• duration
    5 days
  • Official EC-Council CEH v10
    Exam Prep Boot Camp
  • EC-Council CEH
    Partner Of the Year
  • CEH Exam Pass
    Guaranteed
  • Take Official CEH
    Exam Through US

Learn how to become a Certified Ethical Hacker (CEH v10)

CEH v10 Certification Boot Camp

Our 5-day EC-Council Certified Ethical Hacker Certification Boot Camp covers how to work with a variety of systems to find out where their weaknesses or vulnerabilities may be, and how you can identify and reinforce these gaps to prevent successful hacking attempts.

Ethical hacking is where an IT professional uses the same hacking techniques as malicious hackers to protect and prevent a company’s systems from falling into the hands of criminals. Put simply, the statement at the core of CEH is; ‘to stop a hacker you need to think like a hacker’. By the end the journey to obtain your CEH with Training Camp, you’ll know what tools do what job, how to use the tools properly and how to conduct an ethical penetration test.

Students Love our Award-Winning Live, Online Platform

From the comfort of your home or office, Training Camp’s live, online virtual classroom platform lets you enjoy the same quality training experience as our in-person courses. We boast one of the industry’s most robust live, online schedules with classes guaranteed-to-run almost every week.

WHY CHOOSE TRAINING CAMP, EC-Council’S PARTNER OF THE YEAR?

We offer your best chance to get certified. Period. Training Camp has been awarded EC-Council Partner of the Year for the last 3 years, a reflection of our continued dedication to delivering excellence and quality across our full range of accelerated EC-Council courses. Since 2001, we have won more awards and certified more CEHs than any other company, worldwide.

CEH is DoD Approved

The CEH Certification is approved under the DoD 8570 Directive for the CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, and CSSP Incident Responder categories.

OFFICIAL EC-Council CEH TRAINING PROVIDER EXCLUSIVE FEATURES

Official EC-Council CEH Courseware
iLab Access (6-Month Access)
CEH Exam Voucher (312-50)
EC-Council CEH Advanced Hacking Tool

CEH TRAINING CAMP EXCLUSIVE FEATURES

CEH Exam Prep Study Guide
EC-Council CEH Exam Review Sessions
CPE/CEU Post Class Package
CEH Exam Pass Guarantee

Optional Add-ons for CEH

CEH Practical Exam Voucher ($550.00)
EC-Council CEH Master Certification Boot Camp

Exams Covered

312-50 Certified Ethical Hacker (ANSI)

Need dedicated CEH v10 training?

Our Certified Ethical Hacker (CEH) course can be delivered to your site or virtually in a private-group setting, customized to meet your organization’s learning objectives. Save up to 40% and your satisfaction is GUARANTEED!

Click to learn more about our group training.

CEH v10 Boot Camp, As Featured On

training features

  • Award Winning CEH Courseware

  • CEH Lab/Exam Prep Review Sessions

  • Take Official CEH Exam Through Us

  • CEH v10 Exam Pass Guarantee

  • CEH is G.I. Bill Eligible For Up To 100% Of Fees

  • Featured on CNN, FOX News, MSNBC, Reuters

  • 98% Student Satisfaction Rate

  • 50 CEU/CPE Hours

EC-Council Training Center of The Year Award Winner (Enterprise)

Training Camp is a leading provider of cybersecurity certifications and has been awarded the EC-Council Training Center of the Year award in North America for the last 3 years. Our program is the most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers.

  • What is Ethical Hacking?

    Ethical hackers (also known as penetration testers) are employed to conduct penetration tests – controlled hacks – on businesses to test systems and find vulnerabilities. Unlike ‘black hat’ hackers, ethical hackers are security professionals able to provide the knowledge and skills needed to fix flaws before they can be exploited. With this knowledge, businesses can fix vulnerabilities and boost their cyber defenses.

  • Certified Ethical Hacker Certification

    Death by Powerpoint? Not at Training Camp. While many of our EC-Council CEH Certification Boot Camps extend beyond the traditional “9 to 5” format, students remain engaged by each day’s mix of lecture, hands-on hacking labs, and CEH exam review sessions. Learn the theory, apply it in a real-world scenario, then translate your knowledge into CEH exam success.

  • What tools will I use in this Authorized CEH course?

    On this accelerated CEH Boot Camp course, you will focus on Kali, Backtrack, Nmap, Hping, Ettercap, Nessus, Maltego, Cain, Metasploit, and W3af tools. Our security experts have also designed more than 140 labs that replicate real-time scenarios and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

  • What are the CEH Certification Requirements?

    EC-Council recommends you have two years’ IT work experience and possess a basic familiarity with Linux or Unix. Training Campo also recommends you possess a strong working knowledge of TCP/IP and Windows Server.

  • CEH is G.I. Bill Eligible For Up To 100% Of Fees

    When you take training with Training Camp, your G.I. Bill benefits may cover up to 100% of the CEH course tuition and CEH exam fees. We can also provide assistance for travel costs.

  • CEH Exam Pass Guarantee

    When you decide to take one of our award-winning Certified Ethical Hacker Certification Boot Camp, you are placing trust in us. If you do not pass the certification exam, you may retake this program live or online and/or enroll in our mentoring program at no additional cost.

INTRODUCTION TO ETHICAL HACKING (CEH V10)

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards

FOOTPRINTING AND RECONNAISSANCE (CEH V10)

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Countermeasures
  • Footprinting Pen Testing

SCANNING NETWORKS (CEH V10)

  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing

ENUMERATION (CEH V10)

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing

VULNERABILITY ANALYSIS (CEH V10)

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

SYSTEM HACKING (CEH V10)

  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

MALWARE THREATS (CEH V10)

  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing

SNIFFING (CEH V10)

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

SOCIAL ENGINEERING (CEH V10)

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing

DENIAL-OF-SERVICE (CEH V10)

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing

SESSION HIJACKING (CEH V10)

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures

EVADING IDS, FIREWALLS, AND HONEYPOTS (CEH V10)

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

HACKING WEB SERVERS (CEH V10)

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Countermeasures
  • Patch Management
  • Web Server Security Tools
  • Web Server Pen Testing

HACKING WEB APPLICATIONS (CEH V10)

  • Web App Concepts
  • Web App Threats
  • Hacking Methodology
  • Web App Hacking Tools
  • Countermeasures
  • Web App Security Testing Tools
  • Web App Pen Testing

SQL INJECTION (CEH V10)

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures

HACKING WIRELESS NETWORKS (CEH V10)

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wireless Pen Testing

HACKING MOBILE PLATFORMS (CEH V10)

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Spyware
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

IOT HACKING (CEH V10)

  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • IoT Pen Testing

CLOUD COMPUTING(CEH V10)

  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

CRYPTOGRAPHY (CEH V10)

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

What is the Certified Ethical Hacker?

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).

What makes the CCISO different from other certifications?

Unlike other security certifications which teach defensive tactics such as firewall configuration or other forms of preemptive security, the CEH takes an alternative approach. Offenses are featured as your best defense - which is a major difference from most certifications that only focus on defensive tactics. The CEH imparts offensive tactics supplemented with defensive countermeasures. This ensures that the CEH professional can have a more holistic security perspective of the organization.

Is the CEH necessary to get a job in Ethical Hacking?

The CEH is the most well-known certification in Ethical Hacking, but it’s not an absolute requirement. At their most basic, certifications are simply a supplement to real-world experience - without this you will only get so far.

This certification will help you break into the Ethical Hacking profession, but you’re not guaranteed a career. You’ll get great skills and a renowned certification, but you’ll still need experience to back it all up.

What prerequisites do I need to take an EC-Council course?

This cert fits between entry level qualifications like CompTIA’s Security+ and advanced certs like the CISSP. Before attending a CEH training course you should ideally possess at least two years IT experience, a good knowledge of TCP/IP, Windows Server and a basic familiarity with Linux and/or Unix.

What is the salary for Certified Ethical Hackers?

According to a recent PayScale report, the average salary of penetration testers, cybersecurity analysts, and security or cybersecurity engineers is $90,000. Depending on where they live, their years of experience, and education, CEHs can earn more than $128,000 in certain cybersecurity positions.

What is the cost of the CEH certification exam?

To become a Certified Ethical Hacker (CEH), you must take the 312-50 exam from Pearson/VUE at a cost of $1,199 or directly from EC-Council's online exam platform for $950.  This exam is included in our CEH Training Camp.

The CEH designation is one of the most popular credentials available today.  The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

The Certified Ethical Hacker Certification Boot Camp is suited to those more advanced or established in their field, as you will be expected to have a strong foundation of knowledge regarding IT. Technical knowledge is less expected, however having some awareness is always beneficial.

Exam:

(312-50) - Certified Ethical Hacker Certification v10

Duration:

4 hours

Questions:

125 multiple-choice questions

Passing Grade

To ensure each exam has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Our team can deliver CEH certification training on-site, anywhere in the world, and can be tailored to fit your organization’s specific needs.

Learn more about our Enterprise Solutions here 

  • View Pricing/Schedule for CEH v10

    Check out dates and locations for our CEH v10 Certification Boot Camp

    See dates
  • PRIVATE GROUP CEH TRAINING

    Find out more information about bringing an event to you.

    More Information
  • Register for CEH v10 Certification Boot Camp

    Enroll now and start your learning adventure

    Start Here

Testimonials

Took CISSP and CEH with Training Camp and I owe part of my success to their course and instructor expertise.
Nate Rocha US Govt
Eric Beasley was an excellent teacher for the CEH bootcamp I attended. I really enjoyed the CEH Bootcamp with him at the Training Camp facility.
Mark Conover Northrop Grumman
Training Camp did a great job from start to end with the training and accommodations for the CEH Class. . I'd highly recommend them for any other certifications anyone is interested in, . I had no issues whatsoever with the entire experience!
Ryan Heiob RCH Technologies
The certified ethical hacker solution provided made a real difference for our team success. Top-notch support from start to finish.
Edward K VISA
I would highly recommend the Training Camp CEH experience.
Jason Witty
I enjoyed the interaction that the trainer produced through the various Ethical Hacking lab tool activities.
Jackie Johnson US Army
The Certified Ethical Hacker training program provided by Training Camp was very enjoyable, useful and extremely worthwhile. for our team.
Amanda Carter AECOM
Training Camp is one of the most reputable institutions for certifications in Cyber Security.
Jeffrey Sage EC-Council
01 08