This course is designed for individuals who have basic computer user skills and who are interested in obtaining an entry-level job in Cybersecurity. The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Curriculum
- 4 Sections
- 38 Lessons
- 10 Weeks
- Learning ObjectivesCybersecurity Bootcamp Program Objectives33
- 2.1Identify basic network theory concepts and major network communications methods
- 2.2Describe bounded network media
- 2.3Identify unbounded network media
- 2.4Identify the major types of network implementations
- 2.5Identify TCP/IP addressing and data delivery methods
- 2.6Implement routing technologies
- 2.7Identify the major services deployed on TCP/IP networks
- 2.8Identify the infrastructure of a WAN implementation
- 2.9Identify the components used in cloud computing and virtualization
- 2.10Describe basic concepts related to network security
- 2.11Prevent security breaches
- 2.12Respond to security incidents
- 2.13Identify the components of a remote network implementation
- 2.14Identify the tools, methods, and techniques used in managing a network
- 2.15Describe troubleshooting of issues on a network
- 2.16Identify the hardware components of personal computers and mobile digital devices
- 2.17Identify the basic components and functions of operating systems
- 2.18Identify networking and security fundamentals
- 2.19Identify the operational procedures that should be followed by professional PC technicians
- 2.20Install, configure, and troubleshoot display devices. Install and configure peripheral components
- 2.21Manage system components
- 2.22Manage data storage
- 2.23Install and configure Microsoft Windows
- 2.24Optimize and maintain Microsoft Windows
- 2.25Work with other operating systems
- 2.26Identify the hardware and software requirements for client environment configurations
- 2.27Identify network technologies
- 2.28Install and configure networking capabilities
- 2.29Support mobile digital devices
- 2.30Support printers and multifunction devices
- 2.31Identify security threats, vulnerabilities, and controls
- 2.32Implement security controls
- 2.33Troubleshoot system-wide issues
- Course PrerequisitesStudents taking this course should have the following skills: end-user skills with Windows-based personal computers, including the ability to: browse and search for information on the Internet; start up, shut down, and log on to a computer and network; run programs; and move, copy, delete, and rename files in Windows Explorer. Students should also have basic knowledge of computing concepts, including the difference between hardware and software; the functions of software components, such as the operating system, applications, and file systems; and the function of a computer network.0
- Training Purpose2
- Delivery Method3

