Course Description
This course provides a review of topics and exam preparation for the Certified Ethical Hacker (CEH) exam. The Certified Ethical Hacker (CEH) certification is a vendor neutral certification in the network security discipline of Ethical Hacking. It covers the standards and language involved in attempting to penetrate a network or computer system. The Ethical Hacker is a technical professional who uses the same knowledge and tools as a hacker to look for the weaknesses in target systems and to help prevent unauthorized penetration. This knowledge or certification applies to security officers, auditors, security professionals, site administrators, and really anyone who is concerned about the integrity of the network infrastructure. In this course students prepare for the CEH exam by studying security risks through lectures and hands-on lab exercises. Students discuss and learn how to look for the weaknesses and vulnerabilities in a target. In addition, the application and testing process for the CEH as well as key topics on the exam are covered.
Certified Ethical Hacker (CEH) Bootcamp Dec 2025Certified Ethical Hacker (CEH) Bootcamp
SEC200 Security Architecture and Design, and
SEC300 Introduction to Hacking, Defense and Response
Or equivalent experience
Related Certificates
Earning a Saint Louis University Workforce Center certificate allows you to enhance your career options by networking with peers and establishing valuable industry contacts.
ISACA Professional Certificate
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Large Language Models Foundations
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud.
See Details
Artificial Intelligence and Machine Learning for Cybersecurity Operations
Artificial intelligence (AI) and machine learning (ML) are revolutionizing the cybersecurity industry. The emergence of ML as a tool for...
See Details