Ethical Hacking Certification Training

  • Online
  • $3,200

This course is part of the UBC Certificate in Cloud and Technology Transformation.

Leveraging the curriculum developed by EC-Council, the world’s largest cyber security technical certification body, this course provides insights into the current security scenario and increasing hacking attempts on various information systems. This rigorous course gives learners access to weekly live sessions with an instructor, EC-Council’s course materials, online labs, practice exam, and an exam voucher to take the certification exam to become a Certified Ethical Hacker.

In this course, learners will achieve a greater understanding of the ins and outs of ethical hacking, including footprinting and reconnaissance, scanning networks, vulnerability analysis and concepts around cryptography. Explore system hacking, malware threats, sniffing, social engineering, denial-of-service, session hijacking, evading IDS, firewalls and honeypots, and everything from hacking web servers, wireless networks and mobile platforms to SQL injection, IoT and OT hacking.

By the end of the course, you'll be able to:

  • Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
  • Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing the security of various components of an information system.
  • Compare and contrast different hacking techniques and analyze the legal implications of hacking.
  • Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.
  • Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information.
  • Compare and contrast various network security assessment and hacking tools.
  • Assess various network security techniques and tools and implement the appropriate level of information security controls based on evidence, information, and research.

Course outline

This course is designed to provide you with an insight into the current security scenario and increasing hacking attempts on various information systems. The goal of ethical hacking and countermeasures is to help you and your organizations take preemptive measures against malicious attacks by attacking their own system while staying within legal limits.

Course topics:

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Network
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  11. Hijacking
  12. Evading, IDS, Firewalls, and Honeypots
  13. SQL Injection
  14. Hacking Wireless Networks
  15. Hacking Mobile Platforms
  16. IoT and OT Hacking
  17. Cloud Computing
  18. Cryptography 

How am I assessed?

You're assessed on successfully completing weekly activities, including your contributions to discussion posts and applied case study projects (based on real-life scenarios). Other assessments include assignments based on required readings, lab assignments, quizzes, research project, and a final exam. Your instructor provides you informal feedback in the live sessions as well as graded assignments.

While you're not assessed on your attendance of the live sessions, we encourage you to attend these classes, so you don't miss the opportunity to learn and interact with your instructor and other participants. All sessions are recorded in case you miss one.

Expected effort

Expect to spend approximately 5-7 hours per week completing all learning activities, including attending online live sessions.

Technology requirements

All course content is provided in the online courses. To take this program, you'll need access to:

  • an email account
  • a computer, laptop or tablet, using Windows or macOS
  • the latest version of a web browser (or previous major version release)
  • a reliable internet connection
  • a video camera and microphone

Course format

This part-time, 100% online course consists of self-paced content and weekly 1.5 hour virtual live sessions with a course instructor. These virtual sessions are also recorded for later viewing. Each week, learners will review readings, labs, and videos, and apply their knowledge in quizzes, exercises, research project and final exam. Students are expected to contribute to a discussion forum and participate in interactive activities with your peers and course instructor.

Course instructor

TRAVIS CZECH, is an instructor in cybersecurity, software development, ethical hacking and data engineering. In addition to teaching, he is a solutions and security architect and business and technology consultant. Travis is an EC-Council certified ethical hacker and network defender. His books include Cyber Security: Rust for Ethical Hacking, Cyber Security: Python for Penetration Testing and Cyber Security: Incident Response Plans.

Available sessions

Available course sessions
Dates Days Time Format Tuition Description
- - Online $3,200
Acknowledgements:

 

logo

Related courses

How can we help?

We’re here to answer your questions, discuss learning options and provide insights, recommendations and referrals.  

Facebook The logo for the Facebook social media service. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Question A question mark inside a solid circle. Twitter The logo for the Twitter social media service. Youtube The logo for the YouTube video sharing service. RSS The symbol to indicate an RSS feed. Arrow An arrowhead pointing to the right Arrow, right to bracket An arrowhead pointing to the right, into a bracket character. External Link An arrowhead pointing up and to the right, from inside a box Bars Three horizontal bars. Books Three book spines, viewed head-on, one leaning. Calendar A monthly calendar page. E-commerce Cart A shopping cart Checkmark A checkmark character Chevron A chevron character pointing to the right Checkmark A checkmark character inside a solid circle Cost A dollar sign inside a solid circle Info An 'i' character inside a solid circle Play An arrowhead pointing to the right inside of a solid circle User A silhouette of a person inside a solid circle Envelope A closed envelope Certificate A document with an award pinned to it Pen A document with a pen beside it Filter A funnel / filter silhouette Laptop Computer An open laptop computer with a blank screen Location Pin A map location pin Search A magnifying glass Minus A minus sign News A folded newspaper Plus A plus symbol indicating more or the ability to add Quote, left An opening quotation character Alert An exclamation point inside a solid triangle User A silhouette of a person Close The character 'X'