certified ethical hacker

EC-Council Certified Ethical Hacker (CEH) Certification Camp

$2,995.00

WHAT IS INCLUDED

icon for exam pass guarantee CEH Exam Pass Guarantee (Unlimited Retakes)
lodging CEH Exam Review Guide
icon for practice test questions CEH Practice Test Questions
address,book,reading,read Official CEH Courseware
exam CEH Exam Voucher
Onsite Pearson Vue Test Center
exam CEH Study Labs & Simulations

LOCATIONS

Career Camps offers this camp onsite in many locations around the US and we also offer it as an online live as a virtual class. Some of the locations include Philadelphia, Los Angeles, Washington Las Vegas, and San Diego. This camp is also offered in different time zones. Please contact us to get the onsite schedule or simply check the dates and locations in the class dates selection below.

Need Airfare?

Need Lodging?

The number of nights you need for lodging during your camp.

Product price: $2,995.00
Total options:
Order total:

Description

The lab intensive environment gives you in-depth knowledge and practical experience with the current, essential security systems.

You will first begin with understanding how perimeter defenses work and then move into scanning and attacking networks, of course, noย  real network is harmed. You will also learn how intruders escalate privileges and what steps can be taken to secure a system. You will also gain knowledge about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.

When you leave this intensive 5 day boot camp you will have hands on understanding and experience in Ethical Hacking.

The CEHย boot camp incorporates EC Councilย Official Courses:

312-50 ย Certified Ethical Hacker

Topics Covered in this Official Boot Camp:

Introduction to Ethical Hacking

Information security overview
Information security threats and attack vectors
Hacking concepts
Ethical hacking concepts
Information Security Controls
Penetration testing concepts
Information security laws and standards

Footprinting and Reconnaissance

Footprinting concepts
Footprinting through search engines
Footprinting through web services
Footprinting through social networking sites
Website footprinting
Email footprinting
Competitive Intelligence
WHOIS Footprinting
DNS footprinting
Network footprinting
Footprinting through social engineering
Footprinting tools
Countermeasures
Footprinting pen testing

Scanning Networks

Network scanning concepts
Scanning tools
Scanning techniques
Scanning beyond IDS and firewall
Banner grabbing
Draw network diagrams
Scanning pen test

Enumeration

Enumeration concepts
NetBIOS enumeration
SNMP enumeration
LDAP enumeration
NTP enumeration SMTP and DNS enumeration
Other enumeration techniques
Enumeration countermeasures
Enumeration pen testing

Vulnerability Analysis

Vulnerability assessment concepts
Vulnerability assessment solutions
Vulnerability scoring systems
Vulnerability assessment tools
Vulnerability assessment reports

System Hacking

System hacking concepts
Cracking passwords
Escalating privileges
Executing applications
Hiding files
Covering tracks
Penetration testing

Malware Threats

Malware concepts
Trojan concepts
Virus and worm concepts
Malware analysis
Countermeasures
Anti-malware software
Malware penetration testing

Sniffing

Sniffing concepts
Sniffing techniques: MAC attacks
Sniffing techniques: DHCP attacks
Sniffing techniques: ARP Poisoning
Sniffing techniques: Spoofing attacks
Sniffing techniques: DNS poisoning
Sniffing tools
Countermeasures
Sniffing detection techniques
Sniffing pen testing

Social Engineering

Social engineering concepts
Social engineering techniques
Insider threats
Impersonation on social networking sites
Identity theft
Countermeasures
Social engineering pen testing

Denial of Service

DoS/DDos Concepts
DoS/DDoS attack techniques
Botnets
DDoS case study
DoS/DDoS attack tools
Countermeasures
DoS/DDos protection tools
DoS/DDoS penetration testing

Session Hijacking

Session hijacking concepts
Application level session hijacking
Network level session hijacking
Session hijacking tools
Countermeasures
Penetration testing

Evading IDS, Firewalls, and Honeypots

IDS, firewall and honeypot concepts
IDS, firewall and honeypot solutions
Evading IDS
Evading firewalls
IDS/firewall evading tools
Detecting honeypots
IDS/Firewall evasion countermeasures
Penetration testing

Hacking Webservers

Web server operations
Web server attacks
Web server attack methodology
Web server attack tools
Countermeasures
Patch management
Web server security tools
Web server pen testing

Hacking Web Applications

Web app concepts
Web app threats
Hacking methodology
Web app hacking tools
Countermeasures
Web app security testing tools
Web app pen testing

SQL Injection

SQL injection concepts
Types of SQL injection
SQL injection methodology
SQL injection tools
Evasion techniques
Countermeasures

Hacking Wireless Networks

Wireless concepts
Wireless encryption
Wireless threats
Wireless hacking methodology
Wireless hacking tools
Bluetooth hacking
Countermeasures
Wireless security tools
Wireless pen testing

Hacking Mobile Platforms

Mobile platform attack vectors
Hacking Android OS
Hakcing iOS
Mobile spyware
Mobile device management
Mobile security guidelines and tools
Mobile pen testing

IoT and OT Hacking

IoT and OT concepts
IoT and OT attacks
IoT and OT hacking methodology
IoT and OT hacking tools
Countermeasures
IoT and OT pen testing

Cloud Computing

Cloud computing concepts
Cloud computing threats
Cloud computing attacks
Cloud security
Cloud security tools
Cloud penetration testing

Cryptography

Cryptography concepts
Encryption algorithms
Cryptography tools
Public key infrastructure (PKI)
Email encryption
Disk encryption
Cryptanalysis Countermeasures

CEH Training Exam Review

CEH Exam Structure
Exam Registration Process
Time Management
Topics and Concepts
CEH Certification Question Structure
Vendor Interpretation Techniques

Additional information

Class Dates

12/09/2024 – 12/13/2024 – Dallas, TX, 12/09/2024 – 12/13/2024 – Virtual 8am PST Start, 01/13/2025 – 01/17/2025 – Washington, DC, 01/13/2025 – 01/17/2025 – Virtual 9am EST Start, 02/10/2025 โ€“ 02/14/2025 โ€“ Los Angeles, CA, 02/10/2025 โ€“ 02/14/2025 โ€“ Virtual 8am PST Start, 03/31/2025 โ€“ 04/04/2025 โ€“ Philadelphia, PA, 03/31/2025 โ€“ 04/04/2025 โ€“ Virtual 9am EST Start, 04/14/2025 โ€“ 04/18/2025 โ€“ Colorado, Springs, CO, 04/14/2025 โ€“ 04/18/2025 โ€“ Virtual 8am PST Start, 05/05/2025 โ€“ 05/09/2025 โ€“ Washington, DC, 05/05/2025 โ€“ 05/09/2025 โ€“ Virtual 9am EST Start, 06/02/2025 โ€“ 06/06/2025 โ€“ Austin, TX, 06/02/2025 โ€“ 06/06/2025 โ€“ Virtual 8am PST Start

Our Facilities

CAREER CAMPS FACILITIES

CAMPUS – Career Camps built out a stand alone training center (not a hotel conference room) with spacious classrooms, new desk, Herman Miller Aeron chairs & comfortable common areas. Each student has a dedicated desk with two monitors. Each classroom has a maximum of two rows – so everyone is able to be engaged without the “back row” feeling.

CLASSROOM EQUIPMENT – Students work on a dedicated Dell Client Desktop with 32GB memory with 512GB SSD drives – All Labs are executed the extremely fast Microsoft Data Center Hosted Lab Environment.

CAMPUS INTERNET – The campus is connected with a 1Gbps (1,000 Mbps) Verizon Fios Business Connection which provides complete internet (including VPN) access for students.

COMMON AREA – Amenities including snacks, drinks (Coffee, 100% juices, sodas, etc) all complimentary.

LODGING – We use the Hyatt Place Lakewood Ranch. This “upgraded” hotel offers extremely comfortable beds, great breakfast and very fast internet access.

NEAR BY AMENITIES –ย Many shops, restaurants and grocery options are available within walking distance. Additionally – the hotel provided scheduled shuttle services. Restaurants like Bone Fish Grill, Ruby Tuesday’s, Five Guys, Chipotle, Quiznos, Chili’s and over 20 additional choices in the immediate area. All of these options are offered in a pedestrian walking village.

Why Choose Us

CAREER CAMPS DIFFERENCE

Career Camps provides an in-depth hands on learning environment. Our instructors teach using demonstrations and explain concepts beyond the scope of the courseware. The best instructors are contracted from all across the US.ย  These professionals are real world consultants who actually implement these technologies. Career Camps knows our clients work in the “real world” andย it only makes sense to have an instructor with the experience in the real world.

Facilitiesย – Many of our competitors over-crowd classrooms by placing 2 toย 3 students per desk and 20+ students per instructor. Often these companies “extend” the life of very old equipment with slow performance on the software used today. Our average class size is 8 students.ย Our facilities have the best equipment with the most comfortable, focused environment for learning.

Instructorsย – Our CEO, Chester Flake holds one of the rarest Microsoft Certifications – the Microsoft Certified Learning Consultant (MCLC) Certification.ย  This certification reflects aย commitment to make sure our instructors are also actively engaged in real world consulting projects. Students expect a professional who can answer questions and demonstrate the technology.

Face to Face Training –ย We believe the best way to interact and learn is face to face training. ย Many of our competitors which offerย localย training are simply providing students with headphones/mic to attend class with an instructor at a remote location.

Test Pass –ย We offer a free retake voucher (if needed) for each of the exams required for certification. Any training center offering a “100% pass guarantee” would have to use unethical practices or unlimited test vouchers (which isย not likely or practical).

Distractions –ย Students often look for a “local” training center so they can be close to home and work. Boot camp requires a tremendous time commitment during the program.ย  Long class hours combined with self study each evening. The goal of boot camp is toย achieve certification in a fraction of the time. We strongly recommend students attend camp away from home and work in a focused, distraction free environment.

Boot Camp –ย Boot camp is an accelerated training focused on teaching technology and testing students on the official exams.ย Most training providers “added” boot camps to the existing standard training classes they offer. ย These training centers think a boot camp is just a regular class where you send the student home with a voucherย on the last day. ย Career Camps ย administers exams throughout the camp. Equally important – not every trainer can teach a boot camp and not all courseware is designed for boot camp format.ย ย Our trainersย know the boot camp format and our courseware is designedย for accelerated learning.

Florida –ย Career Campsย has one of the most scenic locations boasting some of the best weather in US. We believe students should have a comfortable and inviting atmosphere while attending these otherwise intense programs. We place our location, facilities andย amenities up against that any competitor.

What's New in CEHv10

This is the worlds most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the
information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers.

This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a โ€œHacker Mindsetโ€ in order to teach you how to think like a hacker and better defend against future attacks.
It puts you in the driverโ€™s seat with a hands-on training environment employing a systematic ethical hacking process.

Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you โ€œliveโ€ through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

As โ€œa picture tells a thousand wordsโ€, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

In short, you walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

You May Also Like: