certified ethical hacker

EC-Council Certified Ethical Hacker (CEH) Certification Camp

$2,995.00

WHAT IS INCLUDED

icon for exam pass guarantee CEH Exam Pass Guarantee (Unlimited Retakes)
lodging CEH Exam Review Guide
icon for practice test questions CEH Practice Test Questions
address,book,reading,read Official CEH Courseware
exam CEH Exam Voucher
Onsite Pearson Vue Test Center
exam CEH Study Labs & Simulations

LOCATIONS

Career Camps primary Microsoft Training campus (for individual students) is located in Sarasota, FL.  Can’t travel to our facility?  No problem!  You will save on airfare, lodging and transportation.  Just contact us and we will get you pricing to attend the class online live virtually from your work or home.  If you do not see the location or class you are looking for, let us know!  We have access to hundreds of classes and locations all across the United States and also offer corporate and group rates.  If you have 5 or more students we can even come to you! With several partnerships in place, we are sure to have something to fit your needs.  Whether you need to get MCA or MCE Certified, or get updated on Microsoft Windows Server 2022, we’ve got you covered.

Need Airfare?

Need Lodging?

The number of nights you need for lodging during your camp.

Product price: $2,995.00
Total options:
Order total:

Description

The lab intensive environment gives you in-depth knowledge and practical experience with the current, essential security systems.

You will first begin with understanding how perimeter defenses work and then move into scanning and attacking networks, of course, no  real network is harmed. You will also learn how intruders escalate privileges and what steps can be taken to secure a system. You will also gain knowledge about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.

When you leave this intensive 5 day boot camp you will have hands on understanding and experience in Ethical Hacking.

The CEH boot camp incorporates EC Council Official Courses:

312-50  Certified Ethical Hacker

Topics Covered in this Official Boot Camp:

Introduction to Ethical Hacking

Information security overview
Information security threats and attack vectors
Hacking concepts
Ethical hacking concepts
Information Security Controls
Penetration testing concepts
Information security laws and standards

Footprinting and Reconnaissance

Footprinting concepts
Footprinting through search engines
Footprinting through web services
Footprinting through social networking sites
Website footprinting
Email footprinting
Competitive Intelligence
WHOIS Footprinting
DNS footprinting
Network footprinting
Footprinting through social engineering
Footprinting tools
Countermeasures
Footprinting pen testing

Scanning Networks

Network scanning concepts
Scanning tools
Scanning techniques
Scanning beyond IDS and firewall
Banner grabbing
Draw network diagrams
Scanning pen test

Enumeration

Enumeration concepts
NetBIOS enumeration
SNMP enumeration
LDAP enumeration
NTP enumeration SMTP and DNS enumeration
Other enumeration techniques
Enumeration countermeasures
Enumeration pen testing

Vulnerability Analysis

Vulnerability assessment concepts
Vulnerability assessment solutions
Vulnerability scoring systems
Vulnerability assessment tools
Vulnerability assessment reports

System Hacking

System hacking concepts
Cracking passwords
Escalating privileges
Executing applications
Hiding files
Covering tracks
Penetration testing

Malware Threats

Malware concepts
Trojan concepts
Virus and worm concepts
Malware analysis
Countermeasures
Anti-malware software
Malware penetration testing

Sniffing

Sniffing concepts
Sniffing techniques: MAC attacks
Sniffing techniques: DHCP attacks
Sniffing techniques: ARP Poisoning
Sniffing techniques: Spoofing attacks
Sniffing techniques: DNS poisoning
Sniffing tools
Countermeasures
Sniffing detection techniques
Sniffing pen testing

Social Engineering

Social engineering concepts
Social engineering techniques
Insider threats
Impersonation on social networking sites
Identity theft
Countermeasures
Social engineering pen testing

Denial of Service

DoS/DDos Concepts
DoS/DDoS attack techniques
Botnets
DDoS case study
DoS/DDoS attack tools
Countermeasures
DoS/DDos protection tools
DoS/DDoS penetration testing

Session Hijacking

Session hijacking concepts
Application level session hijacking
Network level session hijacking
Session hijacking tools
Countermeasures
Penetration testing

Evading IDS, Firewalls, and Honeypots

IDS, firewall and honeypot concepts
IDS, firewall and honeypot solutions
Evading IDS
Evading firewalls
IDS/firewall evading tools
Detecting honeypots
IDS/Firewall evasion countermeasures
Penetration testing

Hacking Webservers

Web server operations
Web server attacks
Web server attack methodology
Web server attack tools
Countermeasures
Patch management
Web server security tools
Web server pen testing

Hacking Web Applications

Web app concepts
Web app threats
Hacking methodology
Web app hacking tools
Countermeasures
Web app security testing tools
Web app pen testing

SQL Injection

SQL injection concepts
Types of SQL injection
SQL injection methodology
SQL injection tools
Evasion techniques
Countermeasures

Hacking Wireless Networks

Wireless concepts
Wireless encryption
Wireless threats
Wireless hacking methodology
Wireless hacking tools
Bluetooth hacking
Countermeasures
Wireless security tools
Wireless pen testing

Hacking Mobile Platforms

Mobile platform attack vectors
Hacking Android OS
Hakcing iOS
Mobile spyware
Mobile device management
Mobile security guidelines and tools
Mobile pen testing

IoT and OT Hacking

IoT and OT concepts
IoT and OT attacks
IoT and OT hacking methodology
IoT and OT hacking tools
Countermeasures
IoT and OT pen testing

Cloud Computing

Cloud computing concepts
Cloud computing threats
Cloud computing attacks
Cloud security
Cloud security tools
Cloud penetration testing

Cryptography

Cryptography concepts
Encryption algorithms
Cryptography tools
Public key infrastructure (PKI)
Email encryption
Disk encryption
Cryptanalysis Countermeasures

CEH Training Exam Review

CEH Exam Structure
Exam Registration Process
Time Management
Topics and Concepts
CEH Certification Question Structure
Vendor Interpretation Techniques

Additional information

Class Dates

05/06/2024 – 05/10/2024, 06/24/2024 – 06/28/2024, 07/08/2024 – 07/12/2024, 08/26/2024 – 08/30/2024, 09/30/2024 – 10/04/2024

Our Facilities

CAREER CAMPS FACILITIES

CAMPUS – Career Camps built out a stand alone training center (not a hotel conference room) with spacious classrooms, new desk, Herman Miller Aeron chairs & comfortable common areas. Each student has a dedicated desk with two monitors. Each classroom has a maximum of two rows – so everyone is able to be engaged without the “back row” feeling.

CLASSROOM EQUIPMENT – Students work on a dedicated Dell Client Desktop with 32GB memory with 512GB SSD drives – All Labs are executed the extremely fast Microsoft Data Center Hosted Lab Environment.

CAMPUS INTERNET – The campus is connected with a 1Gbps (1,000 Mbps) Verizon Fios Business Connection which provides complete internet (including VPN) access for students.

COMMON AREA – Amenities including snacks, drinks (Coffee, 100% juices, sodas, etc) all complimentary.

LODGING – We use the Hyatt Place Lakewood Ranch. This “upgraded” hotel offers extremely comfortable beds, great breakfast and very fast internet access.

NEAR BY AMENITIES – Many shops, restaurants and grocery options are available within walking distance. Additionally – the hotel provided scheduled shuttle services. Restaurants like Bone Fish Grill, Ruby Tuesday’s, Five Guys, Chipotle, Quiznos, Chili’s and over 20 additional choices in the immediate area. All of these options are offered in a pedestrian walking village.

Why Choose Us

CAREER CAMPS DIFFERENCE

Career Camps provides an in-depth hands on learning environment. Our instructors teach using demonstrations and explain concepts beyond the scope of the courseware. The best instructors are contracted from all across the US.  These professionals are real world consultants who actually implement these technologies. Career Camps knows our clients work in the “real world” and it only makes sense to have an instructor with the experience in the real world.

Facilities – Many of our competitors over-crowd classrooms by placing 2 to 3 students per desk and 20+ students per instructor. Often these companies “extend” the life of very old equipment with slow performance on the software used today. Our average class size is 8 students. Our facilities have the best equipment with the most comfortable, focused environment for learning.

Instructors – Our CEO, Chester Flake holds one of the rarest Microsoft Certifications – the Microsoft Certified Learning Consultant (MCLC) Certification.  This certification reflects a commitment to make sure our instructors are also actively engaged in real world consulting projects. Students expect a professional who can answer questions and demonstrate the technology.

Face to Face Training – We believe the best way to interact and learn is face to face training.  Many of our competitors which offer local training are simply providing students with headphones/mic to attend class with an instructor at a remote location.

Test Pass – We offer a free retake voucher (if needed) for each of the exams required for certification. Any training center offering a “100% pass guarantee” would have to use unethical practices or unlimited test vouchers (which is not likely or practical).

Distractions – Students often look for a “local” training center so they can be close to home and work. Boot camp requires a tremendous time commitment during the program.  Long class hours combined with self study each evening. The goal of boot camp is to achieve certification in a fraction of the time. We strongly recommend students attend camp away from home and work in a focused, distraction free environment.

Boot Camp – Boot camp is an accelerated training focused on teaching technology and testing students on the official exams. Most training providers “added” boot camps to the existing standard training classes they offer.  These training centers think a boot camp is just a regular class where you send the student home with a voucher on the last day.  Career Camps  administers exams throughout the camp. Equally important – not every trainer can teach a boot camp and not all courseware is designed for boot camp format.  Our trainers know the boot camp format and our courseware is designed for accelerated learning.

Florida – Career Camps has one of the most scenic locations boasting some of the best weather in US. We believe students should have a comfortable and inviting atmosphere while attending these otherwise intense programs. We place our location, facilities and amenities up against that any competitor.

What's New in CEHv10

This is the worlds most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the
information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers.

This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.
It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.

Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

As “a picture tells a thousand words”, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

In short, you walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!