Overview
To be successful in beating a hacker, you need to think like one. This ethical hacking certification course immerses you in the hacker mindset and puts you in control with hands-on activities. As a certified ethical hacker (CEH), you use the same techniques as malicious hackers to assess security and identify weaknesses, but for ethical purposes. You will scan, test, hack, and secure your own systems to help prevent potentially catastrophic damage to your organization.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
By completing this CEH training, you will learn the industry standards of ethical hacking developed by the EC-Council. This process involves five phases, namely Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks. With these skills, you will be able to assess the security posture of an organization and identify and fix weaknesses before malicious hackers can exploit them.This unique credential sets you apart from other IT professionals and adds even more value to your organization. According to the EC-Council, one in every two professionals receive promotions after gaining their ethical hacking certification.
Gain advanced hacking tools and techniques while preparing to sit for the Certified Ethical Hacker Exam 312-50 with this accredited CEH course offered by the EC-Council. The exam voucher is included in the cost of your enrollment.
- Voucher Included: Yes
- Course ID: GES338
- Total Hours: 100
- Format: Asynchronous/Self-Paced
- Location: Online
- Schedule: 6 Months (Self-Paced)
- Credit(s) Earned: 10 CEU
- Instructor: Ed2go
- Cost: $3,625.00
- Category: Information Technology (I.T.)

If attending with a WIOA workforce grant, your course access is dependent on 20 hours of completed coursework each week and the length of the course. Instructions will be provided at time of acceptance.
Requirements
Prerequisites:
The Certified Ethical Hacker course is specifically designed for individuals with prior strong knowledge of network infrastructure, computer hardware, software, and security to prepare for the (CEH) Exam # 312-50, offered by EC-Council.
Hardware Requirements:
- This course can be taken on either a PC or Mac.
Software Requirements:
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment and will be available online. The materials are non-refundable upon registration.
- Certified Ethical Hacker, Ethical Hacking and Countermeasures (eBook)

What you will learn
- Assess ethical and legal requirements for security assessment and penetration testing and develop a compliance strategy
- Analyze the different phases of hacking and determine the most effective ethical hacking strategy for assessing the security of information system components
- Identify vulnerabilities, threats, and attacks to information systems, and recommend countermeasures.
- Evaluate cryptography algorithms and encryption techniques and develop implementation strategies for securing information
- Evaluate network security techniques and tools, and implement appropriate information security controls based on evidence, information, and research
Program Outcomes
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
- Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
- Obtain a credential highly acknowledged and recognized by employers in the public and private sector
- Complete the most advanced, hands on ethical hacking program in the industry
