The Ethical Hacker Pro Course

Put on your white hat and get paid to legally break into computers::

  • 94 total hours of study
  • 19 self-paced, online modules

for full access

Course Overview

Can hacking be ethical? Absolutely. Ethical hacking (or penetration testing) is when tech-savvy folks put their IT security knowledge to good use by testing an organization’s network defenses. They hunt for vulnerabilities, scan for holes, and report their findings before hackers with malicious intent—known as black hats—can take advantage.

This course uses simulations, video lessons, and demonstrations to guide you through various penetration testing tools so you can wear your white hat with pride.

  • 94 Study Hours
  • Self-Paced Study
  • Online Access

Here’s what you’ll need before you sign up: Two years’ experience in an information security related role; a CEH certification of version 1 to 7, or a minimum of 2 years work experience in InfoSec domain (You will need to pay USD100 as a non-refundable application fee); or have attended an official EC-Council training (all candidates are required to pay the $100 application fee, however your training fee shall include this fee). CompTIA Security+ certification is highly recommended before taking this course.

What You'll Learn:

circle icon check
What is Ethical Hacking

You’ll get the lowdown on what exactly makes ethical hacking … well, ethical.

circle icon check
Jargon, Slang, and Basic Terminology

If you’ve seen enough movies, you know hackers have a cool way of communicating—and now you’ll finally understand what the “Person in the Chair” is actually saying as their fingers fly across the keyboard.

circle icon check
Reconnaissance, Scanning, and Enumeration

We’ll teach you how to get results through effective recon and testing methods.

Certifications:

  • Ethical Hacker Pro (TestOut)
  • Certified Ethical Hacker v10 (EC Council)

Related Programs:

Modules

  • Orientation
  • Intro to Ethical Hacking
  • Intro to Penetration Testing
  • Social Engineering & Physical Security
  • Reconnaissance
  • Scanning
  • Enumeration
  • Analyze Vulnerabilities
  • System Hacking
  • Malware
  • Sniffers, Session Hijacking, and Denial of Service
  • IDS, Firewalls, and Honeypots
  • Web Servers, Web Applications, and SQL Injections
  • Wi-Fi, Bluetooth, and Mobile Devices
  • Cloud Computing and Internet of Things
  • Cryptography
  • Ethical Hacker Pro Practice
  • EC-Council CEH Practice
  • Ethical Hacker Pro Certification Exam (optional)
time to level up

It's Time to Level Up

Trusted training that's tried-and-true. And easy on the pocketbook.

for full access

Not Convinced? Call: 800-411-7073

Our super-smart Career Advisors can answer any questions you have about our training, pricing, and payment options.