Skip to Content
My MSU

Center for Continuing and Professional Studies


Certified Ethical Hacker (Voucher Included)

Ethical hackers use the same tools and techniques as malicious hackers but deploy them to prevent intrusion and damage to IT systems. This 100% online course will prepare you for EC-Council's Certified Ethical Hacker exam (312-50). You will master key concepts in ethical hacking, including scanning testing and hacking computer networks to devise and implement security measures.

ENROLL NOW


Job Outlook for Certified Ethical Hackers

As a cybersecurity position, ethical hacking is considered among the most popular and potentially lucrative jobs of the 21st century. According to PayScale.com, ethical hackers earn over $80,000 per year on average, not including bonuses.
Cybersecurity experts note that the fluid, fast-changing nature of data protection ensures a dynamic and challenging career path for ethical hackers.
The US Bureau of Labor Statistics (BLS) lists cybersecurity among its fastest-growing career areas. The BLS expects 32% growth in information security jobs over the coming decade, over six times the growth rate for all jobs.

Certified Ethical Hacker FAQs

WHAT DO ETHICAL HACKERS DO?
Ethical hackers find vulnerable or unsecured entry points in computer networks, gain access to the network, then work to fix the weaknesses. Using the same tools as malicious hackers do, they scan network ports, examine software installed on the network and seek ways to find files, passwords, and information that could be stolen.

WHAT SKILLS ARE IMPORTANT FOR ETHICAL HACKING?
Hacking skills include identity and password spoofing, network traffic monitoring (sniffing), exploiting network overflows, and injecting malicious code into network databases. Ethical hackers use all of these skills for the purpose of detecting and preventing intrusions and damage.

IS CERTIFICATION IMPORTANT FOR AN ETHICAL HACKER POSITION?
Ethical hacking involves access to extremely sensitive and valuable equipment, software, and data. A certification such as the Certified Ethical Hacker (CEH) signals to the network security industry that an ethical hacker takes the commitment to diligence and integrity seriously.

IS ETHICAL HACKING A GOOD CAREER FOR REMOTE WORK?
Ethical hacking is a highly mobile profession that lends itself well to remote, contracting, and freelance work.

Course Objectives

Learn key topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking
Identify and defend against webserver attacks, including wireless and mobile hacking
Be able to evade IDS, firewalls, and honeypots
Recognize and address threats that accompany cloud computing and cryptography
Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50

ENROLL NOW

Prerequisites

There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software, and security.

Curriculum

INTRODUCTION TO ETHICAL HACKING
Key InfoSec issues; incident management process and penetration testing

FOOTPRINTING AND RECONNAISSANCE
Various types of footprinting, tools, and countermeasures

SCANNING NETWORKS
Network scanning techniques and countermeasures

ENUMERATION
Enumeration techniques and countermeasures

SYSTEM HACKING
System hacking methodology, steganography, and steganalysis

MALWARE THREATS
Analysis and countermeasure for malware types including trojans, viruses, and worms

Evading IDS, Firewalls, and Honeypots
IDS and honeypot evasion tools, techniques, and countermeasures

SNIFFING
Packet sniffing techniques and defense

SOCIAL ENGINEERING
Techniques and countermeasures for social engineering and identify theft

DENIAL OF SERVICE
DoS/DDoS attack tools, techniques, and countermeasures

SESSION HIJACKING
Session hijacking techniques and countermeasures

HACKING WEB SERVERS
Methodology and countermeasures for webserver attacks

HACKING WEB APPLICATIONS
Methodology and countermeasures for web application attacks

SQL INJECTION
SQL injection attacks and detection tools

HACKING WIRELESS NETWORKS
Wireless encryption hacking tools, techniques, and methodology; WiFi security

HACKING MOBILE PLATFORMS
Mobile platform attack vector; mobile security guidelines and tools; and Android, iOS, and Windows vulnerabilities

CLOUD COMPUTING
Cloud computing concepts, threats, and attacks; security techniques and tools

CRYPTOGRAPHY
Cryptography ciphers, attack, and tools; public key infrastructure (PKI)

Instructors

Eric Reed
Since 2005, Eric Reed has provided security consulting to large organizations including Fortune 500 companies and the United States military. His pass rate for CEH, CHFI, and ECSA/LPT exams is 95%. He is a member of the EC-Council certification organization's Circle of Excellence.

Registration and Enrollment

This course is 100% online. Start any time.

ENROLL NOW