Ethical Hacking & Counter Measures

SKILL LEVEL:
Intermediate, Advanced
PREREQUISITES:
Cybersecurity Domain Knowledge, some Command Line Interface (CLI) experience
OVERVIEW:

Ethical hacking is the process of testing and validating anInformation Technology (IT) system to determine its weaknesses and assess itsvulnerabilities.

Businesses and government organizations hire cybersecurity professionals tobreak past their online security systems so that they can recommend measuresthat help prevent data theft and fraud, such as improving cryptography standards.Also known as penetration testers or information security analysts, ethicalhackers identify potential threats and help mitigate the risk of a real cyber attack.

The purpose of this course is to help individuals master the core concepts ofethical hacking, e.g., vulnerability analysis, social engineering, and exploitationmethods. This course will significantly benefit security officers, auditors, securityprofessionals, site administrators, and those interested in becoming aprofessional penetration tester.

TOPICS COVERED
JOBS THAT TYPICALLY USE OR REQUIRE THE CISSP:
  • Introduction to Ethical Hacking
  • Footprinting and
  • Reconnaissance
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Denial-of-Service
  • Introduction to Ethical Hacking
  • Footprinting and
  • Reconnaissance
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and
  • Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography
SCHEDULE:
Short courses are held remotely on weekends, Sat-Sun from 9 AM - 2 PM CT.
Ethical Hacking & Counter Measures
Student experience
Course details
Instructors
Career support
Admission process
Step 1
Apply
Let's talk through it: your background, chosen path, weekday or weekend schedule, funding options, and more. Schedule an appointment with our Admissions Team.
Apply now
Step 2
Tech prep courses
Curious folks, we will not make you wait to get started on your learning journey. You'll be enrolled from the get-go in either Data or Cyber Tech Prep. Each provides valuable resources to help our future data scientists or ethical hackers prep for the first day of class.
Step 3
Decision
Congrats! Your funding has been verified and you are accepted into the program. Be on the lookout for a personalized Acceptance Letter via e-mail. You can always call us at 833-DIVERGE
Step 4
Orientation
Experiencing first day jitters? Here's how we can help.
A week before your program starts, our Community Manager will get you onboarded to the learning platform, walk you through TWC enrollment paperwork, and connect you with future classmates.