• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

Cybersecurity Intermediate Program Objectives

  • Identify basic network theory concepts and major network communications methods
  • Describe bounded network media
  • Identify unbounded network media
  • Identify the major types of network implementations
  • Identify TCP/IP addressing and data delivery methods
  • Implement routing technologies
  • Identify the major services deployed on TCP/IP networks
  • Identify the infrastructure of a WAN implementation
  • Identify the components used in cloud computing and virtualization
  • Describe basic concepts related to network security
  • Prevent security breaches
  • Respond to security incidents
  • Identify the components of a remote network implementation
  • Identify the tools, methods, and techniques used in managing a network
  • Describe troubleshooting of issues on a network
  • Identify the hardware components of personal computers and mobile digital devices
  • Identify the basic components and functions of operating systems
  • Identify networking and security fundamentals
  • Identify the operational procedures that should be followed by professional PC technicians
  • Install, configure, and troubleshoot display devices
  • Install and configure peripheral components
  • Manage system components
  • Manage data storage
  • Install and configure Microsoft Windows
  • Optimize and maintain Microsoft Windows
  • Work with other operating systems
  • Identify the hardware and software requirements for client environment configurations
  • Identify network technologies
  • Install and configure networking capabilities
  • Support mobile digital devices
  • Support printers and multifunction devices
  • Identify security threats, vulnerabilities, and controls
  • Implement security controls
  • Troubleshoot system-wide issues

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management
  • Software Development
  • Systems Development

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.