A practical, hands-on opportunity to learn real world security principles with security tools to assess, defend, and investigate hosts and networks. Exploration of the fundamentals of secure coding through analysis of vulnerable applications.
A practical, hands-on opportunity to learn real world security principles with security tools to assess, defend, and investigate hosts and networks. Exploration of the fundamentals of secure coding through analysis of vulnerable applications.
As a premier research and education program for the 21st century field of information, the School of Information is changing the future by engaging the present and preserving the past.
What is an iSchool?
We are living in an Information Age. Information systems and technologies are fundamentally shaping the behaviors of individuals, organizations, and society — impacting how we interact and connect, learn and develop new knowledge, conduct business, engage with culture, participate in politics and government, and much more.
Research and teaching at the School of Information explore:
the interactions of people and information
the processes of managing and organizing information for meaning and use
the impact of new technologies and behaviors on individuals, organizations, and society
Our students learn to design new tools, analyze human activities, organize information, and ensure technology serves its intended users.
Develop the skills to identify vulnerabilities and protect organizations against security threats. EC-Council CEH course provides exposure to network scanning, vulnerability analysis, system hacking methods, social engineering, session hijacking, and other vital techniques that help prevent attacks...
Learn how to craft exploits used by ethical hackers to perform real-world penetration testing engagements. Understand the methods for conducting wired and wireless network assessments, hacking web servers, and web applications.
Ethical Hacking Bootcamp is a five-day class with over 140 labs which mimic real time scenarios to help you “live” through an attack as if it were real and provide you with access to over 2,200 commonly used hacking tools to immerse you into the hacker world.
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks.
Here at CTIChicago our Information Technology program has so much to offer! We offer Industry recognized certifications in programs such as Cyber Security & Certified Ethical Hacking.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy