MN Cyber Training Program for CEH Certification

The MN Cyber CEH training program consists of 18 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training, beginning with an introduction to ethical hacking and covering such topics as malware threats, denial of service, hacking mobile platforms and cloud computing.

Courses are face-to-face, and attendance is required.

EC-Council certified course materials are included.  This non-credit course will prepare you to take the CEH certification exam.  This is a vendor-neutral and globally recognized industry certification.

Certification exam is not included in the course price.

Length: 42 total hours

Metropolitan State University is an authorized EC-Council Academia Partner.

This course will significantly benefit:

  •  Security Officers
  •  Auditors
  • Security Professionals
  • Site Administrators
  • Anyone who is concerned about the integrity of their network infrastructure

The broad spectrum of topics included in the CEH ensure its relevancy across all disciplines in the field of information security.  Successful candidates will learn:

  1. Key issues plaguing the information security world, incident management process, and penetration testing
  2. Various types of footprinting, footprinting tools, and countermeasures
  3. Network scanning techniques and scanning countermeasures
  4. Enumeration techniques and enumeration countermeasures
  5. System hacking methodology, steganography, steganography, steganalysis attacks and covering tracks
  6. Different types of Trojans, Trojan analysis, and Trojan countermeasures
  7. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  8. Packet sniffing techniques and how to defend against sniffing
  9. Social Engineering techniques, identify theft, and social engineering countermeasures
  10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  11. Session hijacking techniques and countermeasures
  12. Different types of webserver attacks, attack methodology, and countermeasures
  13. Different types of web application attacks, web application hacking methodology, and countermeasures
  14. SQL injection attacks and injection detection tools
  15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  16. Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  18. Various cloud computing concepts, threats, attacks, and security techniques and tools
  19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  20. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

Two years of work experience in the Information Security domain

Price: $2,850.00  Early Bird: $2,565.00 until 21 days prior to beginning of course

Please Note:

  • If you are registering through the workforce center, you must have your counselor contact IPD directly at

For questions or more details on all cyber security courses, please contact Dr. Kyle Swanson, Dean of College of Science at 651-793-1681.


If you want to customize this course specifically for your organization, contact or