Next Start Date:
April 6, 2020
This course is part of a certificate program. You can also take it without enrolling in the program.
This course features a lecture and lab-based format and focuses on new technologies introducing advanced techniques and skills in the field.
This course is part of the Certificate in Ethical Hacking.
Ethical Hacking Essentials: Reconnaissance & Exploits
Advanced Ethical Hacking: Cloud, Web & Advanced Techniques
Real-World Systems: Security Architecture, Domains & Ethical Hacking Practicum
Certificate in Ethical Hacking
Discover this program
Approved by the School of Engineering & Technology, UW Tacoma
View this program's advisory board.
Each of our programs uses an advisory board to review content, guide design and recommend updates to ensure the program remains current as the field of study evolves. By tapping the minds of the top thinkers, doers and leaders in the field, we offer a transformational learning experience. The following individuals serve as the advisory board for this program.
Melissa Albin, CEH, CSFA, Education and Communications Manager, UW Office of the Chief Information Security Officer
Steven Becker, Senior Security Consultant, Mandiant
Marc Dupuis, Ph.D., Assistant Professor, University of Washington Bothell
Dr. Barbara Endicott-Popovsky, Executive Director, Center for Information Assurance & Cybersecurity, University of Washington
James Kirk, Advisor, IT Security Analyst, Puget Sound Energy
Will Kruse, Senior Security Engineer, Amazon Web Services
Ryan Luke, Software Security Engineer, Microsoft
John Paramadilok, Cryptologist, U.S. Department of Defense and Cyber Threat Intelligence, U.S. Bank
Craig Pearce, Senior Security Engineer, Amazon Web Services
Johann Rehberger, Principal Security Engineering Manager, Microsoft
Piyu Roy, Program Manager, International & Academic Programs, UW Continuum College
Craig Schippers, Sales Engineer, Trend Micro
Jason Tsang, Penetration Tester, Security Consultant, and Security Researcher, Microsoft
Dustin Vaughn, Senior Sales Engineer, LogRhythm
Combine the convenience of online learning with the immediacy of real-time interaction. You’ll stream courses online and interact with your instructors and fellow students via chat, web conferencing or phone, all in real time. Learn More »
This course is part of a certificate program. You can take this course without enrolling in the certificate program, but it won't automatically count toward earning the certificate. To apply to the full certificate program instead, visit the Certificate in Ethical Hacking page.
To apply to this course, you’ll need to submit the following:
We accept course applicants on a space-available basis and will email you before the first class to let you know if you’ve been accepted. If accepted, you’ll need to pay the course fee to complete your registration.
Applicants must have:
Those who need help meeting the network administration requirements should consider enrolling in our Network & System Administration course.
If you're not a native English speaker, you’ll need to have at least basic English language skills to enroll. To learn more, see English Language Proficiency Requirements.
Because this offering is 100 percent online, no visa is required and international students are welcome to apply. For more information, see Admission Requirements for International Students.
Access to a computer is required for the program, as well as a high speed internet connection. You will also need a headset with microphone.
You earn the certificate by adhering to the program's attendance policy and successfully completing all required courses. For more information, see Earning the Certificate.
Penetration Tester, Security Consultant and Security Researcher
You'll earn 3 continuing education units (CEUs) for successfully completing this course. Learn more about noncredit courses.