Become a Certified Ethical Hacker

Ethical hackers use the same tools and techniques as malicious hackers but deploy them to prevent intrusion and damage to IT systems. This 100% online course will prepare you for EC-Council’s Certified Ethical Hacker exam (312-50). You will master key concepts in ethical hacking, including scanning testing and hacking computer networks to devise and implement security measures.

Man sitting in front of a screen with code.
Disclaimer
Career Training courses are not eligible for VA or GI Bill® funding. GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the official U.S. government website at http://www.benefits.va.gov/gibill.

Job Outlook for Certified Ethical Hackers

As a cybersecurity position, ethical hacking is considered among the most popular and potentially lucrative jobs of the 21st century. According to PayScale.com, ethical hackers earn over $80,000 per year on average, not including bonuses.

Cybersecurity experts note that the fluid, fast-changing nature of data protection ensures a dynamic and challenging career path for ethical hackers.

The US Bureau of Labor Statistics (BLS) lists cybersecurity among its fastest-growing career areas. The BLS expects 32% growth in information security jobs over the coming decade, over six times the growth rate for all jobs.

Course Objectives

Learn key topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking

Identify and defend against webserver attacks, including wireless and mobile hacking

Be able to evade IDS, firewalls, and honeypots

Recognize and address threats that accompany cloud computing and cryptography

Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50

Prerequisites and Requirements

There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.

This course can be taken on either a PC or Mac.