Course Catalog / Learning Path / Ethical Hacker

Ethical Hacker


Overview

The Ethical Hacker Learning Path includes a variety of security courses geared towards individuals responsible for assessing systems and networks within the network environment and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. The curriculum provides a solid foundation of the skills needed to measure the effectiveness of defense-in-depth architecture against known vulnerabilities and verify and improve the security of a company’s computer systems.

After completing this learning path learners will have the knowledge and skills necessary to:

  • Analyze cyber defense policies and configurations
  • Evaluate compliance with regulations and organizational directives
  • Conduct and/or support authorized penetration testing on enterprise network assets
  • Deploy cyber defense audit toolkit to support cyber defense audit missions
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing
  • Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions
  • Conduct required reviews as appropriate within an environment
  • Perform evaluation of technology and of people and operations risk
  • Perform vulnerability assessments of relevant technology focus areas
  • Make recommendations regarding the selection of cost-effective security controls to mitigate risk

Courses

Overview

The Ethical Hacker Learning Path includes a variety of security courses geared towards individuals responsible for assessing systems and networks within the network environment and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. The curriculum provides a solid foundation of the skills needed to measure the effectiveness of defense-in-depth architecture against known vulnerabilities and verify and improve the security of a company’s computer systems.

After completing this learning path learners will have the knowledge and skills necessary to:

  • Analyze cyber defense policies and configurations
  • Evaluate compliance with regulations and organizational directives
  • Conduct and/or support authorized penetration testing on enterprise network assets
  • Deploy cyber defense audit toolkit to support cyber defense audit missions
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing
  • Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions
  • Conduct required reviews as appropriate within an environment
  • Perform evaluation of technology and of people and operations risk
  • Perform vulnerability assessments of relevant technology focus areas
  • Make recommendations regarding the selection of cost-effective security controls to mitigate risk

Courses

Overview

The Ethical Hacker Learning Path includes a variety of security courses geared towards individuals responsible for assessing systems and networks within the network environment and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. The curriculum provides a solid foundation of the skills needed to measure the effectiveness of defense-in-depth architecture against known vulnerabilities and verify and improve the security of a company’s computer systems.

After completing this learning path learners will have the knowledge and skills necessary to:

  • Analyze cyber defense policies and configurations
  • Evaluate compliance with regulations and organizational directives
  • Conduct and/or support authorized penetration testing on enterprise network assets
  • Deploy cyber defense audit toolkit to support cyber defense audit missions
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing
  • Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions
  • Conduct required reviews as appropriate within an environment
  • Perform evaluation of technology and of people and operations risk
  • Perform vulnerability assessments of relevant technology focus areas
  • Make recommendations regarding the selection of cost-effective security controls to mitigate risk

Courses

Learning Path Details

Number of Courses: 74

Number of Labs: 41

Total Duration: 26 Hours

Total CPE Credits: 31