Certified Ethical Hacker

If you're interested in cybersecurity and have a background in IT, Harford's Certified Ethical Hacker course may be for you!

One of the hottest certifications in IT Security, the Certified Ethical Hacker (CEH) program contains the most comprehensive ethical hacking courses available to help information security professionals grasp the fundamentals of ethical hacking. You'll learn how to systematically attempt to inspect network infrastructures with the consent of its owner to find security vulnerabilities that a malicious hacker could potentially exploit.

Program Overview

Credential Earned:

Certified Ethical Hacker designation upon passing theexam

 

No. of Classes Required:

1 five-day course that prepares students to sit for the CEH exam at the end of the session

 

 

Format:

Classroom/computer lab

 

Contact Information:

443.360.9122

LearnIT@harford.edu

Requirements:

Must be at least 18 years of age and have a high school diploma or GED

Courses

The curriculum is certified by EC-Council and prepares students fo exam 312-50 which tests Certified Ethical Hacker candidates on the following 18 domains:

• Introduction to Ethical Hacking

• Footprinting and Reconnaissance

• Scanning Networks

• Enumeration

• System Hacking

• Malware Threats

• Sniffing

• Social Engineering

• Denial of Service

• Session Hijacking

• Hacking Webservers

• Hacking Web Applications

• SQL Injection

• Hacking Wireless Networks

• Hacking Mobile Platforms

• Evading IDS, Firewalls, and Honeypots

• Cloud Computing

• Cryptography

Ethical hacking is the process of penetrating computers, networks, and applications, for which you have official authorization, to access to determine if vulnerabilities exist. Once vulnerabilities are discovered, learn what should be done to undertake preventative, corrective, and protective countermeasures before an actual compromise to the system takes place. 

 

What Can I Do When I Complete This Program?

Certified Ethical Hackers use the same knowledge and tools as a malicious hacker, but in a lawful, legitimate manner to assess the security posture of a target system.

 

After completing this program, students will be prepared to sit for the CEH Exam. Students may enter the workforce directly in positions such as forensics analyst, cyber operator, or systems security analyst, or may tpursue an associate degree in Information Assurance and Cybersecurity or an Information Assurance and Cybersecurity certificate program.

 

CEH certification holders qualify for over 80,000 cybersecurity jobs (source: LinkedIn) and the average annual salary for a CEH in the U.S. is $110,000. This field is growing at a much faster than average rate, at about 21%, with nearly 2.3 million security professionals providing internet security across the globe.

*According to the analyst firm, Frost and Sullivan

 

Who Teaches This Program?

Dave Reese is a leading expert in IT classroom training. He has 20 years of experience providing technical and seminar training in topics such as IT fundamentals (A+, Network+, Security+, Server+); Microsoft Server Administration (Windows Server NT 4.0 - 2012); Network Infrastructure (Cisco Routing and Switching); Network Security (CASP, CEH, Packet Capture and Analysis); Client Operating Systems (DOS, Windows, Linus, Mac, Android); as well as a wide variety of user applications (Microsoft Office Suite, Google Apps/GSuite).