Skip to ContentSkip to Navigation

Certified Ethical Hacker

If you're interested in cybersecurity and have a background in IT, Harford's Certified Ethical Hacker course may be for you!

One of the hottest certifications in IT Security, the Certified Ethical Hacker (CEH) program contains the most comprehensive ethical hacking courses available to help information security professionals grasp the fundamentals of ethical hacking. You'll learn to systematically attempt to inspect network infrastructures with the consent of its owner to find security vulnerabilities that a malicious hacker could potentially exploit.


Program Overview

This is an advanced certification program for current IT professionals.

Certified Ethical Hacker designation from EC-Council (upon successful completion of exam)
• One course
• Less than one semester to complete


• Must be at least 18 years of age and have a high school diploma or GED®.
• Must have a Security+ certification



The curriculum is certified by EC-Council and prepares students for exam 312-50 which tests Certified Ethical Hacker candidates on the following 18 domains:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls, and Honeypots
  • Cloud Computing
  • Cryptography

Ethical hacking is the process of penetrating computers, networks, and applications, for which you have official authorization, to access to determine if vulnerabilities exist. Once vulnerabilities are discovered, learn what should be done to undertake preventative, corrective, and protective countermeasures before an actual compromise to the system takes place. 

What can I do when I complete this program?

Certified Ethical Hackers use the same knowledge and tools as a malicious hacker, but in a lawful, legitimate manner to assess the security posture of a target system.

After completing this program, students will be prepared to sit for the CEH Exam. Students may enter the workforce directly in positions such as forensics analyst, cyber operator, or systems security analyst, or may pursue a certificate or associate degree in Information Assurance and Cybersecurity.

Who teaches this program?

Dave Reese is a leading expert in IT classroom training. He has 20 years of experience providing technical and seminar training in topics such as IT fundamentals (A+, Network+, Security+, Server+); Microsoft Server Administration (Windows Server NT 4.0 - 2012); Network Infrastructure (Cisco Routing and Switching); Network Security (CASP, CEH, Packet Capture and Analysis); Client Operating Systems (DOS, Windows, Linus, Mac, Android); as well as a wide variety of user applications (Microsoft Office Suite, Google Apps/GSuite).