Skip to Main Content Skip to bottom Skip to Chat, Email, Text
"Degrees & Programs"


Ethical Hacking Part 3




Estimated Tuition


Total credits


Course length

Start when you're ready

Choose an upcoming start date:

Enroll by 1pm Central:

Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.

Course level: Undergraduate

This course provides training on penetration testing. Introduced topics include SQL injection attacks, hacking web applications, wireless networks, mobile platforms, operational technology, the Internet of things, and cloud platforms, and cryptography basics.  


CYB/231 - Ethical Hacking Part 2 or equivalent

What you'll learn

Course skills and outcomes

Week 1

  • Apply SQL injection concepts.
  • Discuss types of SQL injection attacks.
  • Employ SQL attack techniques.
  • Choose appropriate SQL injection countermeasures.

Week 2

  • Differentiate the strengths and weaknesses of modern day wireless encryption algorithms.
  • Relate the methods used for hacking wireless networks to cybersecurity
  • Compare mobile device attack vectors.
  • Outline a mobile device management plan.

Week 3

  • Use firewall evasion tools and techniques.
  • Relate the employment of firewalls, intrusion detection systems (IDS), and honeypots to the support of defense-in-depth.
  • Illustrate how penetration-testing process identifies and evades network defenses.
  • Select perimeter protection evasion and appropriate countermeasures for a defense-in depth strategy.

Week 4

  • Outline the considerations in formulating a cloud security plan.
  • Prioritize cloud security threats and attacks.
  • Analyze available cloud security tools.

Week 5

  • Summarize use of modern encryption algorithms in cybersecurity.
  • Identify the role of cryptanalysis in an organization’s cyber security.
  • Analyze the security features and use of a public key infrastructure.
  • Appraise cryptographic attack scenarios for use in cybersecurity.

Note:  Each week’s content pertains to a particular domain in the Certified Ethical Hacker (CEHv9) certification.  In CYB/229 and CYB/231 the concepts tend to flow and build on each other from week to week.  In CYB/233 the weeks tend to be more “stand alone” although some basic concept will be transferable week to week.  In this course there is more attention to outlining and creating plans to secure or manage certain aspects of an organization’s technology (ex. wireless and mobile networks, the cloud, system defenses, etc.)


Why take courses at University of Phoenix

Accreditation that matters

We’ve been accredited by the Higher Learning Commission ( for more than 40 years.

Real-world instructors

Learn from instructors who bring an average of 25 years of working experience to the classroom.

Affordable and potentially reimbursable

Our tuition and fees are competitive and fixed. Also, check to see if your employer will cover you for this course.

Next Steps

Start a conversation about your future with an enrollment representative today.

Start a conversation about your future with an enrollment representative today.

Call (844) 937-8679

Transfer Credits

Credit Transfer

Credit Transfer

Need to transfer credits to another college or university?

Before you enroll in a course, check with your school of choice to make sure they will accept our transfer credits and to understand any requirements or limitations. Then you can complete your course, and request your official transcript be sent to your school. That’s it!

How to request your transcripts