Submit
Open Calendar

Breadcrumb

Click to print this page

Certified Ethical Hacker

man-working-at-computerEarn the qualifications for this high-paying, in-demand technology profession

The University of Central Missouri Certified Ethical Hacker certificate program is one of the most desired information security training programs available. The accredited course provides you with advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. Upon completion of the course, you will be prepared to sit for the national exam with a voucher for this exam provided. According to the Bureau of Labor Statistics, close to 1,000 new jobs in this profession will be added over the next five years with average salaries at $86,500 annually. Through this program, students earn continuing education units which may not be applied to a degree program and are not eligible for federal financial aid.

UCM certificate cost icon   $2,895 Calendar icon  

Classes forming now. Let us know of your interest, and we will keep you informed of all course offerings.

Contact hours icon   100 including classroom and homework  Prerequesites checklist icon   No prerequisites although students must have a strong knowledge of network infrastructure, computer hardware, software and security.

 

Gain the skills you need to succeed and prepare for recognized certificate examcomputers-on-workspace-table

Through this hands-on program, you will learn an entirely different way of achieving optimal information security posture within your organization. Students will learn to scan, test, hack and secure their own systems as well as the five phases of ethical hacking -- reconnaissance, gaining access, enumeration, maintaining access and covering your tracks. The course will teach you to use the same approaches that malicious hackers use, identify weaknesses and fix problems before they are identified by hackers working to harm your organization. Careers available in this area include certified ethical hacker, security analyst and network security analyst. 

What you will learn

  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration
  • System hacking
  • Malware threats
  • Evading IDS, firewalls and honeypots
  • Sniffing
  • Social engineering
  • Denial of service
  • Session hijacking
  • Hacking web servers, web applications, wireless networks and mobile platforms
  • SQL injection
  • Cloud computing
  • Cryptography

REQUEST INFO

social-section

  • facebook
  • twitter
  • youtube
  • linkedin
  • instagram