• duration
    5 days
  • Official EC-Council CEH v10
    Exam Prep Boot Camp
  • EC-Council CEH
    Partner Of the Year
  • CEH Exam Pass
  • Take Official CEH
    Exam Through US

Learn how to become a Certified Ethical Hacker (CEH v10)

CEH v10 Certification Boot Camp

Our 5-day EC-Council Certified Ethical Hacker Certification Boot Camp covers how to work with a variety of systems to find out where their weaknesses or vulnerabilities may be, and how you can identify and reinforce these gaps to prevent successful hacking attempts.

Ethical hacking is where an IT professional uses the same hacking techniques as malicious hackers to protect and prevent a company’s systems from falling into the hands of criminals. Put simply, the statement at the core of CEH is; ‘to stop a hacker you need to think like a hacker’. By the end the journey to obtain your CEH with Training Camp, you’ll know what tools do what job, how to use the tools properly and how to conduct an ethical penetration test.


We offer your best chance to get certified. Period. Training Camp has been awarded EC-Council Partner of the Year for the last 3 years, a reflection of our continued dedication to delivering excellence and quality across our full range of accelerated EC-Council courses. Since 2001, we have won more awards and certified more CEHs than any other company, worldwide.

CEH is DoD Approved

The CEH Certification is approved under the DoD 8570 Directive for the CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, and CSSP Incident Responder categories.


Official EC-Council CEH Courseware
iLab Access (6-Month Access)
CEH Exam Voucher (312-50)
EC-Council CEH Advanced Hacking Tool


CEH Exam Prep Study Guide
EC-Council CEH Exam Review Sessions
CPE/CEU Post Class Package
CEH Exam Pass Guarantee

Optional Add-ons for CEH

CEH Practical Exam Voucher ($550.00)
EC-Council CEH Master Certification Boot Camp

Exams Covered

312-50 Certified Ethical Hacker (ANSI)

Need dedicated CEH v10 training?

Our Certified Ethical Hacker (CEH) course can be delivered to your site or virtually in a private-group setting, customized to meet your organization’s learning objectives. Save up to 40% and your satisfaction is GUARANTEED!

Click to learn more about our group training.

CEH v10 Boot Camp, As Featured On

training features

  • Award Winning CEH Courseware

  • CEH Lab/Exam Prep Review Sessions

  • Take Official CEH Exam Through Us

  • CEH v10 Exam Pass Guarantee

  • CEH is G.I. Bill Eligible For Up To 100% Of Fees

  • Featured on CNN, FOX News, MSNBC, Reuters

  • 98% Student Satisfaction Rate

  • 50 CEU/CPE Hours

EC-Council Training Center of The Year Award Winner (Enterprise)

Training Camp is a leading provider of cybersecurity certifications and has been awarded the EC-Council Training Center of the Year award in North America for the last 3 years. Our program is the most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers.

  • What is Ethical Hacking?

    Ethical hackers (also known as penetration testers) are employed to conduct penetration tests – controlled hacks – on businesses to test systems and find vulnerabilities. Unlike ‘black hat’ hackers, ethical hackers are security professionals able to provide the knowledge and skills needed to fix flaws before they can be exploited. With this knowledge, businesses can fix vulnerabilities and boost their cyber defenses.

  • Certified Ethical Hacker Certification

    Death by Powerpoint? Not at Training Camp. While many of our EC-Council CEH Certification Boot Camps extend beyond the traditional “9 to 5” format, students remain engaged by each day’s mix of lecture, hands-on hacking labs, and CEH exam review sessions. Learn the theory, apply it in a real-world scenario, then translate your knowledge into CEH exam success.

  • What tools will I use in this Authorized CEH course?

    On this accelerated CEH Boot Camp course, you will focus on Kali, Backtrack, Nmap, Hping, Ettercap, Nessus, Maltego, Cain, Metasploit, and W3af tools. Our security experts have also designed more than 140 labs that replicate real-time scenarios and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

  • What are the CEH Certification Requirements?

    EC-Council recommends you have two years’ IT work experience and possess a basic familiarity with Linux or Unix. Training Campo also recommends you possess a strong working knowledge of TCP/IP and Windows Server.

  • CEH is G.I. Bill Eligible For Up To 100% Of Fees

    When you take training with Training Camp, your G.I. Bill benefits may cover up to 100% of the CEH course tuition and CEH exam fees. We can also provide assistance for travel costs.

  • CEH Exam Pass Guarantee

    When you decide to take one of our award-winning Certified Ethical Hacker Certification Boot Camp, you are placing trust in us. If you do not pass the certification exam, you may retake this program live or online and/or enroll in our mentoring program at no additional cost.


  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards


  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Countermeasures
  • Footprinting Pen Testing


  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing


  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing


  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports


  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing


  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing


  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing


  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing


  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing

    • Session Hijacking Concepts
    • Application Level Session Hijacking
    • Network Level Session Hijacking
    • Session Hijacking Tools
    • Countermeasures


    • IDS, Firewall and Honeypot Concepts
    • IDS, Firewall and Honeypot Solutions
    • Evading IDS
    • Evading Firewalls
    • IDS/Firewall Evading Tools
    • Detecting Honeypots
    • IDS/Firewall Evasion Countermeasures
    • Penetration Testing


    • Web Server Concepts
    • Web Server Attacks
    • Web Server Attack Methodology
    • Web Server Attack Tools
    • Countermeasures
    • Patch Management
    • Web Server Security Tools
    • Web Server Pen Testing


    • Web App Concepts
    • Web App Threats
    • Hacking Methodology
    • Web App Hacking Tools
    • Countermeasures
    • Web App Security Testing Tools
    • Web App Pen Testing


    • SQL Injection Concepts
    • Types of SQL Injection
    • SQL Injection Methodology
    • SQL Injection Tools
    • Evasion Techniques
    • Countermeasures


    • Wireless Concepts
    • Wireless Encryption
    • Wireless Threats
    • Wireless Hacking Methodology
    • Wireless Hacking Tools
    • Bluetooth Hacking
    • Countermeasures
    • Wireless Security Tools
    • Wireless Pen Testing


    • Mobile Platform Attack Vectors
    • Hacking Android OS
    • Hacking iOS
    • Mobile Spyware
    • Mobile Device Management
    • Mobile Security Guidelines and Tools
    • Mobile Pen Testing


    • IoT Concepts
    • IoT Attacks
    • IoT Hacking Methodology
    • IoT Hacking Tools
    • Countermeasures
    • IoT Pen Testing


    • Cloud Computing Concepts
    • Cloud Computing Threats
    • Cloud Computing Attacks
    • Cloud Security
    • Cloud Security Tools
    • Cloud Penetration Testing


    • Cryptography Concepts
    • Encryption Algorithms
    • Cryptography Tools
    • Public Key Infrastructure (PKI)
    • Email Encryption
    • Disk Encryption
    • Cryptanalysis
    • Countermeasures

What is the CCISO?

The CCISO is for information security executives trying to be CISOs through improving their skills and learning to align information security programs with business goals and objectives. This program also supports existing CISOs to enhance their technical and management skills, as well as business procedures.

What makes the CCISO different from other certifications?

The CCISO program does not end at the technical features required, but increases to executive management and financial management, both of which are essential to leading a healthy information security program. It concentrates on the application of technical knowledge rather than technical information, which is related to a chief information security officer’s daily tasks. Information security administrators can rise through the professional ranks but must learn executive-level management, strategic planning, financial management, and organizational abilities to reach a C-Level position.

How do I know if CCISO is for me?

The CCISO is the right choice for you if you aspire to attain the highest regarded title within the information security profession – CISO, already serve as an official CISO, or Or perform CISO functions in their organization.

How long is the CCISO certification valid?

Your C|CISO certification is valid for a period of one year.

What do I need to do to renew my certification?

To renew your certification you must satisfy the Continuing Education requirements and remit a renewal fee of $100.00 (USD).

The CCISO certification is not an entry-level program. To qualify for the program and examination, you must have a minimum of 5 years of prior experience in at least three of the five domains.

The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management. The Certified Chief Information Security Officer certification is also an approved baseline certification on DoD Directive 8570/ 8140.


Certified Chief Information Security Officer (CCISO v3)


150 minutes


150 multiple-choice questions

Passing Grade

To ensure each exam has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Our team can deliver CCISO certification training on-site, anywhere in the world, and can be tailored to fit your organization’s specific needs.

Learn more about our Enterprise Solutions here 

  • View Pricing/Schedule for CEH v10

    Check out dates and locations for our CEH v10 Certification Boot Camp

    See dates

    Find out more information about bringing an event to you.

    More Information
  • Register for CEH v10 Certification Boot Camp

    Enroll now and start your learning adventure

    Start Here


Took CISSP and CEH with Training Camp and I owe part of my success to their course and instructor expertise.
Nate Rocha US Govt
Eric Beasley was an excellent teacher for the CEH bootcamp I attended. I really enjoyed the CEH Bootcamp with him at the Training Camp facility.
Mark Conover Northrop Grumman
Training Camp did a great job from start to end with the training and accommodations for the CEH Class. . I'd highly recommend them for any other certifications anyone is interested in, . I had no issues whatsoever with the entire experience!
Ryan Heiob RCH Technologies
The certified ethical hacker solution provided made a real difference for our team success. Top-notch support from start to finish.
Edward K VISA
I would highly recommend the Training Camp CEH experience.
Jason Witty
I enjoyed the interaction that the trainer produced through the various Ethical Hacking lab tool activities.
Jackie Johnson US Army
The Certified Ethical Hacker training program provided by Training Camp was very enjoyable, useful and extremely worthwhile. for our team.
Amanda Carter AECOM
Training Camp is one of the most reputable institutions for certifications in Cyber Security.
Jeffrey Sage EC-Council
01 08