Course Syllabus for CIS 274 Certified Ethical Hacker (CEH}

This course provides the "how to" of Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Using virtual environments, students will learn and demonstrate how to scan, test, hack, and secure their own systems. Students will also develop an understanding of perimeter defenses, perimeter scanning and perimeter attacks to their own networks. Through lectures, discussions, demonstrations, textbook exercises, and classroom labs, students will also develop the skills and knowledge necessary to help prepare them for the Certified Ethical Hacker (CEH) certification exam.
Primary Material Type:
Other Material Types:
Wayne County Community College District
Project Name:
Wayne County Community College District - Wayne County Generation Cyber
Cyber Security, Information Assurance, Cyber KSAs, NICE, NIST

Industry / Occupation

Industry Partner:
DTE Energy; State of Michigan - Veteran Affairs; MCISSE; Lawrence Tech University
Industry Sector:
Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)
Computer and Mathematical Occupations -- Network and Computer Systems Administrators (15-1071)

Education / Instructional Information

Credit Type:
  • Credit
Credential Type:
  • Certificate
  • Credential
  • Stacked/Latticed Credential Model
  • Associate Degree
Educational Level of Materials:
  • 1st year Community College or equivalent
  • 2nd Year Community College or equivalent
Time Required:
45 contact hours
Interactivity Type:
Active - requires user to respond to prompts, questions, etc.
Quality Note:
WCCCD utilized a process of developing a Quality Rubric aligned with the Department of Defense (DOD) 8570, National Institute of Standards and Technology (NIST) and National Initiative for Cybersecurity Education (NICE) Workforce Framework to ensure that the appropriate knowledge, skills and abilities (KSAs) were integrated into the curriculum. Furthermore, the Advisory Council, consisting of industry professionals, Cyber Trade Association, and university professors from the University of Detroit Mercy and Lawrence Technological University provided Quality Assurance (QA) reviews and recommendations regarding the curriculum and certifications.
Quality of Subject Matter was assured by:
  • Consultations during development of instructional materials
  • Participation as an ongoing member of team developing the instructional materials
  • Conducting an evaluation of the instructional materials and providing a report
  • Using an approved rubric to conduct the evaluation of the instructional materials and providing a report
  • SME Quality Report is posted in Skills Commons
Quality of Online/Hybrid Course Design assured by:
  • Other Rubric
Course Note:
The Cybersecurity program offers a 2-year Associates in Applied Science Degree, a 1-year Certificate as well as Short-Term Certificates.


Accessibility Features:
  • Text Access - Text to Speech
  • Text Adjust - Compatible
  • Text Adjustment - Adjust Font and Colors
  • Reading Layout - Reflow the Text
  • Reading Layout - Page numbers match printed material
  • Reading Layout - Reflow the Text
  • Reading Order - Digital resource layout
  • Structural Markup - Navigation Text
  • Structural Markup - Lists
  • Structural Markup - eReader application
  • Table Markup
  • Colors Compatible With Assistive Technology
  • Contrast Ratio of at Least 4.5:1.
  • Language - Markup
  • Language - Passage Markup
  • Decorative Images Marked With Null Alt Text
  • Complex Images, Charts, and Graphs Have Text Descriptions
  • STEM Content (e.g. Mathematics, Chemistry) Markup
  • STEM - Notation markup
  • Interactive - Keyboard
  • Interactive - Markup
  • Interactive - Text prompts

Copyright / Licensing

Primary License:
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Additional License(s):
Other - Please see material for licensing information.