CCT-ITS7530 - Certified Ethical Hacker (CEH) Prep
Course Description
Become a leader in digital defense with our Certified Ethical Hacker program. You will acquire the mindset and skillset of a cybersecurity professional, learning how to anticipate, detect, and counter threats before they become disasters. By mastering vulnerability analysis, network penetration testing, and systems defense, you will elevate your value in technology, finance, healthcare, government, and beyond. This program empowers you to build secure systems, insulate organizations from cyber‑attacks, and advance your career with confidence.
Course Outline
- Foundations of Ethical Hacking:
- Overview of cybersecurity landscape, legal and ethical considerations, hacker mindset.
- Reconnaissance & Information Gathering:
- Passive and active information collection techniques, tools, and data mining.
- Scanning & Enumeration:
- Network mapping, port scanning, service discovery, vulnerability identification techniques.
- System and Application Vulnerabilities:
- Exploiting misconfigurations, web application weaknesses (SQLi, XSS), system flaws.
- Network Penetration Techniques:
- Packet sniffing, man‑in‑the‑middle attacks, wireless network exploitation.
- Social Engineering & Physical Security:
- Human factor vulnerabilities—phishing, pretexting, tailgating—and mitigation.
- Maintaining Access & Covering Tracks:
- Backdoors, rootkits, log manipulation, and persistence strategies.
- Security Controls & Countermeasures:
- Designing defenses, patch management, IDS/IPS, firewall strategies, secure network design.
- Ethics, Reporting, and Professional Practice:
- Reporting vulnerability findings, recommendations, compliance frameworks, professional conduct.
- Prep for Industry Certification:
- Exam strategies, lab simulations, final review.
Learner Outcomes
By course completion, learners will be able to:
1. Identify and categorize common system and network vulnerabilities.
2. Conduct structured reconnaissance and enumeration using ethical tools and techniques.
3. Execute controlled penetration tests on network environments and applications.
4. Design and recommend appropriate security countermeasures.
5. Prepare detailed, professional-level ethical hacking reports that articulate findings and remediation steps.
6. Demonstrate knowledge of legal, ethical, and compliance frameworks relevant to cybersecurity.
7. Apply effective social engineering testing scenarios to evaluate human-factor security.
8. Successfully prepare for—and pass—the industry-recognized CEH certification exam.
Notes
Target Audience:
This class is recommended for:
- IT professionals (network administrators, systems administrators, security analysts) seeking to upskill.
- Career changers or early-stage professionals with foundational IT knowledge.
- Individuals preparing for roles such as penetration tester, security analyst, IT audit specialist, or incident response team member.
Occupational Outlook:
According to the U.S. BLS, Information Security Analysts (a close match) are projected to see much faster than average job growth—about 33% from 2022 to 2032—with a median annual wage surpassing $110,000. This reflects the rising demand for cybersecurity talent across industries such as finance, healthcare, and defense. The CEH credential signals strong alignment with these job prospects.
Industry Certification:
The Certified Ethical Hacker (CEH) is a globally recognized cybersecurity certification issued by EC-Council, and highly respected by employers across government, finance, healthcare, and tech sectors. It serves as a foundational credential for roles in ethical hacking, penetration testing, and cybersecurity analysis.
Note: The CEH exam is not included in this course and must be purchased separately from EC-Council.
Information Technology Continuing Education Certificate:
A Certificate of Completion will be awarded to participants who successfully meet the following criteria:
- Meaningful measurable progress towards the class goal. Online work could substitute limited absences, at the instructor’s discretion.
- Actively participate in class discussions, group work, and problem-solving activities.
- Complete all required hands-on labs, practice exercises, and course projects to an acceptable standard.
Method of Instruction:
This course follows a blended learning model, combining instructor-led lectures, demonstrations, interactive discussions, hands-on exercises, and collaborative problem-solving. This class uses standardized materials and platforms that are widely recognized and designed specifically to prepare learners for the CEH certification.
To maximize success, you are strongly encouraged to dedicate a minimum of 6 hours per week to self-guided study and practice, in addition to scheduled class time.
Evaluation:
Your progress and performance will be evaluated through a combination of:
- Active participation in class discussions, group activities, and problem-solving exercises.
- Completion of hands-on skill practices during class sessions and as independent work.
- Periodic assessments or quizzes to reinforce learning objectives and measure competency.
Prerequisites
Knowledge:
Individuals without 1-3 years of IT Support or networking experience are advised to consider first completing a course like NET-ITS7512 - CompTIA Network+ or CTS-ITS7511 - IT Support Technician before taking the Cybersecurity training courses.
Resources:
Participants are required to have a laptop or desktop computer capable of running virtualization software (e.g., VMware, VirtualBox). Recommended 16-32 GB ram, 512 GB – 1 TB SSD, Intel Core i7 / AMD Ryzen 7 or better.
Access to reliable internet as well as a camera, a headset, and preferably dual monitors.
Materials:
Course materials are not included in the tuition but will be available for purchase at the bookstore before the class begins.