About the Course
This course focuses on defensive methodology and tools to leverage defensive security practices. These practices require a strong understanding of current risks and exploits. Leveraging the knowledge acquired from the Information System Security Lab (offensive tools), this course builds on the remediation strategies for thwarting off active offensive attacks. Prepares for the EC Council CEH Certification.
What You Will Learn
Analyze a remote intrusion attempt
Construct a comprehensive report for technical and non-technical stakeholders
Understand preventive procedures to safeguard systems
Construct layered virtual defense architecture to test with
Examine a compromised host’s memory
Compile indicators of compromise to guide forensics analysis
Conduct a forensic disk examination
Who This Course Is For
For those who want to prepare for the CEH exam
For those who are aspiring or currently are a current ethical hacker or penetration tester
For those who will be working in a domain within IT or cybersecurity that is focused with the security of systems
For many it is their first milestone on a career in ethical hacking, InfoSec, and cyber security.
Skills You Will Gain
- Session Hijacking
- Scanning Networks
- Cryptography
- Enumeration
- Malware Threats
- Incidence Response
- Sniffing
- Denial of Service
- Hacking Networks andSystems

Job Titles
- Cybersecurity Engineer
- Information Assurance
- Penetration Tester
- Vulnerability Tester
- Security Auditor
- Systems Administrator
- Cyber Defense Analyst
- InfoSec Manager
- Security Analyst
WHAT IS ETHICAL HACKING?
