dividing image bar

Basic Information

Tri-County Technical College
CCE - Certified Ethical Hacker (Voucher Included) - ONLINE
Are you interested in network security and information technology—but perhaps want more of a challenge than typical IT provides? If so, ethical hacking certification is a unique way to set yourself apart from other IT professionals and add even more value to your organization. As a certified ethical hacker, you'll use the same techniques as the bad guys to assess security and identify weaknesses, except you'll use these hacking powers for good. To put it one way, "To beat a hacker, you need to think like a hacker." This course will immerse you into the hacker mindset, putting you in the driver's seat of hands-on activities. You will scan, test, hack, and secure your own systems. You will learn the five phases of ethical hacking (reconnaissance, gaining access, enumeration, maintaining access, and covering your tracks) and the ways to approach your target and succeed at breaking in every time. This accredited course provides you with advanced hacking tools and techniques so that you can assess the security posture of an organization with the same approach these malicious hackers use. You'll be able to identify weaknesses and fix the problems before they are identified by the enemy, preventing what could potentially be catastrophic damage to your organization. This is sure to help you get ahead in your current and future positions. Upon completion of this course, you will gain exam eligibility and be prepared to sit for the Certified Ethical Hacker Exam 312-50, offered by EC-Council. This course also includes a voucher which covers the fee of the exam. What you will learn: • All about key security topics in information security, including footprinting, network scanning, malware threats, sniffing, social engineering, denial of service, and session hijacking • Different types of web server attacks, including wireless and mobile hacking • How to evade IDS, firewalls, and honeypots • The various threats that go along with cloud computing and cryptography How you will benefit: • Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions • Gain the skills you need for careers as a Certified Ethical Hacker (CEH), such as security officers, auditors, engineers, and anyone concerned about a network infrastructure's integrity. Topics: • Introduction to Ethical Hacking • Footprinting and Reconnaissance • Scanning Networks • Enumeration • Vulnerability Analysis • System Hacking • Malware Threats • Sniffing • Social Engineering • Denial of Service • Session Hijacking • Evading IDS, Firewalls and Honeypots • Hacking Web Servers • Hacking Web Applications • SQL Injection • Hacking Wireless Networks • Hacking Mobile Platforms • IoT and OT Hacking • Cloud Computing • Cryptography Instructional Material Requirements: The instructional materials required for this course are included in enrollment and will be available online. Occupational Outlook: The U.S. Bureau of Labor Statistics (BLS) indicates that information security analysts, which includes ethical hackers, can expect to see jobs increase by 31% from 2019 to 2029. This is significantly above the national average job growth rate for the same time period, which is 4%.
High School Diploma or Equivalent


All Student Program Completed Rate All Student Credential Attainment Rate All Student Employment Rate During 2nd Quarter After Exit All Student Employment Rate During 4th Quarter After Exit All Student Median Earnings in Employment During the 2nd Quarter After Exit WIOA Participant Program Completion Rate WIOA Participant Credential Attainment Rate WIOA Participant Employment Rate During 2nd Quarter After Exit WIOA Participant Employment Rate During 4th Quarter After Exit WIOA Participant Median Earnings in Employment During the 2nd Quarter After Exit

NOTE:  "N/A" indicates that there is insufficient data and/or a program served fewer than ten WIOA students to calculate the performance measures at this time.