Are you interested in network security and information technology—but perhaps want more of a challenge than typical IT provides? If so, ethical hacking certification is a unique way to set yourself apart from other IT professionals and add even more value to your organization. As a certified ethical hacker, you'll use the same techniques as the bad guys to assess security and identify weaknesses, except you'll use these hacking powers for good.
To put it one way, "To beat a hacker, you need to think like a hacker." This course will immerse you into the hacker mindset, putting you in the driver's seat of hands-on activities. You will scan, test, hack, and secure your own systems. You will learn the five phases of ethical hacking (reconnaissance, gaining access, enumeration, maintaining access, and covering your tracks) and the ways to approach your target and succeed at breaking in every time.
This accredited course provides you with advanced hacking tools and techniques so that you can assess the security posture of an organization with the same approach these malicious hackers use. You'll be able to identify weaknesses and fix the problems before they are identified by the enemy, preventing what could potentially be catastrophic damage to your organization. This is sure to help you get ahead in your current and future positions.
Upon completion of this course, you will be prepared to sit for the Certified Ethical Hacker Exam 312-50, offered by EC-Council. This course also includes a voucher which covers the fee of the exam.
Upcoming start dates
- Self-paced Online
Who should attend?
The Certified Ethical Hacker course is specifically designed to help individuals with a prior strong knowledge of network infrastructure, computer hardware, software, and security prepare for the (CEH) Exam # 312-50, offered by EC-Council.
- All about key security topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking
- Different types of web server attacks, including wireless and mobile hacking
- How to evade IDS, firewalls, and honeypots
- The various threats that go along with cloud computing and cryptography
Course delivery details
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.
Certification / Credits
You will be prepared for the Certified Ethical Hacker (CEH) Exam # 312-50, offered by EC-Council, and you will receive an exam voucher after successful completion of the course and financial obligation.
Contact this provider
UNF's Division of Continuing Education | Unparalleled Education and Training Programs
The UNF Division of Continuing Education knows how to bring out the best in every student, whether you are looking for career advancement, seeking an industry certification, changing careers, preparing for graduate school or just taking courses for the pure...