Alert
Beginning April 4, facial coverings are optional on campus.

Read more about JCCC’s COVID-19 response ... More Details


Close Alert

IN PERSON

EC-Council Certified Ethical Hacker (CEH) Exam Prep

Instructor

Travis Wentworth

What You Will Learn

Complete a review of topics and exam preparation for the Certified Ethical Hacker (CEH) exam. Certification is a vendor neutral certification in the network security discipline of Ethical Hacking. Standards and language involved in attempting to penetrate a network or computer system are discussed. The Ethical Hacker is a technical professional using the same knowledge and tools as a hacker to look for the weaknesses in target systems and to help prevent unauthorized penetration. Certification applies to security officers, auditors, security professionals, site administrators, and anyone concerned about network infrastructure integrity. Prepare for the CEH exam by studying security risks using lectures and in-class exercises. Review the application, exam process and topics for the CEH.

Prerequisite: Industry experience suggested.

For questions about voucher purchase and certification exams, contact Regnier Testing Center on JCCC main campus.

IN PERSON

$2,995.00

EC-Council Certified Ethical Hacker (CEH) Exam Prep

Days:MTuWThF

Dates: Feb 14-18

Times: 8:00AM-4:00PM

Location: Main Campus Campus Map

Other Details

Course Code: NETSEC-009-13

Category: Security

Contact Hours: 35.0

Format: Classroom

After registering for this course, you can come back to the catalog to register for more courses.

Need help registering? Please contact us at CERegistration@jccc.edu or call 913-469-2323.

Close Modal Window

CEHv9 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffing
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Hacking Mobile Platforms
17. Evading IDS, Firewalls and Honeypots
18. Buffer Overflows
19. Cryptography
20. Penetration Testing