SHARE        

Loading...

Overview

Person working in front of multiple computer monitors

The Threat Is Real. Are You Ready?

Cyberattacks are no longer a distant threat – they are an everyday reality. Organizations across every industry face an escalating wave of breaches, ransomware, social engineering, and data theft. The question is no longer if your organization will be targeted, but when, and whether you'll have the knowledge to stop it.

This 12-week program, offered through the University of South Florida Corporate Training and Professional Education, is designed for anyone ready to build a serious career in cybersecurity – whether you're starting from scratch or looking to formalize and advance your existing skills. The program is delivered in two integrated parts, is aligned with the EC-Council's official CEH v13 curricula, and the cost of registration includes the official CEH v13 certification exam fee – an added value that removes a common financial barrier to certification.

Why This Course? Why Now?

The cybersecurity talent gap is not a talking point – it is a documented crisis. Employers are not just looking for people who understand cybersecurity in theory, they need professionals who can perform security assessments, identify weaknesses in real systems, and recommend actionable defenses.

  • The global cybersecurity workforce gap reached 4.8 million unfilled positions in 2024, according to the ISC2 Cybersecurity Workforce Study, 2024.
  • The U.S. Bureau of Labor Statistics projects information security analyst roles will grow 32% between 2022 and 2032 – far outpacing the average for all occupations (BLS Occupational Outlook Handbook, 2023–24 edition).
  • The median annual wage for information security analysts in the U.S. was $120,360 as of May 2023 (U.S. Bureau of Labor Statistics, May 2023 Occupational Employment Statistics).
  • Penetration testers and ethical hackers with recognized certifications consistently command premium salaries, with experienced professionals earning well above six figures depending on sector and specialization.

Investment in Your Future

This program gives you not just the knowledge, but the path to recognized credentials – an EC-Council-aligned CEH certificate and a USF digital badge to demonstrate your competence to the employers who need you most.

A Globally Recognized Credential

The CEH is one of the most recognized and respected certifications in the cybersecurity industry, awarded by EC-Council – a globally trusted credentialing body. Earning your CEH signals to employers that you have met a rigorous, vendor-neutral standard for ethical hacking knowledge and practice. To become CEH certified, you must successfully pass the official EC-Council CEH v13 certification exam. While completion of this course does not confer the CEH certification, it does prepare you to take the official CEH v13 certification exam, the cost of which is included in your course registration fee.

A Digital Badge from USF Corporate Training and Professional Education

Upon completion of the program, you will receive an official digital badge from the University of South Florida Corporate Training and Professional Education – a nationally recognized R1 research university. Your badge is a verifiable, shareable credential that documents the specific skills you have mastered, making it easy to showcase your achievement to employers, on LinkedIn, or in your professional portfolio.

Who Should Take This Course?

This program is designed for:

    Career changers and newcomers to the cybersecurity field who want a structured, supported entry point. The Cybersecurity Essentials component ensures no prior experience is required to begin
  • IT professionals seeking to transition into security roles or formalize their ethical hacking knowledge
  • Security analysts, network administrators, and system engineers looking to deepen their offensive security skillset
  • Recent graduates in computer science, information technology, or related fields pursuing their first cybersecurity certification
  • Anyone serious about a career in penetration testing, red teaming, or security consulting

What You Will Get Out of This Course

Two Courses. One Powerful Pathway.

Part 1: Cybersecurity Essentials (Weeks 1–2)

Not sure where to start? We've got you covered. The program begins with Cybersecurity Essentials, a foundation designed for those new to the field or looking to strengthen their core knowledge. You’ll build fluency in key cybersecurity concepts, explore the technology behind modern threats, learn how organizations defend their systems, and gain insight into diverse career pathways. You’ll also examine how artificial intelligence is reshaping cybersecurity, both as a tool for defense and a tactic used by attackers – ensuring you start the next phase prepared and confident.

Part 2: Certified Ethical Hacker — CEH v13 (Weeks 3–12)

Once the foundation is in place, you'll advance into the full CEH v13 curriculum – one of the most respected ethical hacking programs in the world. Here, you'll learn to think like an attacker and operate like a cybersecurity professional, developing the hands-on skills employers are actively seeking.

Hands-On, Practical Skills

This is not a passive learning experience. Through 20 hands-on lab assignments, you will work directly with industry-standard tools, including Metasploit, Nmap, Burp Suite, Aircrack-ng, Wireshark, sqlmap, and more; performing the same techniques that ethical hackers and penetration testers use every day on the job. You will gain experience across the full attack lifecycle: from reconnaissance and scanning, to exploitation, post-exploitation, and defense.

AI-Integrated Learning

CEH v13 formally integrates AI techniques throughout the ethical hacking curriculum, reflecting how both attackers and defenders are rapidly adopting artificial intelligence. From the Cybersecurity Essentials introduction through the advanced modules, you will develop an understanding of how AI is transforming both offensive and defensive security – a skillset with growing importance across every cybersecurity role.

A Career-Ready Knowledge Base

Over 12 weeks, you will cover the full breadth of the EC-Council's CEH v13 curriculum across 20 modules, giving you fluency in the attack vectors, tools, techniques, and countermeasures that matter most in today's threat landscape.

Whether you are entering the field for the first time, advancing your current career, or upskilling your team, this program offers a rigorous, practical, and career-focused pathway into one of the most durable and rewarding fields in technology.

Learning Objectives

Upon successful completion of this course, learners will be able to:

  • Explain core cybersecurity concepts, terminology, and the CIA Triad.
  • Analyze technology and threat landscapes to understand how systems operate and attacks occur.
  • Apply basic defensive strategies to protect systems and networks.
  • Analyze real-world incidents to understand threat detection, containment, and recovery.
  • Explore cybersecurity career paths and connect transferable skills to roles.
  • Identify ethical and legal requirements for penetration testing.
  • Analyze hacking phases to assess system security.
  • Evaluate hacking techniques and legal implications.
  • Identify vulnerabilities and recommend countermeasures.
  • Apply cryptography and encryption to protect information.
  • Compare network security and ethical hacking tools.
  • Implement security controls using cybersecurity tools and techniques.
  • Explore AI applications in ethical hacking.

Advisor

Our advisors are here to support you every step of the way – whether you have questions about courses, need guidance on your learning path, or simply want to explore your goals.

 
Loading...
 
 
A calendar with a pencil laying on top of it
A person using their mobile phone
Cyber Security
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .