Profile Image

Ken Underhill

Master Instructor
Master Instructor at Cybrary

I am the Master Instructor at Cybrary and a Cybersecurity professional. I hold both the CEH (Certified Ethical Hacker) and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams.

See More

Ken Underhill 's Courses

Cover Img
Scanning, Enumeration, and Vulnerabilities
This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration…
Certificate of Completion Offered
Course
Beginner
Cover Img
VPC Fundamentals
The Amazon Virtual Private Cloud (VPC) Fundamentals training course briefly covers the background of…
Certificate of Completion Offered
Course
Beginner
Cover Img
OWASP
Established in 2001, the Open Web Application Security Project (OWASP) offers free security tools…
Certificate of Completion Offered
Course
Beginner
Cover Img
Penetration Testing and Ethical Hacking
If the idea of hacking as a career excites you, you will benefit greatly from ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
Social Engineering
This course covers basic information about social engineering. We will explore some fake social…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Creating S3 Buckets
Amazon Simple Storage Service (S3) is a storage service for objects that offers scalability…
Certificate of Completion Offered
Course
Beginner
Cover Img
Web Defense Fundamentals
In this course, you will learn the fundamentals of Web Defense and Web Application security, ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
Fortinet FortiWeb Cloud WAF-as-a-Service
This course will cover a brief overview of the Fortinet FortiWeb Cloud WAF-as-a-Service. Learners…
Certificate of Completion Offered
Course
Intermediate
Cover Img
EC2 Fundamentals
AWS EC2 offers businesses and organizations an agile way to scale up their services, have ...
Certificate of Completion Offered
Course
Beginner
Cover Img
SQL Injection
This course will cover a brief introduction to databases and SQL commands, basic information about…
Certificate of Completion Offered
Course
Intermediate
Cover Img
AWS Terminology
This course covers basic terminology from the AWS Cloud. Students will learn about VPC, ...
Certificate of Completion Offered
Course
Beginner
Cover Img
Cross-Site Scripting
This course will cover an introduction to Cross-Site Scripting (XSS). Cross-site scripting (XSS) is…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Computer Hacking and Forensics
Love the idea of digital forensics investigation? That is what computer forensics is all about. ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
Mobile Security Fundamentals
In Mobile Security Fundamentals, Ken Underhill discusses IOS security architecture and goes into…
Certificate of Completion Offered
Course
Beginner
Cover Img
Online Reconnaissance
In Online Reconnaissance, Ken Underhill goes over the gathering of data through reconnaissance…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Scanning and Enumeration with NMAP
In Scanning and Enumeration with NMAP, Ken Underhill gives an overview of scanning and the ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
Attacks and Persistence for Incident Handlers
Attacks and Persistence for Incident Handlers covers several different types of attacks, with a…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Evasion for Incident Handlers
In Evasion for Incident Handlers, Ken Underhill gives a high-level overview of the various evasion…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Stealth Techniques for Incident Handlers
In Stealth Techniques for Incident Handlers, Cybrary Master Instructor Ken Underhill discusses the…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Honeypot Fundamentals
In Honeypot Fundamentals, Ken Underhill covers what honeypots are and what they are used for. ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
Introduction to IT & Cybersecurity
In this free IT and cybersecurity introduction online course, you will learn about the four ...
Certificate of Completion Offered
Course
Beginner
Cover Img
HIPAA Training
This Free HIPAA Training course is designed to introduce students to the Health Insurance…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Footprinting and Reconnaissance
This course will cover common tools used during the footprinting and reconnaissance phase of the…
Certificate of Completion Offered
Course
Beginner
Cover Img
Session Hijacking
This course covers session hijacking, which is where an attacker takes over a legitimately…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Sniffing
This course covers basic sniffing as part of a penetration test. Attackers and penetration ...
Certificate of Completion Offered
Course
Beginner
Cover Img
Malware Threats
This course covers basic information about malware. Students will learn about things like viruses…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Ethical Hacking Certification Prep
This course is designed to help prepare you for the EC-Council Certified Ethical Hacker (CEH) ...
27 hours
Cybrary Live Series
Intermediate

See More

About Ken Underhill

I am the Master Instructor at Cybrary and a Cybersecurity professional. I have worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.

Join Cybrary's growing community of industry leaders!

The Cybrary Community is an integral part of our organization. Our platform is filled with instructors, industry professionals, mentors, published authors, and much more. By becoming part of the community, you not only have access to these resources, but can also learn and contribute to become the next leader in the industry. Become part of the team today!