Prepare for the CEH certification while learning the latest ethical hacking techniques.
If you're concerned about the integrity of your network's infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network's defenses. You'll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you'll also learn how intruders operate and the steps to secure a system.
In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.
How to scan, test, hack and secure their own systems. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.