Preloader

CEH: Certified Ethical Hacker Training Course v11

Course Description

The Certified Ethical Hacker (CEH) also known as the Certified Network Defense Architect (CNDA) by EC-Council is one of the most respected security certification in the world. Information systems security professionals uses this certifications to show organizations that not only do they understand security concepts but can conduct an actual penetration test. This course will prepare students for the CEH exam within 5 days. Our documented 99% passing rate, has allowed us to train hundreds of students to pass their CEH exam on the first try.

We use a large variety of labs and lectures to ensure students are ready for the exam right after class. This CEH course will immerse students in an interactive environment where they will be shown how to scan, test, hack and secure systems. The lab intensive environment gives each student in-depth knowledge and practical experience needed not only to secure networks but also to hack them.

CEH EXAM
Students must pass one exam, with 125 questions in 240 minutes to become CEH certified. Students can take the certification exam on the last day of the Boot Camp. One exam voucher is included in the course tuition.

CEH COURSE LABS
This course prepares students for the actual certification exam using a series lectures and hands on labs to get students ready for the for the exam and real world. Some of the hands on labs will include conducting footprinting of a network, enumerating systems, finding vulnerabilities, hacking systems, installing malware, sniffing network traffic, conducting social engineering, evading IDS and firewalls, hacking web servers, hacking web applications, hacking wireless networking, hacking mobile phones, hacking the cloud, and using cryptography.

Don’t spend thousands of dollars more for the same or a less quality CEH course. We are an EC-Council Accredited training center and all courses, materials, and instructor are EC-Council authorized.

Tuition

$2,899.00

$2,499.00

    No Dates on Schedule

TIA

Class Features

List

99% Documented Exam Pass Rate

Based on a monthly survey of our enrolled students, who were able to pass after attending our course.

List

First Day Policy

If after the first class you are not happy with our instructor or training environment, let us know on the first day and we will issue a full refund of the course tuition.

List

Unlimited Retakes for One Year

You can retake the course as many times as needed, completely free.

List

Corporate & Government Training Available

Reduced pricing & customized training available for companies and government agencies.

List

Full Money-Back Guarantee

If you cannot pass the CEH exam after 2 retakes we will refund the full course tuition. Must take the exams within 6 months from your first class completion

List

CEH Certified and Licensed Instructors

Our CEH certified and licensed instructors will ensure students only get the best in training. Our instructors have taught thousands of classes is the last 15 years.

What does the CEH certification exam prep course include?

  • Small class sizes. This will allow for great personal training with the instructor.
  • 100% Money Back Guarantee
  • EC-Council Authorized Training Course
  • EC-Council Authorized Courseware
  • EC-Council Certified Instructor
  • Onsite Testing Center
  • 5-day course includes a mock exam, which allows students to know their weak and strong points.
  • Take the official CEH exam on the last day of the course.
  • Our training material is always updated to match the latest exam objectives.
  • We have great instructors. Our CEH Certified Instructors all have over 15 years of experience.
  • This is not a lecture only class, we conduct over 100 hands on hacking labs.
  • As many free course retake as you need, for up to one year.
  • Affordable cost. Some places charge more than double for less quality training.
  • Our course was developed by known industry experts
FAQ : Frequently Asked Questions

Yes this course is has many labs at the end of each lessons, such as SQL injections, web scanning, and system hacking.

Yes, we are an EC-Council Accredited Training Center. All course materials are EC-Council authorized.

Yes you could. If you sign up for a classroom course you can attend a few days Online. Also if you sign up for an Online course you can attend a few days in the classroom.

We only hire the best instructors. Our instructors for CEH must have a minimum of 10 years of experience in the security industry and at least 5 years of teaching experience. Call us if you would like to speak to the instructor who will be teaching your class.

Yes, this course includes all books and 1 exam voucher. We are an authorized testing center. When you are finish with the course you can schedule the exam with us.

Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rates, and guarantee. The Technical Institute of America offers the lowest price, has one of the best passing rates, and an excellent guarantee. As a New York State licensed school and Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer the dual money back guarantee.

No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.

Yes! We offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class. E.g. if you miss a Saturday class, attend the following week evening course to make it up.

Students will start by learning how perimeter defenses work before progressing to scanning and attacking their own networks—without harming any real systems. They will then explore how intruders escalate privileges and the steps required to secure a system. The course also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. By the end of this intensive five-day program, students will have gained practical experience and a comprehensive understanding of Ethical Hacking.

Course Outline

Information Security OverviewInformation Security Threats and Attack VectorsHacking ConceptsEthical Hacking ConceptsInformation Security ControlsIncident Management ProcessResponsibilities of an Incident Response Team.Information Security Laws and Standards

Footprinting ConceptsFootprinting through Search EnginesFootprinting through Web ServicesFootprinting through Social Networking SitesWebsite FootprintingEmail FootprintingCompetitive IntelligenceWhois FootprintingDNS FootprintingNetwork FootprintingFootprinting through Social EngineeringFootprinting ToolsFootprinting Pen Testing

Network Scanning ConceptsScanning ToolsScanning TechniquesScanning Beyond IDS and FirewallBanner GrabbingDraw Network DiagramsNetwork Discovery Tools for MobileScanning Pen Testing

Enumeration ConceptsNetBIOS EnumerationSNMP EnumerationLDAP EnumerationNTP EnumerationSMTP and DNS EnumerationOther Enumeration TechniquesEnumeration CountermeasuresEnumeration Pen Testing

Vulnerability Assessment ConceptsVulnerability Assessment SolutionsVulnerability Scoring SystemsVulnerability Assessment ToolsVulnerability Assessment Reports

System Hacking ConceptsCracking PasswordsPassword Recovery ToolsMicrosoft AuthenticationHow Hash Passwords Are Stored in Windows SAM?NTLM Authentication ProcessKerberos AuthenticationPassword SaltingTools to Extract the Password HashesPassword Cracking ToolsHow to Defend against Password CrackingHow to Defend against LLMNR/NBT-NS PoisoningEscalating PrivilegesHiding FilesWhat is Steganography?Covering TracksPenetration Testing

Malware ConceptsTrojan ConceptsVirus and Worm ConceptsMalware AnalysisCountermeasuresAnti-Malware SoftwareMalware Penetration Testing

Sniffing ConceptsSniffing Technique: MAC AttacksSniffing Technique: DHCP AttacksSniffing Technique: ARP PoisoningSniffing Technique: Spoofing AttacksSniffing Technique: DNS PoisoningSniffing ToolsCountermeasuresSniffing Detection TechniquesSniffing Pen Testing

Social Engineering ConceptsSocial Engineering TechniquesInsider ThreatsImpersonation on Social Networking SitesIdentity TheftCountermeasuresSocial Engineering Pen Testing

DoS/DDoS ConceptsDoS/DDoS Attack TechniquesBotnetsDDoS Case StudyDoS/DDoS Attack ToolsCountermeasuresDoS/DDoS Protection ToolsDoS/DDoS Penetration Testing

Session Hijacking ConceptsApplication Level Session HijackingNetwork Level Session HijackingSession Hijacking ToolsCountermeasuresPenetration Testing

IDS, Firewall and Honeypot ConceptsIDS, Firewall and Honeypot SolutionsEvading IDSEvading FirewallsIDS/Firewall Evading ToolsDetecting HoneypotsIDS/Firewall Evasion CountermeasuresPenetration Testing

Web Server ConceptsWeb Server AttacksWeb Server Attack MethodologyWeb Server Attack ToolsCountermeasuresPatch ManagementWeb Server Security ToolsWeb Server Pen Testing

Web App ConceptsWeb App ThreatsHacking MethodologyWeb App Hacking ToolsCountermeasuresWeb App Security Testing ToolsWeb App Pen Testing

SQL Injection ConceptsTypes of SQL InjectionSQL Injection MethodologySQL Injection ToolsEvasion TechniquesCountermeasures

Wireless ConceptsWireless EncryptionWireless ThreatsWireless Hacking MethodologyWireless Hacking ToolsBluetooth HackingCountermeasuresWireless Security ToolsWireless Pen Testing

Mobile Platform Attack VectorsHacking Android OSHacking iOSMobile SpywareMobile Device ManagementMobile Security Guidelines and ToolsMobile Pen Testing

IoT ConceptsIoT AttacksIoT Hacking MethodologyIoT Hacking ToolsCountermeasuresIoT Pen Testing

Cloud Computing ConceptsCloud Computing ThreatsCloud Computing AttacksCloud SecurityCloud Security ToolsCloud Penetration Testing

Cryptography ConceptsEncryption AlgorithmsCryptography ToolsPublic Key Infrastructure (PKI)Email EncryptionDisk EncryptionCryptanalysis

contact info

Connect with us

PMP, CAPM, PMI-ACP, PgMP, PMI-RMP, PMI-SP, PMBOK, Project Management Professional, Certified Associate in Project Management (CAPM), Project Management Professional (PMP), PMI Agile Certified Practitioner (PMI-ACP), Program Management Professional (PgMP), PMI Risk Management Professional (PMI-RMP), PMI Scheduling Professional (PMI-SP), A Guide to the Project Management Body of Knowledge (PMBOK Guide), The PMI REP Logo are registered marks of the Project Management Institute, Inc.
ITIL® is a registered trademark of the PeopleCert group. Used under licence from PeopleCert. All rights reserved.
CISSP® and CCSP® are registered trademarks of (ISC)², Inc. TIA is not accredited by (ISC)² but the course is officially licensed by NYS Education Department.​

© 2025 I All Rights Reserved