California State University - San Marcos
Home > Training Programs > Information Technology > Certified Ethical Hacker (Voucher Included)


Fill out the form below

By continuing you are agreeing to have ed2go contact you.
Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Certified Ethical Hacker (Voucher Included)

Certified Ethical Hacker (Voucher Included)
$2,995.00 (USD)



I.        Introduction to Ethical Hacking
                    A.    Key issues plaguing the information security world
                    B.    Incident Management Process
                    C.    Penetration Testing
II.        Footprinting and Reconnaissance
                    A.    Various types of footprinting
                    B.    Footprinting tools
                    C.    Countermeasures
III.        Scanning Networks
                    A.    Network scanning techniques
                    B.    Scanning countermeasures
IV.        Enumeration
                    A.    Enumeration techniques
                    B.    Enumeration countermeasures
V.        System Hacking
                    A.    System hacking methodology
                    B.    Steganography
                    C.    Steganalysis
                    D.    Attacks and covering tracks
VI.        Malware Threats
                    A.    Different types of Trojans
                    B.    Trojan Analysis
                    C.    Trojan Countermeasures
                    D.    Working of Viruses
                    E.    Virus Analysis
                    F.    Computer Worms
                    G.    Malware Analysis Procedure
VII.        Evading IDS, Firewalls and Honeypots
                    A.    Firewall
                    B.    IDS and Honeypot Evasion Techniques
                    C.    Evasion Tools
                    D.    Countermeasures
VIII.        Sniffing
                    A.    Packet sniffing techniques
                    B.    How to defend against sniffing
IX.        Social Engineering
                    A.    Social Engineering techniques
                    B.    Identify theft
                    C.    Social Engineering
                    D.    Countermeasures
X.        Denial of Service
                    A.    DoS/DDoS attack techniques
                    B.    Botnets
                    C.    DDoS attack tools
                    D.    DoS/DDoS Countermeasures
XI.        Session Hijacking
                    A.    Session hijacking techniques
                    B.    Countermeasures
XII.        Hacking Web Servers
                    A.    Different types of webserver attacks
                    B.    Attack methodology
                    C.    Countermeasures
XIII.        Hacking Web Applications
                    A.    Different types of web application attacks
                    B.    Web Application
                    C.    Hacking Methodology
                    D.    Countermeasures
XIV.        SQL Injection
                    A.    SQL injection attacks
                    B.    Injection detection tools
XV.        Hacking Wireless Networks
                    A.    Wireless Encryption
                    B.    Wireless hacking methodology
                    C.    Wireless Hacking Tools
                    D.    Wi-Fi-  Security Tools
XVI.        Hacking Mobile Platforms
                    A.    Mobile Platform Attack Vector
                    B.    Android Vulnerabilities
                    C.    Jailbreaking
                    D.    iOS, windows phone 8 vulnerabilities
                    E.    Mobile Security Guidelines and Tools
XVII.        Cloud Computing
                    A.    Various Cloud Computing Concepts
                    B.    Threats, Attacks, and Security
                    C.    Techniques and Tools
XVIII.        Cryptography
                    A.    Different types of Cryptography Ciphers
                    B.    Public Key Infrastructure (PKI)
                    C.    Cryptography Attacks
                    D.    Cryptanalysis Tools





California State University - San Marcos

Extended Learning Department
333 S. Twin Oaks Valley Road
San Marcos, CA 92096 US

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.