• Classroom
Course Description

Dive into an interactive environment and learn how to scan, test, and secure systems from hackers. Our hands-on lab gives each student in-depth knowledge and practical experience with the current essential security systems.

Learn how perimeter defenses work and then scan and attack your own networks (no real network is harmed). Understand how intruders escalate privileges and what steps can be taken to secure a system. Study Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and Cloud Computing. After completion of the course, you will be eligible to schedule the CEH exam through the UAH Testing and Certification Services. Go to www.eccouncil.org for complete certification information.

Learning Objectives

Certification Test Preparation

Framework Connections