Profile Image

Ken Underhill

Master Instructor
Master Instructor at Cybrary

I am the Master Instructor at Cybrary and a Cybersecurity professional. I hold both the CEH (Certified Ethical Hacker) and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams.

See More

Ken Underhill 's Courses

Session Hijacking
This course covers session hijacking, which is where an attacker takes over a legitimately…
Certificate of Completion Offered
1 hour 18 minutes
Course
Intermediate
Scanning, Enumeration, and Vulnerabilities
This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration…
Certificate of Completion Offered
2 hours 24 minutes
Course
Beginner
Sniffing
This course covers basic sniffing as part of a penetration test. Attackers and penetration ...
Certificate of Completion Offered
1 hour 12 minutes
Course
Beginner
Footprinting and Reconnaissance
This course will cover common tools used during the footprinting and reconnaissance phase of the…
Certificate of Completion Offered
2 hours 37 minutes
Course
Beginner
HIPAA Training
This Free HIPAA Training course is designed to introduce students to the Health Insurance…
Certificate of Completion Offered
2 hours 7 minutes
Course
Intermediate
SQL Injection
This course will cover a brief introduction to databases and SQL commands, basic information about…
Certificate of Completion Offered
1 hour 19 minutes
Course
Intermediate
Penetration Testing and Ethical Hacking
If the idea of hacking as a career excites you, you will benefit greatly from ...
Certificate of Completion Offered
9 hours 52 minutes
Course
Intermediate
Malware Threats
This course covers basic information about malware. Students will learn about things like viruses…
Certificate of Completion Offered
49 minutes
Course
Intermediate
Introduction to IT & Cybersecurity
In this free IT and cybersecurity introduction online course, you will learn about the four ...
Certificate of Completion Offered
4 hours 21 minutes
Course
Beginner
Social Engineering
This course covers basic information about social engineering. We will explore some fake social…
Certificate of Completion Offered
1 hour 1 minute
Course
Intermediate
OWASP
Established in 2001, the Open Web Application Security Project (OWASP) offers free security tools…
Certificate of Completion Offered
4 hours 32 minutes
Course
Beginner
Computer Hacking and Forensics
Love the idea of digital forensics investigation? That is what computer forensics is all about. ...
Certificate of Completion Offered
5 hours 11 minutes
Course
Intermediate
Honeypot Fundamentals
In Honeypot Fundamentals, Ken Underhill covers what honeypots are and what they are used for. ...
Certificate of Completion Offered
5 minutes
Course
Intermediate
Web Defense Fundamentals
In Web Defense Fundamentals, Ken Underhill takes you through the different aspects of Web…
Certificate of Completion Offered
51 minutes
Course
Intermediate
Stealth Techniques for Incident Handlers
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the…
Certificate of Completion Offered
10 minutes
Course
Intermediate
Evasion for Incident Handlers
In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion…
Certificate of Completion Offered
5 minutes
Course
Intermediate
Attacks and Persistence for Incident Handlers
Attacks and Persistence for Incident Handlers covers several different types of attacks, with a…
Certificate of Completion Offered
25 minutes
Course
Intermediate
Scanning and Enumeration with NMAP
In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the ...
Certificate of Completion Offered
28 minutes
Course
Intermediate
Online Reconnaissance
In Online Reconnaissance, Ken Underhill goes over the gathering of data through reconnaissance…
Certificate of Completion Offered
52 minutes
Course
Intermediate
Mobile Security Fundamentals
In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into…
Certificate of Completion Offered
30 minutes
Course
Beginner
Cross-Site Scripting
This course will cover an introduction to Cross-Site Scripting (XSS). Cross-site scripting (XSS) is…
Certificate of Completion Offered
40 minutes
Course
Intermediate
Ethical Hacking Certification Prep
This course is designed to help prepare you for the EC-Council Certified Ethical Hacker (CEH) ...
27 hours
Cybrary Live Series
Intermediate

See More

About Ken Underhill

I am the Master Instructor at Cybrary and a Cybersecurity professional. I have worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.

Join Cybrary's growing community of industry leaders!

The Cybrary Community is an integral part of our organization. Our platform is filled with instructors, industry professionals, mentors, published authors, and much more. By becoming part of the community, you not only have access to these resources, but can also learn and contribute to become the next leader in the industry. Become part of the team today!