Program description | Immerse yourself in a hackers mindset, evaluating logical and physical security, and explore every possible point of entry to find an organizations weakest link. Learn how to scan, test, hack and secure your own systems. Practice the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time. Upon completion, youll be prepared to sit for the Certified Ethical Hacker (CEH) Exam 312-50 |