Skip to Main Content Skip to bottom Skip to Chat, Email, Text
"Degrees & Programs"


Ethical Hacking Part 1




Estimated Tuition


Total credits


Course length

Start when you're ready

Choose an upcoming start date:

Enroll by 1pm Central:

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Undergraduate

This course provides training on penetration testing. Introduced topics include Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks, Enumeration, System Hacking, and Malware Threats.



What you'll learn

Course skills and outcomes

Week 1

  • Define ethical hacking, its scope, and goals within an ethical framework.
  • Describe vulnerability assessment and the significance of penetration testing.
  • Define footprinting and reconnaissance, its scope, and methodology.
  • Determine appropriate process for footprinting and reconnaissance.
  • Conduct footprinting/reconnaissance using recognized tools and techniques.

Week 2

  • Identify the role of scanning in vulnerability analysis.
  • Differentiate scanning techniques and their appropriate tools.
  • Draw the network topology based on scanning results.
  • Evaluate strategies for scanning countermeasures and evasion.

Week 3

  • Identify the role of enumeration in vulnerability analysis.
  • Detail enumeration techniques and their appropriate tools.
  • Summarize enumeration countermeasures.
  • Conduct appropriate steps for enumeration for use in attack planning.

Week 4

  • Explain ethical system hacking methodology, the stages of system hacking and their goals.
  • Determine appropriate ethical hacking techniques and tools for cracking passwords, escalating privileges, and executing applications.
  • Select ethical hacking techniques and tools appropriate for hiding files and covering tracks.
  • Outline components of an attack plan.

Week 5

  • Outline a penetration testing plan.
  • Compare different types of malware.
  • Explain malware analysis process.
  • Describe techniques and tools to detect malware.
  • Evaluate malware countermeasures.


Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission ( for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Start a conversation about your future with an enrollment representative today.

Start a conversation about your future with an enrollment representative today.

Call (844) 937-8679

Transfer Credits

Credit Transfer

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

How to request your transcripts