A person in black hoodie using laptop computer.

Ethical Hacker (CEH)

Are you interested in network security and information technology—but perhaps want more of a challenge than typical IT provides? If so, ethical hacking certification is a unique way to set yourself apart from other IT professionals and add even more value to your organization. As a certified ethical hacker, you’ll use the same techniques as the bad guys to assess security and identify weaknesses, except you’ll use these hacking powers for good.

To put it one way, “To beat a hacker, you need to think like a hacker.” This course will immerse you into the hacker mindset, putting you in the driver’s seat of hands-on activities. You will scan, test, hack, and secure your own systems. You will learn the five phases of ethical hacking (reconnaissance, gaining access, enumeration, maintaining access, and covering your tracks) and the ways to approach your target and succeed at breaking in every time.

This accredited course provides you with advanced hacking tools and techniques so that you can assess the security posture of an organization with the same approach these malicious hackers use. You’ll be able to identify weaknesses and fix the problems before they are identified by the enemy, preventing what could potentially be catastrophic damage to your organization. This is sure to help you get ahead in your current and future positions.

Upon completion of this course, you will be prepared to sit for the Certified Ethical Hacker Exam 312-50, offered by EC-Council. This course also includes a voucher which covers the fee of the exam.

Certifications:

Testout:  Ethical hacker Pro

EC-Council: Certified Ethical Hacker  (CEH)

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Evading IDS, Firewalls and Honeypots
  13. Hacking Web Servers
  14. Hacking Web Applications
  15. SQL Injection
  16. Hacking Wireless Networks
  17. Hacking Mobile Platforms
  18. IoT and OT Hacking
  19. Cloud Computing
  20. Cryptography

Requirements:
Hardware Requirements:

  • This course can be taken on either a PC or Mac. Mac users are encouraged to have access to a Windows environment on their device.
  • A reliable Internet connection of at least 1 Mbps – to view video tutorials.
  • Headphones or speakers connected to your computer – to listen to video tutorials.
  • Any web cam with a minimum of 640×480 video pixel resolution – including both external and built-in web cams.
  • A microphone connected to your computer.

Software Requirements:

  • PC: Windows 10 or later.
  • Mac: macOS 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Email capabilities and access to a personal email account.

To enroll in this program, you should have high school level education and basic knowledge of computer hardware and operating systems—for example, how to power up and log on to a machine, how to use a mouse and keyboard, and basic Microsoft Windows navigation skills.

George Davis

Energetic, results driven Information Technology Expert with extensive experience in corporate and government information technology strategies. Expert knowledge in Client/Server Windows and Unix environments; Cisco Routing and Switching deployment and administration. Excel in Integrating virtualization, cyber security and cloud services to maximize the potential of existing technology options. Solid background in managing complex technology projects with cross functional teams. Dedicated to delivering a superior end user experience by balancing technical expertise with rapport building skills.

Retired US Army NCO where he held manny technology positions. George continued his IT Career as: Technology Instructor, System Administration, Network Technology Specialist, System Engineer, Help Desk Support,

He holds a dual Master of Science Degree in Information Technology and Human Resource Development from Webster University St lious Mo.

Technology Certification:

Microsoft:  MOS, MCP, MCSA, MCSE, MCITP (Security, Exchange, SharePoint)
Cisco:  CCNA, CCDA, CCNP
CompTia:  A+, Network+, Security +, Linux+
Oracle:  PL/SQL
ProSoft: Certified Internet Webmaster
Microsoft OfficePro
Dapartment of Defense Security Clearance
(DOD8570.1 certificates)

Can I register for courses if I am an international student?

Yes, Tekskills courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country’s regulations prior to enrolling in courses that prepare for certification.

Does this course prepare for a certification?

Yes, this course will prepare you for the Intuit Certified Bookkeeping Professional  Certificate exams and you will receive exam vouchers after successful completion of the program and financial obligation.

When can I start this course?

This course is open enrollment, so you can register and start the course whenever you are ready. Access to your course can take 24-48 business hours.

How long does it take to complete this course?

After you register, you will have up to 6 months to complete the course. The time allotted for completion has been calculated based on the number of course hours.

What if I don’t have enough time to complete the course within the time frame provided?

If you are unable to complete the course, contact your  itcoach@tekskillsacademy.com to help you work out a suitable completion date. Please note that an extension fee will be charged. If you are funded through a third-party organization, approval may also be required.

What kind of support will I receive?

The course instructor will be available by email to answer any questions you may have and to provide feedback on your performance. Occasionally, your course may be supported by a team of industry experts. You will also be assigned a Student Advisor for academic support.

What happens when I complete the course?

Upon successfully passing the final exam, you will be awarded a certificate of completion from the school or organization that you registered through.

Am I guaranteed a job?

Tekskills courses will help you gain the skills you need to obtain an entry-level position in most cases. However, you should always research the job market in your area before enrolling.

Can I get financial assistance?

Tekskills courses are non-credit, so they do not qualify for federal aid, FAFSA, and Pell Grant. In some states, vocational rehab or workforce development boards may provide funding to take our courses.

How can I get more information about this course?

If you have questions that are not answered on our website, representatives are available via LIVE chat.  If you are visiting us during non-business hours, please send us a question using the “Contact Us.” Link

 

You can apply to similar entry level open positions after you graduate from this course:

Ethical Hacking Jobs, Employment in Phoenix, AZ | Indeed.com

Upload your resume – Let employers find you