures. Compare and contrast various network security assessment and hacking tools. Assess various network security techniques and tools and implement appropriate level of information security controls based on evidence, information, and research.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: