• duration
    5 days
  • Official EC-Council CEH v10
    Exam Prep Boot Camp
  • EC-Council CEH
    Partner Of the Year
  • CEH Exam Pass
    Guaranteed
  • Take Official CEH
    Exam Through US

Learn how to become a Certified Ethical Hacker (CEH v10)

CEH v10 Certification Boot Camp

Our 5-day EC-Council Certified Ethical Hacker Certification Boot Camp covers how to work with a variety of systems to find out where their weaknesses or vulnerabilities may be, and how you can identify and reinforce these gaps to prevent successful hacking attempts.

Ethical hacking is where an IT professional uses the same hacking techniques as malicious hackers to protect and prevent a company’s systems from falling into the hands of criminals. Put simply, the statement at the core of CEH is; ‘to stop a hacker you need to think like a hacker’. By the end the journey to obtain your CEH with Training Camp, you’ll know what tools do what job, how to use the tools properly and how to conduct an ethical penetration test.

WHY CHOOSE TRAINING CAMP, EC-Council’S PARTNER OF THE YEAR?

We offer your best chance to get certified. Period. Training Camp has been awarded EC-Council Partner of the Year for the last 3 years, a reflection of our continued dedication to delivering excellence and quality across our full range of accelerated EC-Council courses. Since 2001, we have won more awards and certified more CEHs than any other company, worldwide.

CEH is DoD Approved

The CEH Certification is approved under the DoD 8570 Directive for the CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, and CSSP Incident Responder categories.

OFFICIAL EC-Council CEH TRAINING PROVIDER EXCLUSIVE FEATURES

Official EC-Council CEH Courseware
iLab Access (6-Month Access)
CEH Exam Voucher (312-50)
EC-Council CEH Advanced Hacking Tool

CEH TRAINING CAMP EXCLUSIVE FEATURES

CEH Exam Prep Study Guide
EC-Council CEH Exam Review Sessions
CPE/CEU Post Class Package
CEH Exam Pass Guarantee

Optional Add-ons for CEH

CEH Practical Exam Voucher ($550.00)
EC-Council CEH Master Certification Boot Camp

Exams Covered

312-50 Certified Ethical Hacker (ANSI)

Need dedicated CEH v10 training?

Our Certified Ethical Hacker (CEH) course can be delivered to your site or virtually in a private-group setting, customized to meet your organization’s learning objectives. Save up to 40% and your satisfaction is GUARANTEED!

Click to learn more about our group training.

CEH v10 Boot Camp, As Featured On

training features

  • Award Winning CEH Courseware

  • CEH Lab/Exam Prep Review Sessions

  • Take Official CEH Exam Through Us

  • CEH v10 Exam Pass Guarantee

  • CEH is G.I. Bill Eligible For Up To 100% Of Fees

  • Featured on CNN, FOX News, MSNBC, Reuters

  • 98% Student Satisfaction Rate

  • 50 CEU/CPE Hours

EC-Council Training Center of The Year Award Winner (Enterprise)

Training Camp is a leading provider of cybersecurity certifications and has been awarded the EC-Council Training Center of the Year award in North America for the last 3 years. Our program is the most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers.

  • What is Ethical Hacking?

    Ethical hackers (also known as penetration testers) are employed to conduct penetration tests – controlled hacks – on businesses to test systems and find vulnerabilities. Unlike ‘black hat’ hackers, ethical hackers are security professionals able to provide the knowledge and skills needed to fix flaws before they can be exploited. With this knowledge, businesses can fix vulnerabilities and boost their cyber defenses.

  • Certified Ethical Hacker Certification

    Death by Powerpoint? Not at Training Camp. While many of our EC-Council CEH Certification Boot Camps extend beyond the traditional “9 to 5” format, students remain engaged by each day’s mix of lecture, hands-on hacking labs, and CEH exam review sessions. Learn the theory, apply it in a real-world scenario, then translate your knowledge into CEH exam success.

  • What tools will I use in this Authorized CEH course?

    On this accelerated CEH Boot Camp course, you will focus on Kali, Backtrack, Nmap, Hping, Ettercap, Nessus, Maltego, Cain, Metasploit, and W3af tools. Our security experts have also designed more than 140 labs that replicate real-time scenarios and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

  • What are the CEH Certification Requirements?

    EC-Council recommends you have two years’ IT work experience and possess a basic familiarity with Linux or Unix. Training Campo also recommends you possess a strong working knowledge of TCP/IP and Windows Server.

  • CEH is G.I. Bill Eligible For Up To 100% Of Fees

    When you take training with Training Camp, your G.I. Bill benefits may cover up to 100% of the CEH course tuition and CEH exam fees. We can also provide assistance for travel costs.

  • CEH Exam Pass Guarantee

    When you decide to take one of our award-winning Certified Ethical Hacker Certification Boot Camp, you are placing trust in us. If you do not pass the certification exam, you may retake this program live or online and/or enroll in our mentoring program at no additional cost.

CEH Certification Boot Camp Outline

Official EC-Council courseware covers a broad spectrum of topics required for the CEH. Our courses are boosted with Training Camp’s exam prep guide so your course content will always be up-to-date with the most current version of the exam. Our EC-Council Certified Ethical Hacker Certification Boot Camp certificate of completion provides 50 CEUs/CPEs to be used toward renewing relevant certifications.

Module 01: Introduction to Ethical Hacking (CEH v10)

Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Penetration Testing Concepts
Information Security Laws and Standards

Module 02: Footprinting and Reconnaissance (CEH v10)

Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Competitive Intelligence
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Countermeasures
Footprinting Pen Testing

Module 03: Scanning Networks (CEH v10)

Network Scanning Concepts
Scanning Tools
Scanning Techniques
Scanning Beyond IDS and Firewall
Banner Grabbing
Draw Network Diagrams
Scanning Pen Testing

Module 04: Enumeration (CEH v10)

Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Enumeration Pen Testing

Module 05: Vulnerability Analysis (CEH v10)

Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports

Module 06: System Hacking (CEH v10)

System Hacking Concepts
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing

Module 07: Malware Threats (CEH v10)

Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Countermeasures
Anti-Malware Software
Malware Penetration Testing

Module 08: Sniffing (CEH v10)

Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Countermeasures
Sniffing Detection Techniques
Sniffing Pen Testing

Module 09: Social Engineering (CEH v10)

Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures
Social Engineering Pen Testing

Module 10: Denial-of-Service (CEH v10)

DoS/DDoS Concepts
DoS/DDoS Attack Techniques
Botnets
DDoS Case Study
DoS/DDoS Attack Tools
Countermeasures
DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing

Module 11: Session Hijacking (CEH v10)

Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Countermeasures

Module 12: Evading IDS, Firewalls, and Honeypots (CEH v10)

IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot Solutions
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Penetration Testing

Module 13: Hacking Web Servers (CEH v10)

Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Countermeasures
Patch Management
Web Server Security Tools
Web Server Pen Testing

Module 14: Hacking Web Applications (CEH v10)

Web App Concepts
Web App Threats
Hacking Methodology
Web App Hacking Tools
Countermeasures
Web App Security Testing Tools
Web App Pen Testing

Module 15: SQL Injection (CEH v10)

SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
Countermeasures

Module 16: Hacking Wireless Networks (CEH v10)

Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Countermeasures
Wireless Security Tools
Wireless Pen Testing

Module 17: Hacking Mobile Platforms (CEH v10)

Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Spyware
Mobile Device Management
Mobile Security Guidelines and Tools
Mobile Pen Testing

Module 18: IoT Hacking (CEH v10)

IoT Concepts
IoT Attacks
IoT Hacking Methodology
IoT Hacking Tools
Countermeasures
IoT Pen Testing

Module 19: Cloud Computing(CEH v10)

Cloud Computing Concepts
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing

Module 20: Cryptography (CEH v10)

Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Countermeasures

  • View Pricing/Schedule for CEH v10

    Check out dates and locations for our CEH v10 Certification Boot Camp

    See dates
  • PRIVATE GROUP CEH TRAINING

    Find out more information about bringing an event to you.

    More Information
  • Register for CEH v10 Certification Boot Camp

    Enroll now and start your learning adventure

    Start Here

Testimonials

Took CISSP and CEH with Training Camp and I owe part of my success to their course and instructor expertise.
Nate Rocha US Govt
Eric Beasley was an excellent teacher for the CEH bootcamp I attended. I really enjoyed the CEH Bootcamp with him at the Training Camp facility.
Mark Conover Northrop Grumman
Training Camp did a great job from start to end with the training and accommodations for the CEH Class. . I'd highly recommend them for any other certifications anyone is interested in, . I had no issues whatsoever with the entire experience!
Ryan Heiob RCH Technologies
The certified ethical hacker solution provided made a real difference for our team success. Top-notch support from start to finish.
Edward K VISA
I would highly recommend the Training Camp CEH experience.
Jason Witty
I enjoyed the interaction that the trainer produced through the various Ethical Hacking lab tool activities.
Jackie Johnson US Army
The Certified Ethical Hacker training program provided by Training Camp was very enjoyable, useful and extremely worthwhile. for our team.
Amanda Carter AECOM
Training Camp is one of the most reputable institutions for certifications in Cyber Security.
Jeffrey Sage EC-Council
01 08