Certified Ethical Hacker (CEH) Certification Training
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a Certified Ethical Hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
Learning Outcomes
Upon successful completion of this course, participants will be able to:
Assess Ethical and Legal Requirements: Evaluate the ethical and legal requirements for security assessment and penetration testing, and develop a compliance strategy.
Analyze Hacking Phases: Understand and analyze the different phases of hacking to determine the most effective ethical hacking strategy.
Identify Vulnerabilities and Threats: Identify vulnerabilities, threats, and attacks to information systems, and recommend appropriate countermeasures.
Evaluate Cryptography Techniques: Assess cryptographic algorithms and encryption techniques, and develop strategies for securing information.
Implement Network Security Controls: Evaluate and implement network security techniques and tools based on evidence, information, and research.
Perform Reconnaissance and Enumeration: Conduct reconnaissance and enumeration to gather information about target systems.
Gain and Maintain Access: Use ethical hacking techniques to gain and maintain access to systems for security testing purposes.
Cover Tracks: Understand methods to cover tracks and ensure ethical hacking activities are undetected.
Prepare for CEH Exam: Prepare for the Certified Ethical Hacker (CEH) Exam Number 312-50 with example exam questions and practical exercises.
Enhance Career Opportunities: Obtain the CEH credential to unlock career opportunities in the information security and cybersecurity industry.
This course will equip you with advanced hacking tools and techniques, setting you apart from other IT professionals and adding significant value to your organization.
Outline
Introduction to Ethical Hacking
Foot Printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial of Service
Session Hijacking
Evading IDS, Firewalls and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Cloud Computing
Cryptography
Industry Certification Exam
This coursework helps prepares students to sit for the Certified Ethical Hacker Exam 312-50. Please review the certifying bodies website for further information regarding eligibility requirements and prerequisites. The exam voucher is included in the cost of your enrollment. Taking this course will help prepare students for the exam, but does not guarantee that they will be eligible or pass the exam.
External Partnership
In an effort to broaden our course offerings, Syracuse University has partnered with leaders in their respective fields to provide learning opportunities for our students. This course is brought to you through our partnership with ed2go. Once you have completed the checkout process, you should expect to be contacted by a ed2go representative within 1-3 business days with information on how to access your course material and getting started. They will be your main point of contact while you are going through the coursework. Feel free to reach out to Syracuse University if you have any questions at microcredential@syr.edu or 315.443.2588.
Skills / Knowledge
- Ethical Hacking
- Vulnerability Assessment
- Cryptography Techniques
- Network Security
- Penetration Testing