Shopping Cart  [0]

Call 800.698.5501

EC-Council - Certified Ethical Hacker CEH Boot Camp

ceh Certification Training
TrainingCamp Twitter Feed

CEH v9 Boot Camp

Our EC-Council Certified Ethical Hacker v9 Boot Camp will help you master ethical hacking methodology that can be used in any penetration testing or ethical hacking situation.

During this course you will take the following Official EC-Council exam onsite during the class:

312-50 Certified Ethical Hacker
4-hour/125/Question/Multiple Choice

As you prepare for the CEH certification exam, you will master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. Our EC-Council Master instructors will immerse you into the hacker mindset so that you will be ready to defend against future attacks.

In addition to our public course schedule, we can also offer Private Group Training with the Official EC-Council CEH exam hosted at your office or any location in the world.

Enrollment Information

CEH Training Pricing View Pricing
CEH Certification Schedule Course Schedule


Duration: 5 days
Exam Voucher: Included
Testing: Delivered On-Site
GI Bill Eligible: ≤ 100% of Fees
GSA Catalog: GS-02F-0044T
CEHv9 Certification Training

Official EC-Council Training Includes:
  • Official CEH v9 Courseware
  • Official CEH Exam Voucher ($950 Value)
  • 2200 Hacking Tools
  • 140+ Real Time Labs

  • Training Camp Exclusive Add-ons:
  • Onsite Exam via PearsonVue
  • Evening Review + Practice Exam
  • Exam Prep Study Guide
  • Pre-Exam Review Session

  • Post 9/11 G.I. Bill
    Your G.I. Bill benefits may cover up to 100% of costs for our CEH boot camp & exam costs.

    NICE Framework
    CEH v9 maps to National Initiative for Cybersecurity Education (NICE) framework speciality area category Protect and Defend.

    DoD/Military Discounts
    We offer expanded pricing options for for Government & Military personnel.

    Ceh ethical hacking lab

    Interactive Ethical Hacking Lab Environment

    In 18 comprehensive modules, this course covers over 270 attack technologies, commonly used by hackers. In our CEH training environment you will learn the concepts of ethical hacking from the in-depth knowledge reviews, followed by practical hands-on experience with current, essential security systems.

    ceh Instructors

    EC-Council Certified Expert Instructors

    Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

    ceh Exam Practice Tests

    Exam Prep Evening Review & CEH Practice Exams

    Our CEH certification program includes value-added evening review sessions & constantly updated practice exam review drills - representative of the actual exam questions delivered during the official CEH certification exam.

    ceh Exam

    Hosted Official CEH Exam (312-50)

    We host the official CEH Certification exam during the class on day 5 for our students. Because the examinations are delivered as part of the class, our students leave certified, guaranteed.

    CEH exam path

    What is a Certified Ethical Hacker?

    A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

    Is CEH the right course for me?

    The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This Certified Ethical Hacker boot camp is designed for professinals with a minimum of two years of IT security related experience.

    What is Ethical Hacking?

    Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.

    How do I get EC-Council CEH certified?

    In order to be eligible to attempt the EC-Council CEH exam, candidate can attend an official instructor-led training course with vendor provided exam voucher, or they can submit for exam approval directly to EC-Council. This eligibility process has a non-refundable application fee of USD 100.00, and requires purchasing exam voucher at $950 per attempt.

    What tools will I use in the CEH boot camp?

    Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. You will be provided with over 2200 commonly used hacking tools to immerse you into the hacker world.Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.

    What is next after CEH?

    Your next level is to earn ECSA, which we also offer: EC-Council Certified Security Analyst Boot Camp

    Certified Ethical Hacking CEH v9 Course Outline

    CEH Training Module 1: Introduction to Ethical Hacking

    Information security overview
    Skills of an ethical hacker
    HAcking concepts and phases
    Types of attacks
    Information security threats, attack vectors, and controls
    Information Security LAws and Standards
    Security Policies: types, HR/legal implicantions
    Physical security
    Threat modeling
    Enterprise Information Security Architecture (EISA)
    Network Security Zoning

    CEH Training Module 2: Footprinting and Reconnaissance

    Footprinting concepts, threats, attack vectors, and controls
    Footprinting through Search Engines
    Footprinting through Social Networking sites
    Website footprinting
    Competitive Intelligence
    WHOIS Footprinting
    Footprinting tools

    CEH Training Module 3: Scanning Networks

    Scanning methodology, techniques and counter-measures
    Techniques for IDS evasion, scanning, HTTP tunneling, and IP spoofing
    Drawing network diagrams - latest network discovery and mapping tools, network discovery tools for mobile
    Proxy chaining - latest proxy tools, proxy tools for mobile

    CEH Training Module 4: Enumeration

    Protocols: NetBios, SNMP, LDAP, NTP, SMTP, DNS

    CEH Training Module 5: System Hacking

    Cracking passwords, escalating provoleges, executing applications, hiding files and covering tracks
    Steganography - application and classification, tools, methods/attacks on steganography, steganography detection tools

    CEH Training Module 6: Malware Threats

    Introduction to malware
    Trojans--attacks, how to infect a system, crypters, how to deploy, latest types, analysis, countermeasures
    Viruses--stages, types, latest virus maker, analysis, countermeasures
    Worms--types, makers, analysis, countermeasures
    Malware analysis
    Antivirus tools
    Penetration testing

    CEH Training Module 7: Sniffing

    Attacks: MAC, DHCP, and spoofing
    Poisoning: ARP and DNS
    Concepts, techniques, impersonation, identity theft, and countermeasures
    Phases of an attack
    Common targets of an attack
    Impersonation scenario
    Computer based, mobile based, social networking based

    CEH Training Module 8: Social Engineering

    Concepts, techniques, impersonation, identity theft, and countermeasures
    Phases of an attack
    Common targets of an attack
    Impersonation scenario
    Computer based, mobile based, social networking based

    CEH Training Module 9: Denial of Service

    Concepts, case study, tools, attack techniques, and countermeasures
    Scanning methods for vulnerable machines
    Detection Techniques and tools

    CEH Training Module 10: Session Hijacking

    Concepts, case study, tools, attack techniques, and countermeasures
    Five stages of a web malware attack
    Application level session hijacking
    Network level session hijacking
    TCP/IP Hijacking

    CEH Training Module 11: Hacking Webservers

    Webserver market shares
    Web servers
    Web server security issues
    Webserver attacks, attack methodology, attack tools, and countermeasures
    Patch management
    Webserver security tools
    Webserver pen testing

    CEH Training Module 12: Hacking Web Applications

    Web application threats
    Concepts, hacking methodology, tools, and countermeasures
    Analyze web applications
    Web application pen testing

    CEH Training Module 13: SQL Injection

    Concepts methodologies, types of SQL injection
    Evasion techniques and tools
    Information gathering

    CEH Training Module 14: Hacking Wireless Networks

    Concepts, encryption, threats, Bluetooth hacking methodology, and countermeasures
    Wireless security tools and hacking tools

    CEH Training Module 15: Hacking Mobile Platforms

    Android OS, IOS,Windows Phone OS, Blackberry
    Mobile device management, security guidelines and tools
    OWASP Mobile Top 10 Risks
    Latest Sniffers
    Latest Jailbreaking tools
    Mobile spyware
    Bring Your Own Device (BYOD)
    Mobile Anti-spyware

    CEH Training Module 16: Evading IDS, Firewalls, and Honeypots

    Concepts and countermeasures
    Honeypots, firewalls, IDS for mobile
    Evading IDS, firewalls
    Detecting honeypots

    CEH Training Module 17: Cloud Computing

    Concepts, methodologies, examples, detection, and countermeasures
    Separation of responsibilities
    Threats and attacks
    Cloud security control layers
    Cloud penetration testing

    CEH Training Module 18: Cryptography

    Concepts, encryption algorithms, email encryption, disk encryption, and attacks
    Public key infrastructure (PKI)
    Cryptanalysis and cryptography tools
    Hash calculators for Mobile

    CEH Certification CEH Exam Review

    Training Camp Value-Add Exam Review
    Official CEH Certification Exam (Onsite)

    Certified Ethical Hacker CEHv9 Course Schedule/Pricing

    Click here to view our Certified Ethical Hacker CEHv9 course schedule and receive an instant price quote.