Site Logo

Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

CEH Certification Boot Camp

Duration

5 Days

Official EC-Council CEH Exam Prep Boot Camp

Award Winning EC-Council Enterprise Partner

EC-Council CEH Exam Pass Guaranteed

Our Official EC-Council CEH Certification Boot Camp is a comprehensive review of ethical hacking & industry best practices merged with Training Camp’s award-winning comprehensive exam preparation for the CEH exam.

Our CEH Boot Camp represents the culmination of hundreds of hours of instructional design, thousands of hours of exam-focused instruction, and tens of thousands of efficiently and effectively skilled, certified students.

View Public Course Schedule

Our customers understand that developing a well-trained team is a critical investment toward success. We are proud to offer a wide range of courses aimed at getting our customers skilled, certified, and back to work fast.

Learn More

Team Training

Our enterprise solutions specialists will create a package of training that fits your organization’s specific training needs. We can accommodate group training packages for as few as five to as many as thousands of team members spread across the globe.

Learn More

Our CEH courseware keeps immediate pace with advancements in exam content by incorporating feedback from our thousands of CEH certified alumni students. They are reviewed every 30 days to ensure all information reflects the most current updates. Relying on traditional books or externally sourced materials do not offer this advantage.

Number of Questions: Maximum of 125 questions
Type of Questions: Multiple choice and lab-based
Length of Test: 4 hours
Passing Score: 70%
Recommended Experience: Two years of experience in IT security

Our CEH instructors are well-versed in accelerated learning concepts and exam preparation. During our CEH boot camp, the experience of working with thousands of exam takers give our team unique insight into the learning requirements needed for success.

Our accelerated EC-Council CEH training includes next-gen educational content covered in value-added evening review sessions with updated practice exam review drills – representative of the actual exam and lab sim questions delivered during the official EC-Council CEH certification exams.

Upon completion of the course, students are offered to attend (as many times as desired) our ongoing live, online full-day exam preparation review sessions prior to taking the examination. We are so confident in our course, we offer the industry’s best guarantee.

Our exam support team will help you get ready for your CEH certification training. From exam registration, to understanding all the steps needed for certification, they will answer any questions you make have to make sure you are building momentum towards CEH certification success.

It is very important to stay up to date in this industry. CEUs are required to keep your certifications current. If you want to maintain your professional certified status, we are here to help keep your certifications current.

Back to Tabs

Introduction to Ethical Hacking

  • Information security overview
  • Information security threats and attack vectors
  • Hacking concepts
  • Ethical hacking concepts
  • Information Security Controls
  • Penetration testing concepts
  • Information security laws and standards

Footprinting and Reconnaissance

  • Footprinting concepts
  • Footprinting through search engines
  • Footprinting through web services
  • Footprinting through social networking sites
  • Website footprinting
  • Email footprinting
  • Competitive Intelligence
  • WHOIS Footprinting
  • DNS footprinting
  • Network footprinting
  • Footprinting through social engineering
  • Footprinting tools
  • Countermeasures
  • Footprinting pen testing

Scanning Networks

  • Network scanning concepts
  • Scanning tools
  • Scanning techniques
  • Scanning beyond IDS and firewall
  • Banner grabbing
  • Draw network diagrams
  • Scanning pen test

Enumeration

  • Enumeration concepts
  • NetBIOS enumeration
  • SNMP enumeration
  • LDAP enumeration
  • NTP enumeration SMTP and DNS enumeration
  • Other enumeration techniques
  • Enumeration countermeasures
  • Enumeration pen testing

Vulnerability Analysis

  • Vulnerability assessment concepts
  • Vulnerability assessment solutions
  • Vulnerability scoring systems
  • Vulnerability assessment tools
  • Vulnerability assessment reports

System Hacking

  • System hacking concepts
  • Cracking passwords
  • Escalating privileges
  • Executing applications
  • Hiding files
  • Covering tracks
  • Penetration testing

Malware Threats

  • Malware concepts
  • Trojan concepts
  • Virus and worm concepts
  • Malware analysis
  • Countermeasures
  • Anti-malware software
  • Malware penetration testing

Sniffing

  • Sniffing concepts
  • Sniffing techniques: MAC attacks
  • Sniffing techniques: DHCP attacks
  • Sniffing techniques: ARP Poisoning
  • Sniffing techniques: Spoofing attacks
  • Sniffing techniques: DNS poisoning
  • Sniffing tools
  • Countermeasures
  • Sniffing detection techniques
  • Sniffing pen testing

Social Engineering

  • Social engineering concepts
  • Social engineering techniques
  • Insider threats
  • Impersonation on social networking sites
  • Identity theft
  • Countermeasures
  • Social engineering pen testing

Denial of Service

  • DoS/DDos Concepts
  • DoS/DDoS attack techniques
  • Botnets
  • DDoS case study
  • DoS/DDoS attack tools
  • Countermeasures
  • DoS/DDos protection tools
  • DoS/DDoS penetration testing

Session Hijacking

  • Session hijacking concepts
  • Application level session hijacking
  • Network level session hijacking
  • Session hijacking tools
  • Countermeasures
  • Penetration testing

Evading IDS, Firewalls, and Honeypots

  • IDS, firewall and honeypot concepts
  • IDS, firewall and honeypot solutions
  • Evading IDS
  • Evading firewalls
  • IDS/firewall evading tools
  • Detecting honeypots
  • IDS/Firewall evasion countermeasures
  • Penetration testing

Hacking Webservers

  • Web server operations
  • Web server attacks
  • Web server  attack methodology
  • Web server attack tools
  • Countermeasures
  • Patch management
  • Web server security tools
  • Web server pen testing

Hacking Web Applications

  • Web app concepts
  • Web app threats
  • Hacking methodology
  • Web app hacking tools
  • Countermeasures
  • Web app security testing tools
  • Web app pen testing

SQL Injection

  • SQL injection concepts
  • Types of SQL injection
  • SQL injection methodology
  • SQL injection tools
  • Evasion techniques
  • Countermeasures

Hacking Wireless Networks

  • Wireless concepts
  • Wireless encryption
  • Wireless threats
  • Wireless hacking methodology
  • Wireless hacking tools
  • Bluetooth hacking
  • Countermeasures
  • Wireless security tools
  • Wireless pen testing

Hacking Mobile Platforms

  • Mobile platform attack vectors
  • Hacking Android OS
  • Hakcing iOS
  • Mobile spyware
  • Mobile device management
  • Mobile security guidelines and tools
  • Mobile pen testing

IoT and OT Hacking

  • IoT and OT concepts
  • IoT and OT attacks
  • IoT  and OT hacking methodology
  • IoT and OT hacking tools
  • Countermeasures
  • IoT  and OT pen testing

Cloud Computing

  • Cloud computing concepts
  • Cloud computing threats
  • Cloud computing attacks
  • Cloud security
  • Cloud security tools
  • Cloud penetration testing

Cryptography

  • Cryptography concepts
  • Encryption algorithms
  • Cryptography tools
  • Public key infrastructure (PKI)
  • Email encryption
  • Disk encryption
  • Cryptanalysis Countermeasures
  • CEH Exam Structure
  • Exam Registration Process
  • Time Management
  • Topics and Concepts
  • CEH Certification Question Structure
  • Vendor Interpretation Techniques
Back to Tabs

Course Features

Schedule Course Now

EC-Council CEH Exam Experts

Award Winning EC-Council CEH Courseware

CEH Lab/Exam Prep Review Sessions

certificate small

CEH Exam Pass Guarantee

GI Bill Approved for 100% of Fees

98% Student Satisfaction Rate

Take Official EC-Council CEH Exam Though Us

Hands-On CEH Labs

What Others Are Saying

Jeffrey Sage

EC-Council

Training Camp is one of the most reputable institutions for certifications in Cyber Security.

Amanda Carter

AECOM

The Certified Ethical Hacker training program provided by Training Camp was very enjoyable, useful and extremely worthwhile. for our team.

Jason Witty

I would highly recommend the Training Camp CEH experience.

Edward K

VISA

The certified ethical hacker solution provided made a real difference for our team success. Top-notch support from start to finish.

Nate Rocha

US Govt

Took CISSP and CEH with Training Camp and I owe part of my success to their course and instructor expertise.

Jackie Johnson

US Army

I enjoyed the interaction that the trainer produced through the various Ethical Hacking lab tool activities.

business people
business people

Group CEH Training

Are several of your team members interested in CEH certification? Would you like them to attend training at your location or via a private virtual training course? Our enterprise solutions specialists will create a package of training that fits your organization’s specific training needs. We can accommodate group training packages for as few as five to as many as thousands of team members spread across the globe.

Learn More

Featured on

Let’s Get Started, Together

Get skilled, get certified. We offer a wide range of solutions trusted by thousands of organizations. Fill out a contact form and one of our Enterprise Solutions experts will contact you to discuss the best training solutions for your team. You can also e-mail our team directly at: [email protected]

Get Pricing & Schedule