CEH: Certified Ethical Hacker Training Course v11

Course Description
The Certified Ethical Hacker (CEH) also known as the Certified Network Defense Architect (CNDA) by EC-Council is one of the most respected security certification in the world. Information systems security professionals uses this certifications to show organizations that not only do they understand security concepts but can conduct an actual penetration test. This course will prepare students for the CEH exam within 5 days. Our documented 99% passing rate, has allowed us to train hundreds of students to pass their CEH exam on the first try.
We use a large variety of labs and lectures to ensure students are ready for the exam right after class. This CEH course will immerse students in an interactive environment where they will be shown how to scan, test, hack and secure systems. The lab intensive environment gives each student in-depth knowledge and practical experience needed not only to secure networks but also to hack them.
CEH EXAM
Students must pass one exam, with 125 questions in 240 minutes to become CEH certified. Students can take the certification exam on the last day of the Boot Camp. One exam voucher is included in the course tuition.
CEH COURSE LABS
This course prepares students for the actual certification exam using a series lectures and hands on labs to get students ready for the for the exam and real world. Some of the hands on labs will include conducting footprinting of a network, enumerating systems, finding vulnerabilities, hacking systems, installing malware, sniffing network traffic, conducting social engineering, evading IDS and firewalls, hacking web servers, hacking web applications, hacking wireless networking, hacking mobile phones, hacking the cloud, and using cryptography.
Don’t spend thousands of dollars more for the same or a less quality CEH course. We are an EC-Council Accredited training center and all courses, materials, and instructor are EC-Council authorized.
Tuition
$2,899.00
$2,499.00
No Dates on Schedule
Inquire about the
Class Details
Please Fill out the form below.
Someone will contact you within the next business day.
What does the CEH certification exam prep course include?
- Small class sizes. This will allow for great personal training with the instructor.
- 100% Money Back Guarantee
- EC-Council Authorized Training Course
- EC-Council Authorized Courseware
- EC-Council Certified Instructor
- Onsite Testing Center
- 5-day course includes a mock exam, which allows students to know their weak and strong points.
- Take the official CEH exam on the last day of the course.
- Our training material is always updated to match the latest exam objectives.
- We have great instructors. Our CEH Certified Instructors all have over 15 years of experience.
- This is not a lecture only class, we conduct over 100 hands on hacking labs.
- As many free course retake as you need, for up to one year.
- Affordable cost. Some places charge more than double for less quality training.
- Our course was developed by known industry experts
FAQ : Frequently Asked Questions
Yes this course is has many labs at the end of each lessons, such as SQL injections, web scanning, and system hacking.
Yes, we are an EC-Council Accredited Training Center. All course materials are EC-Council authorized.
Yes you could. If you sign up for a classroom course you can attend a few days Online. Also if you sign up for an Online course you can attend a few days in the classroom.
We only hire the best instructors. Our instructors for CEH must have a minimum of 10 years of experience in the security industry and at least 5 years of teaching experience. Call us if you would like to speak to the instructor who will be teaching your class.
Yes, this course includes all books and 1 exam voucher. We are an authorized testing center. When you are finish with the course you can schedule the exam with us.
Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rates, and guarantee. The Technical Institute of America offers the lowest price, has one of the best passing rates, and an excellent guarantee. As a New York State licensed school and Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer the dual money back guarantee.
No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.
Yes! We offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class. E.g. if you miss a Saturday class, attend the following week evening course to make it up.
Students will start by learning how perimeter defenses work before progressing to scanning and attacking their own networks—without harming any real systems. They will then explore how intruders escalate privileges and the steps required to secure a system. The course also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. By the end of this intensive five-day program, students will have gained practical experience and a comprehensive understanding of Ethical Hacking.
Course Outline
Information Security OverviewInformation Security Threats and Attack VectorsHacking ConceptsEthical Hacking ConceptsInformation Security ControlsIncident Management ProcessResponsibilities of an Incident Response Team.Information Security Laws and Standards
Footprinting ConceptsFootprinting through Search EnginesFootprinting through Web ServicesFootprinting through Social Networking SitesWebsite FootprintingEmail FootprintingCompetitive IntelligenceWhois FootprintingDNS FootprintingNetwork FootprintingFootprinting through Social EngineeringFootprinting ToolsFootprinting Pen Testing
Network Scanning ConceptsScanning ToolsScanning TechniquesScanning Beyond IDS and FirewallBanner GrabbingDraw Network DiagramsNetwork Discovery Tools for MobileScanning Pen Testing
Enumeration ConceptsNetBIOS EnumerationSNMP EnumerationLDAP EnumerationNTP EnumerationSMTP and DNS EnumerationOther Enumeration TechniquesEnumeration CountermeasuresEnumeration Pen Testing
Vulnerability Assessment ConceptsVulnerability Assessment SolutionsVulnerability Scoring SystemsVulnerability Assessment ToolsVulnerability Assessment Reports
System Hacking ConceptsCracking PasswordsPassword Recovery ToolsMicrosoft AuthenticationHow Hash Passwords Are Stored in Windows SAM?NTLM Authentication ProcessKerberos AuthenticationPassword SaltingTools to Extract the Password HashesPassword Cracking ToolsHow to Defend against Password CrackingHow to Defend against LLMNR/NBT-NS PoisoningEscalating PrivilegesHiding FilesWhat is Steganography?Covering TracksPenetration Testing
Malware ConceptsTrojan ConceptsVirus and Worm ConceptsMalware AnalysisCountermeasuresAnti-Malware SoftwareMalware Penetration Testing
Sniffing ConceptsSniffing Technique: MAC AttacksSniffing Technique: DHCP AttacksSniffing Technique: ARP PoisoningSniffing Technique: Spoofing AttacksSniffing Technique: DNS PoisoningSniffing ToolsCountermeasuresSniffing Detection TechniquesSniffing Pen Testing
Social Engineering ConceptsSocial Engineering TechniquesInsider ThreatsImpersonation on Social Networking SitesIdentity TheftCountermeasuresSocial Engineering Pen Testing
DoS/DDoS ConceptsDoS/DDoS Attack TechniquesBotnetsDDoS Case StudyDoS/DDoS Attack ToolsCountermeasuresDoS/DDoS Protection ToolsDoS/DDoS Penetration Testing
Session Hijacking ConceptsApplication Level Session HijackingNetwork Level Session HijackingSession Hijacking ToolsCountermeasuresPenetration Testing
IDS, Firewall and Honeypot ConceptsIDS, Firewall and Honeypot SolutionsEvading IDSEvading FirewallsIDS/Firewall Evading ToolsDetecting HoneypotsIDS/Firewall Evasion CountermeasuresPenetration Testing
Web Server ConceptsWeb Server AttacksWeb Server Attack MethodologyWeb Server Attack ToolsCountermeasuresPatch ManagementWeb Server Security ToolsWeb Server Pen Testing
Web App ConceptsWeb App ThreatsHacking MethodologyWeb App Hacking ToolsCountermeasuresWeb App Security Testing ToolsWeb App Pen Testing
SQL Injection ConceptsTypes of SQL InjectionSQL Injection MethodologySQL Injection ToolsEvasion TechniquesCountermeasures
Wireless ConceptsWireless EncryptionWireless ThreatsWireless Hacking MethodologyWireless Hacking ToolsBluetooth HackingCountermeasuresWireless Security ToolsWireless Pen Testing
Mobile Platform Attack VectorsHacking Android OSHacking iOSMobile SpywareMobile Device ManagementMobile Security Guidelines and ToolsMobile Pen Testing
IoT ConceptsIoT AttacksIoT Hacking MethodologyIoT Hacking ToolsCountermeasuresIoT Pen Testing
Cloud Computing ConceptsCloud Computing ThreatsCloud Computing AttacksCloud SecurityCloud Security ToolsCloud Penetration Testing
Cryptography ConceptsEncryption AlgorithmsCryptography ToolsPublic Key Infrastructure (PKI)Email EncryptionDisk EncryptionCryptanalysis