- Online
- $3,200
This course is part of the UBC Certificate in Cloud and Technology Transformation.
Leveraging the curriculum developed by EC-Council, the world’s largest cyber security technical certification body, this course provides insights into the current security scenario and increasing hacking attempts on various information systems. This rigorous course gives learners access to weekly live sessions with an instructor, EC-Council’s course materials, online labs, practice exam, and an exam voucher to take the certification exam to become a Certified Ethical Hacker.
In this course, learners will achieve a greater understanding of the ins and outs of ethical hacking, including footprinting and reconnaissance, scanning networks, vulnerability analysis and concepts around cryptography. Explore system hacking, malware threats, sniffing, social engineering, denial-of-service, session hijacking, evading IDS, firewalls and honeypots, and everything from hacking web servers, wireless networks and mobile platforms to SQL injection, IoT and OT hacking.
By the end of the course, you'll be able to:
- Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
- Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing the security of various components of an information system.
- Compare and contrast different hacking techniques and analyze the legal implications of hacking.
- Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.
- Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information.
- Compare and contrast various network security assessment and hacking tools.
- Assess various network security techniques and tools and implement the appropriate level of information security controls based on evidence, information, and research.
Course outline
This course is designed to provide you with an insight into the current security scenario and increasing hacking attempts on various information systems. The goal of ethical hacking and countermeasures is to help you and your organizations take preemptive measures against malicious attacks by attacking their own system while staying within legal limits.
Course topics:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Network
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Hijacking
- Evading, IDS, Firewalls, and Honeypots
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
How am I assessed?
You're assessed on successfully completing weekly activities, including your contributions to discussion posts and applied case study projects (based on real-life scenarios). Other assessments include assignments based on required readings, lab assignments, quizzes, research project, and a final exam. Your instructor provides you informal feedback in the live sessions as well as graded assignments.
While you're not assessed on your attendance of the live sessions, we encourage you to attend these classes, so you don't miss the opportunity to learn and interact with your instructor and other participants. All sessions are recorded in case you miss one.
Expected effort
Expect to spend approximately 5-7 hours per week completing all learning activities, including attending online live sessions.
Technology requirements
All course content is provided in the online courses. To take this program, you'll need access to:
- an email account
- a computer, laptop or tablet, using Windows or macOS
- the latest version of a web browser (or previous major version release)
- a reliable internet connection
- a video camera and microphone
Course format
This part-time, 100% online course consists of self-paced content and weekly 1.5 hour virtual live sessions with a course instructor. These virtual sessions are also recorded for later viewing. Each week, learners will review readings, labs, and videos, and apply their knowledge in quizzes, exercises, research project and final exam. Students are expected to contribute to a discussion forum and participate in interactive activities with your peers and course instructor.
Course instructor
TRAVIS CZECH, is an instructor in cybersecurity, software development, ethical hacking and data engineering. In addition to teaching, he is a solutions and security architect and business and technology consultant. Travis is an EC-Council certified ethical hacker and network defender. His books include Cyber Security: Rust for Ethical Hacking, Cyber Security: Python for Penetration Testing and Cyber Security: Incident Response Plans.