Ethical Hacking
Become an ethical hacker!
Unlock the secrets of ethical hacking and join the ranks of cybersecurity experts with our Ethical Hacking micro-course.Explore a comprehensive range of topics, from network security and web application vulnerabilities to cloud computing threats and IoT device vulnerabilities.
Dive into real-world case studies, learn to identify security risks, and master the art of ethical hacking techniques. Our hands-on virtual labs will sharpen your practical skills.Whether you're looking to enter the field of ethical hacking, cybersecurity, or penetration testing or seeking to enhance your existing skills, this course provides the foundation you need.
Prepare to ace the EC-Council Certified Ethical Hacker Certification Exam (CEH) and embark on a rewarding career in securing the digital world.Join us on a journey into ethical hacking, where your passion for cybersecurity meets a world of opportunity. Enroll today and become a certified ethical hacker!
Course Highlights
What You Will Learn
Learners who successfully complete this course will be able to:
- Explain penetration testing processes, types, and determine target selection
- Identify common threats actors and differentiate between the many types of malware
- Assess basic security threats and select malware countermeasures
- Scan for and analyze vulnerabilities on different operating systems and appliances, and define the importance of the Vulnerability Management Lifecycle
- Extract web server information, manipulate web applications, and apply countermeasures
- Perform SQL injection attacks and increase security against them
- Secure mobile devices and be able to perform attacks against mobile devices
- Explain the threats that cloud computing faces, be able to perform attacks against cloud servers, and be able to provide additional security for cloud
- Show how to avoid and evade intrusion detection systems, and how to implement intrusion detection in a system
- Clearly demonstrate how to configure firewalls, and how to evade and avoid firewall detection.
- Provide insight into the usefulness of honeypots, and how to deploy and detect them
- Share the importance of maintaining access, and what methods are most commonly used to achieve this
- Explain why covering your tracks is a necessity in hacking, and what are some key ways to accomplish this important step
What You Will Earn
Students will be prepared to write the the EC-Council Certified Ethical Hacker Certification Exam (CEH) upon completion.
Learners who successfully complete this course will receive a digital badge to showcase on their online profiles and build credibility on their resume.
Course Details
Quick Facts
Format: Online Micro-Course
Length: 100 Hours completed at your own pace
Course Price: $860
Who is Eligible?
This online course can be taken by anyone. There are no specific requirements for entry however, this course is ideal for:
- Tech professionals interested in upskilling
- Prospective students interested in pursuing Robertson's Cyber and Cloud Security Program
*If you register before the start date you'll gain early access to the course and can begin your studies.
Available sessions:
Registration Open | Start Date | End Date | Delivery Method | Price | |
December 30, 2024 | January 27, 2025 | July 11, 2025 | Online, Self-Guided | Not open - $860.00 | Join Waiting List |
April 1, 2025 | April 28, 2025 | October 25, 2025 | Online, Self-Guided | Not open - $860.00 | Join Waiting List |