Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Other Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications AutoCAD Microsoft QuickBooks Windows Other Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Other Test Prep Test Prep Exam Prep Writing Writing Writing and Editing How It Works How It Works About ed2go Externship Programs Financial Assistance Find a School Military Virtual Career Center
Courses
Arts and Design
Animation
Graphic Arts
Photography
Web Design
Other
Business
Accounting
Administrative
Communication
Finance
Marketing and Sales
Operations
Project Management
Small Business
Soft Skills
Career Online High School
Online High School Diploma
Computer Applications
AutoCAD
Microsoft
QuickBooks
Windows
Other
Computer Programming
Programming Classes
Construction and Trades
Construction
Environmental and Energy
Trades
Health and Fitness
Alternative Medicine
Dental
Fitness
Medical
Veterinary
Wellness
Hospitality
Hospitality Service
Information Technology
Cloud Computing
Networking
Other
Security
Language
Languages
Legal
Legal Studies
Math and Science
Mathematics and Science
Teacher Professional Development
Child Development
Classroom Technology
Math and Science
Reading and Writing
Other
Test Prep
Exam Prep
Writing
Writing and Editing
How It Works
About ed2go Externship Programs Financial Assistance Find a School Military Virtual Career Center
ed2go Information Technology Security Certified Ethical Hacker
Return to Security
certified ethical hacker

Certified Ethical Hacker

This ethical hacking program puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will learn an entirely different way of achieving optimal information security posture in your organization; by hacking it! You will scan, test, hack and secure your own systems. Learn the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time. The hacking tools and techniques in each of these five phases are provided in detail to help you identify when an attack has been used against your own targets. So, why is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses, and fix the problems before they are identified by the enemy.

Throughout the CEH course, immerse yourself in a hacker's mindset, evaluating not just logical, but physical security. Exploring every possible point of entry to find the weakest link in an organization. From the end user, the secretary, the CEO, misconfigurations, vulnerable times during migrations even information left in the dumpster. Upon completion of this program, you will be prepared to sit for the Certified Ethical Hacker (CEH) Exam 312-50, offered by EC-Council. The registration fee for this exam is included with this program.

6 Months / 100 Course Hrs
Open Enrollment

Offered in Partnership with your Preferred School

George Mason University Why this school? It's been chosen based on your location or if you've visited this school's website.

Financial Assistance Available*

Change School

Learning Method

Instructor-led Self-Paced: Study at your own schedule

Contact Us

Certified Ethical Hacker

Learning Method

Instructor-led Self-Paced: Study at your own schedule

Contact Us

Certified Ethical Hacker (Voucher Included) Details + Objective

Course Code: GES338

You Will Learn
  • Learn key issues plaguing the information security world, incident management process, and penetration testing
  • Understand various types of footprinting, footprinting tools, and countermeasures
  • Explore network scanning techniques and scanning countermeasures
  • Study system hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Cover different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Master an understanding of the working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Explore social engineering techniques, identify theft, and social engineering countermeasures
How the course is taught
  • Self-paced, online course
  • 6 months to complete
  • Open enrollment, begin anytime
  • 100 course hours
How you will benefit
  • Understand the mind of a hacker to better protect your organization from accounts
  • Learn about various viruses and how to identify weaknesses in your security system
  • Be prepared to sit for the Certified Ethical Hacker (CEH) Exam 312-50, offered by EC-Council
  • Develop your skills to work as a certified ethical hacker, security analyst, network security analyst
Certified Ethical Hacker (Voucher Included) Outline
Expand All
Introduction to Ethical Hacking

Study key issues plaguing the information security world, the incident management process, and penetration testing. Learn about various types of foot-printing, and network scanning techniques.

Enumeration

Explore enumeration techniques, system hacking methodology, and malware threats. You’ll learn about different types of Trojans and Trojan analysis.

Evading IDS, Firewalls, and Honeypots

Learn about firewall, IDS, and honeypot evasion techniques, study evasion tools, packet sniffing techniques, and social engineering techniques.

Denial of Service

Learn DoS/DDoS attack techniques, Botnets, DDoS attack tools, session hijacking techniques, and different types of webserver attacks.

Hacking Web Applications

Study different types of web application attacks, web application, SQL injection attacks, and wireless encryption strategies.

Hacking Mobile Platforms

Complete the course by learning about mobile platform attack vectors, various cloud computing concepts, and different types of cryptography ciphers.

Program Details

I.        Introduction to Ethical Hacking
                    A.    Key issues plaguing the information security world
                    B.    Incident Management Process
                    C.    Penetration Testing
II.        Footprinting and Reconnaissance
                    A.    Various types of footprinting
                    B.    Footprinting tools
                    C.    Countermeasures
III.        Scanning Networks
                    A.    Network scanning techniques
                    B.    Scanning countermeasures
IV.        Enumeration
                    A.    Enumeration techniques
                    B.    Enumeration countermeasures
V.        System Hacking
                    A.    System hacking methodology
                    B.    Steganography
                    C.    Steganalysis
                    D.    Attacks and covering tracks
VI.        Malware Threats
                    A.    Different types of Trojans
                    B.    Trojan Analysis
                    C.    Trojan Countermeasures
                    D.    Working of Viruses
                    E.    Virus Analysis
                    F.    Computer Worms
                    G.    Malware Analysis Procedure
VII.        Evading IDS, Firewalls and Honeypots
                    A.    Firewall
                    B.    IDS and Honeypot Evasion Techniques
                    C.    Evasion Tools
                    D.    Countermeasures
VIII.        Sniffing
                    A.    Packet sniffing techniques
                    B.    How to defend against sniffing
IX.        Social Engineering
                    A.    Social Engineering techniques
                    B.    Identify theft
                    C.    Social Engineering
                    D.    Countermeasures
X.        Denial of Service
                    A.    DoS/DDoS attack techniques
                    B.    Botnets
                    C.    DDoS attack tools
                    D.    DoS/DDoS Countermeasures
XI.        Session Hijacking
                    A.    Session hijacking techniques
                    B.    Countermeasures
XII.        Hacking Web Servers
                    A.    Different types of webserver attacks
                    B.    Attack methodology
                    C.    Countermeasures
XIII.        Hacking Web Applications
                    A.    Different types of web application attacks
                    B.    Web Application
                    C.    Hacking Methodology
                    D.    Countermeasures
XIV.        SQL Injection
                    A.    SQL injection attacks
                    B.    Injection detection tools
XV.        Hacking Wireless Networks
                    A.    Wireless Encryption
                    B.    Wireless hacking methodology
                    C.    Wireless Hacking Tools
                    D.    Wi-Fi-  Security Tools
XVI.        Hacking Mobile Platforms
                    A.    Mobile Platform Attack Vector
                    B.    Android Vulnerabilities
                    C.    Jailbreaking
                    D.    iOS, windows phone 8 vulnerabilities
                    E.    Mobile Security Guidelines and Tools
XVII.        Cloud Computing
                    A.    Various Cloud Computing Concepts
                    B.    Threats, Attacks, and Security
                    C.    Techniques and Tools
XVIII.        Cryptography
                    A.    Different types of Cryptography Ciphers
                    B.    Public Key Infrastructure (PKI)
                    C.    Cryptography Attacks
                    D.    Cryptanalysis Tools

View All Sections
Certified Ethical Hacker (Voucher Included) Instructors
Eric Reed

Eric Reed has over 12 years of experience in the IT consulting and training field, specializing in security since 2005. He has consulted and delivered certification and customized training to all branches of the U.S. Military, and for many Fortune 100 and Fortune 500 companies, including: FBI, DCMA, SAIC, EPA, General Dynamics, Northrop Grumman, Best Buy, Target, Mayo Clinic, Medtronic, Blue Cross, Wells Fargo, US Bank, NASA, Boeing, Lockheed Martin, General Mills, Proctor and Gamble, AT&T,and Verizon, to name a few. He has delivered CEH, CHFI, and ECSA/LPT for the last seven years, and has enjoyed a better than 95% pass across the board. He is a regular instructor for EC-Council's iClass online training, and was also selected as the instructor for the official EC-Council iLearn self-study product for CEH v7. Eric was awarded EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.

Certified Ethical Hacker (Voucher Included) Requirements / Prerequisites

There are no mandatory prerequisites prior to taking Certified Ethical Hacker (CEH). However, students must have a very strong knowledge of network infrastructure, computer hardware, software and security.

This program can be taken on a Mac or a PC. On a PC, it is compatible with Windows 8 and later operating systems and the current versions of Firefox, Chrome, or IE 11 and later browsers.

On a Mac, the program is compatible with Mac OS X 10.10 and later operating systems and the current versions of Firefox, Chrome, or Safari 8 or later browsers.

Adobe Flash Player is required for this program.

All materials are online.

Certified Ethical Hacker (Voucher Included) Frequently Asked Questions
Expand All
Can I register for programs if I am an international student?

Yes, because ed2go programs are online you never have to actually travel to the school. Most schools offer telephone or online registration.

How long does it take to complete a program?

All of our programs are self-paced and open enrollment, so you can start them when you want and finish them at your own pace. When you register, you’ll receive six (6) months to complete the program.

What if I don't have enough time to complete my program within the time frame provided?

The time allotted to complete your program has been calculated based on the number of hours for each program, so don't worry too much about not completing in time. If, after a concerted effort, you are still unable to complete, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.

Do I have to buy additional materials?

No. 

Can I get financial assistance?

ed2go courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements.

What happens when I complete the program?

Upon successful completion of the program, you will be awarded a certificate of completion. In addition, you will receive an exam voucher for the Certified Ethical Hacker (CEH) Exam 312-50, offered by EC-Council after successful completion of the program and financial obligation.

Am I guaranteed a job?

ed2go programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.

Who will be my instructor?

Each student is paired with a facilitator for one-on-one interaction. The facilitator will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our facilitators are successful working professionals in the fields in which they teach.

What software or hardware do I need in order to take online programs and what are the system requirements?

In order to take our online programs, you must have access to a computer and the Internet. You can access the program contents from any Web-enabled computer. You don’t have to use the same computer to log-in to the program every time. We recommend that you have a word-processing program (Microsoft Word is the best) and the latest version of Internet Explorer.

Can I use a Mac?

Yes.

How can I get more information about this program?

If you have questions that are not answered on our website, please feel free to contact us via LIVE chat (click the button above). If you are visiting us during non-business hours, please feel free to send us a question using the “Contact Us” form to the right. You may also call us at 1-877-221-5151. We will answer your questions promptly.

When can I start the program?

Our programs are all open enrollment. You can register and start the program as soon as you are ready.


Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.

What makes the Ethical Hacking and Countermeasures course different from other courses in the market?

The Ethical Hacking and Countermeasures course prepares candidates for the CEH exam offered by EC-Council. The course focuses on hacking techniques and technology from an offensive perspective. The advanced security course is regularly updated to reflect latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.

What is "Hacking techniques and technology"?

Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. These techniques extend beyond the technology domain and can be applied to test security policies and procedures. Hacking technology is used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. As technology advances, the skill required to execute a hack is much lesser as pre-compiled programs are available to effect havoc with simple point and click.

Aren't tools meant for script kiddies?

Does it matter if an elite hacker writes a buffer overflow or a script kiddy runs a tool if the target system gets compromised anyway? The point of emphasis here is that the enemy may be intellectually great or small, but he requires just one port of entry to wreck damage while the organization has the entire perimeter to guard with limited time and resources.

Do reformed hackers teach your course?

EC-Council adheres to a code of ethics and encourages security professionals with significant years of teaching exposure in the industry and security related experience to handle its security related courses.

Isn't this knowledge harmful? Why do you make it available so easily to the public?

EC-Council fulfills its social responsibility by ensuring that only persons with a minimum of two years of security related experience are eligible for the course. In addition, all candidates are required to sign an agreement where they agree to respect the knowledge acquired and not misuse it in any way. The candidate also agrees to abide by all legal laws of the land in the use of thus acquired knowledge. Besides the CEH exam is a tough one to pass as students must have in-depth knowledge to achieve the globally recognized ethical hacking certification.

What can I take back to my organization if I certify as a CEH?

EC-Council believes in giving back to the security community as it has partaken of it. When you are a Certified Ethical Hacker, you are more than a security auditor or a vulnerability tester or a penetration tester alone. You are exposed to security checklists that will help you audit the organization's information assets, tools which will check for vulnerabilities that can be exploited and above all a methodology to assess the security posture of your organization by doing a penetration test against it. In short, the knowledge you will acquire has practical value to make your work place a more secure and efficient one.

It is all too technical. Do you reflect real-world business issues?

The value of CEH lies in its practical value. Over 20 domains, students are exposed to the business risks involved and the potential damage that can result due to negligence. Candidates are able to make an evaluated opinion regarding the acceptable risk an organization can face should it choose to address a security concern.

What is the employment value of CEH?

The ANSI accredited Ethical Hacking program is primarily targeted at security professionals who want to acquire a well-rounded body of knowledge to have better opportunities in this field. Acquiring a CEH means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.

Where does CEH stand when compared to other educational offerings in the field of information Security?

Consider this. A security defense course educates regarding proper configuration, firewalls, or rather preemptive security. CEH takes the alternative approach - defense in depth by attacking the systems. This is in sharp contrast to courses that teach defensive tactics alone. CEH imparts offensive tactics supplemented with defensive countermeasures. This ensures that the CEH professional can have a holistic security perspective of the organization.

I would like to provide professional service as a CEH professional. What can I expect to be paid per assignment?

The remuneration per assignment will vary with specifics of the client environment. However, on an average you can expect to be paid around $15,000 to $ 45,000 per assignment.

I am a CEH. What is my level?

Congratulations on becoming a CEH. You have joined elite group of professionals around the world. Your next level is to become a Licensed Penetration Tester (LPT).

Does this program prepare for a certification?

Yes, you will be prepared for the Certified Ethical Hacker (CEH) Exam # 312-50, offered by EC-Council, and you will receive an exam voucher after successful completion of the program and financial obligation.

Browse All
Talk to an admissions counselor
Got other questions? Get in touch with our admissions counselors via . During non-business hours, please feel free to send us a question using the "Contact Us" button. You can also reach us by phone at (855) 520-6806.