Course Summary
Credit Type:
ACE Course Number:
27 hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Lower-Division Baccalaureate 2 Computer Security or Information Security


The course objective is to help prepare learners for the Certified Ethical Hacker certification exam.

Learning Outcomes:

  • Identify footprinting techniques and tools
  • Recognize the characteristics of the enumeration phase of an attack and effective countermeasures
  • Determine the techniques and tools used in system hacking
  • Describe the characteristics of trojans, worms, and malware
  • Differentiate between ARP attack tools and countermeasures
  • Sequence the steps you would perform to complete a penetration test on your web servers
  • Determine what you test for at which stage of web application penetration
  • Determine how to counter wireless network hacking techniques
  • Identify tools and techniques used to evade IDS, firewalls, and honeypots
  • Determine ways to assess the effectiveness of security policies and procedures
  • Determine the type of penetration test to perform in a given situation
  • Evaluate various techniques and tools used in network scanning
  • Identify social engineering techniques and countermeasures
  • Determine countermeasures to denial-of-service and session hijacking attacks
  • Describe best practices for keeping Android, iOS, and Windows OS devices secure

General Course Topics:

  • Certified Ethical Hacker (CEH): hacking and penetration testing
  • Certified Ethical Hacker (CEH): footprinting and reconnaissance
  • Certified Ethical Hacker (CEH): network scanning
  • Certified Ethical Hacker (CEH): enumeration and cryptography
  • Certified Ethical Hacker (CEH): system hacking
  • Certified Ethical Hacker (CEH): malware
  • Certified Ethical Hacker (CEH): sniffing
  • Certified Ethical Hacker (CEH): social engineering
  • Certified Ethical Hacker (CEH): denial of service and session hijacking
  • Certified Ethical Hacker (CEH): hacking web servers
  • Certified Ethical Hacker (CEH): hacking web applications
  • Certified Ethical Hacker (CEH): SQL injection
  • Certified Ethical Hacker (CEH): hacking wireless networks
  • Certified Ethical Hacker (CEH): hacking mobile platforms
  • Certified Ethical Hacker (CEH): evading IDS, firewalls, and honeypots
  • Certified Ethical Hacker (CEH): buffer overflow.Note: Students can only use ACE credit recommendations for SkillSoft courses if they successfully pass a proctored comprehensive final examination taken at an authorized testing center
Instruction & Assessment

Instructional Strategies:

  • Audio Visual Materials
  • Computer Based Training

Methods of Assessment:

  • Examinations

Minimum Passing Score:

Supplemental Materials