Training Course

Ethical Hacker

Browse All Courses > Databases

Have a question while you're learning?

Get in-depth explanations, tips, further insights, and more from Certified Experts. Our experts are vetted industry professionals eager to help you learn from their experiences.

Course Syllabus(12 Lessons)

Certified Ethical Hacker Module 01 - Overview
2 lessons35m 28s
Certified Ethical Hacker Module 02 - Reconnaissance
Certified Ethical Hacker Module 03 - Protocols
Certified Ethical Hacker Module 04 - Windows Hacking
Certified Ethical Hacker Module 05 - Attacking Web Technologies
Certified Ethical Hacker Module 06 - Pen Testing Wireless Networks

Course Description

This training path covers everything you need to know about becoming an ethical hacker to pass the Certified Ethical Hacker exam. We will introduce the course by discussing liability, effective security programs, control types, methodology, and more.

Participants will learn about reconnaissance, by beginning with an overview of the Hacking “Life-Cycle“), and continuing onto footprinting, social access, domain names, and DNS databases.

We will then cover protocols by highlighting the OSI Model, TCP/IP, ICMP, UDP, ARP, DNS, SSH, SNMP, and SMTP.

The Windows hacking section will get into different types of attacks, LM Hash Encryption, hacking tools and techniques, firewalls, and attack types.

Attacking web technologies will cover common web application threats, components, URLs, cookies, SQL Injection, and much more.

Lastly, we will focus on pen testing wireless networks by discussing standards comparisons, wired equivalent privacy, TKIP, LEAP, various tools, malware, trojan horse, back doors, and more.

Career Paths include professional roles such as: Ethical Hackers, Security Consultants, IT Management, and Chief Security Officers.

Course Details

6h 15m 11s


Randy Kohler
I have more than 20 years of both consulting and instructional experience. I have an extensive background in the government sector as well as the financial industry. I’m an expert in Microsoft applications, network security, penetration testing, and ethical hacking. I’ve contributed toward the development of the Certified Penetration Testing Engineer labs.
Randy Kohler Instructor and Curriculum Developer

Share Course

Ready to get started?