Loading...

Course Description

This course covers 270 attack technologies commonly used by hackers. Throughout the CEH course you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

Loading...

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens. To inquire about registering for this program please contact the Non-Credit Registration Office at 814-867-4973 or  nc_reg_office@outreach.psu.edu

Required fields are indicated by .