CEH: Certified Ethical Hacker Training Course v11

Course Description
The Certified Ethical Hacker (CEH) also known as the Certified Network Defense Architect (CNDA) by EC-Council is one of the most respected security certification in the world. Information systems security professionals uses this certifications to show organizations that not only do they understand security concepts but can conduct an actual penetration test. This course will prepare students for the CEH exam within 5 days. Our documented 99% passing rate, has allowed us to train hundreds of students to pass their CEH exam on the first try.
We use a large variety of labs and lectures to ensure students are ready for the exam right after class. This CEH course will immerse students in an interactive environment where they will be shown how to scan, test, hack and secure systems. The lab intensive environment gives each student in-depth knowledge and practical experience needed not only to secure networks but also to hack them.
CEH EXAM
Students must pass one exam, with 125 questions in 240 minutes to become CEH certified. Students can take the certification exam on the last day of the Boot Camp. One exam voucher is included in the course tuition.
CEH COURSE LABS
This course prepares students for the actual certification exam using a series lectures and hands on labs to get students ready for the for the exam and real world. Some of the hands on labs will include conducting footprinting of a network, enumerating systems, finding vulnerabilities, hacking systems, installing malware, sniffing network traffic, conducting social engineering, evading IDS and firewalls, hacking web servers, hacking web applications, hacking wireless networking, hacking mobile phones, hacking the cloud, and using cryptography.
Don’t spend thousands of dollars more for the same or a less quality CEH course. We are an EC-Council Accredited training center and all courses, materials, and instructor are EC-Council authorized.
Tuition
$2,899.00
$2,499.00
No Dates on Schedule
What does the CEH certification exam prep course include?
-
Small class sizes. This will allow for great personal training with the instructor.
-
100% Money Back Guarantee
-
EC-Council Authorized Training Course
-
EC-Council Authorized Courseware
-
EC-Council Certified Instructor
-
Onsite Testing Center
-
5-day course includes a mock exam, which allows students to know their weak and strong points.
-
Take the official CEH exam on the last day of the course.
-
Our training material is always updated to match the latest exam objectives.
-
We have great instructors. Our CEH Certified Instructors all have over 15 years of experience.
-
This is not a lecture only class, we conduct over 100 hands on hacking labs.
-
As many free course retake as you need, for up to one year.
-
Affordable cost. Some places charge more than double for less quality training.
-
Our course was developed by known industry experts
FAQ : Frequently Asked Questions
Yes this course is has many labs at the end of each lessons, such as SQL injections, web scanning, and system hacking.
Yes, we are an EC-Council Accredited Training Center. All course materials are EC-Council authorized.
Yes you could. If you sign up for a classroom course you can attend a few days Online. Also if you sign up for an Online course you can attend a few days in the classroom.
We only hire the best instructors. Our instructors for CEH must have a minimum of 10 years of experience in the security industry and at least 5 years of teaching experience. Call us if you would like to speak to the instructor who will be teaching your class.
Yes, this course includes all books and 1 exam voucher. We are an authorized testing center. When you are finish with the course you can schedule the exam with us.
Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rates, and guarantee. The Technical Institute of America offers the lowest price, has one of the best passing rates, and an excellent guarantee. As a New York State licensed school and Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer the dual money back guarantee.
No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.
Yes! We offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class. E.g. if you miss a Saturday class, attend the following week evening course to make it up.
Students will start by learning how perimeter defenses work before progressing to scanning and attacking their own networks—without harming any real systems. They will then explore how intruders escalate privileges and the steps required to secure a system. The course also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. By the end of this intensive five-day program, students will have gained practical experience and a comprehensive understanding of Ethical Hacking.
Course Outline
Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Ethical Hacking Concepts Information Security Controls Incident Management Process Responsibilities of an Incident Response Team. Information Security Laws and Standards
Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Competitive Intelligence Whois Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Pen Testing
Network Scanning Concepts Scanning Tools Scanning Techniques Scanning Beyond IDS and Firewall Banner Grabbing Draw Network Diagrams Network Discovery Tools for Mobile Scanning Pen Testing
Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures Enumeration Pen Testing
Vulnerability Assessment Concepts Vulnerability Assessment Solutions Vulnerability Scoring Systems Vulnerability Assessment Tools Vulnerability Assessment Reports
System Hacking Concepts Cracking Passwords Password Recovery Tools Microsoft Authentication How Hash Passwords Are Stored in Windows SAM? NTLM Authentication Process Kerberos Authentication Password Salting Tools to Extract the Password Hashes Password Cracking Tools How to Defend against Password Cracking How to Defend against LLMNR/NBT-NS Poisoning Escalating Privileges Hiding Files What is Steganography? Covering Tracks Penetration Testing
Malware Concepts Trojan Concepts Virus and Worm Concepts Malware Analysis Countermeasures Anti-Malware Software Malware Penetration Testing
Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques Sniffing Pen Testing
Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures Social Engineering Pen Testing
DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools DoS/DDoS Penetration Testing
Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures Penetration Testing
IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures Penetration Testing
Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools Web Server Pen Testing
Web App Concepts Web App Threats Hacking Methodology Web App Hacking Tools Countermeasures Web App Security Testing Tools Web App Pen Testing
SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures
Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools Wireless Pen Testing
Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Spyware Mobile Device Management Mobile Security Guidelines and Tools Mobile Pen Testing
IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures IoT Pen Testing
Cloud Computing Concepts Cloud Computing Threats Cloud Computing Attacks Cloud Security Cloud Security Tools Cloud Penetration Testing
Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis