• Blog
  • Reviews
  • Contact Us
  • Locations
1-844-BOOTCAMP
or 1-941-218-0007
Certification Camps
  • BOOTCAMPS
    • Microsoft 365 Enterprise
      • MCE Microsoft 365 Enterprise Administrator
      • MCA Microsoft 365 Messaging Administrator
      • MCA Microsoft 365 Security Administrator
      • MCA Microsoft 365 Teams Administrator
      • MCA Microsoft 365 Modern Desktop
    • Microsoft Azure Admin
      • MCA Azure Administrator
      • MCA Azure Security Engineer
      • MCA Windows Server Hybrid Administrator
      • MCE Azure DevOps Engineer
      • MCE Azure Solutions Architect
      • MCS Azure Virtual Desktop
    • Microsoft Azure Data
      • MCA Azure Database Administrator
      • MCA Azure Data Engineer
      • MCA Azure Data Analyst Power BI
      • MCA Power Platform Developer
      • MCA Power Platform Functional Consultant
      • MCE Power Platform Solution Architect
    • Microsoft Developer
      • MCA Azure Developer
      • MCE Azure DevOps Engineer
      • MCA Power Platform Developer
      • MCE Power Platform Solution Architect
      • MCA Microsoft 365 Developer
    • Microsoft Security
      • MCA Identity & Access Admin
      • MCA Information Protection Admin
      • MCA Security Operations Analyst
    • Combo Classes
      • Azure Admin & Azure Architect
      • Azure Developer & Azure DevOps
      • Microsoft 365 Desktop & Enterprise Admin
      • Microsoft 365 Security & Enterprise Admin
    • Amazon Web Services
      • Architecting on AWS Accelerator
      • AWS Cloud Prac Solutions & Architect Associate
      • AWS Certified Developer Associate
      • AWS Certified DevOps Engineer Professional
    • CompTia
      • CompTia A+ Essentials
      • CompTIA Cloud+
      • CompTia Network+
      • CompTia Security+
    • Information Security
      • EC-Council Certified Ethical Hacker (CEH)
      • (ISC)² CISSP
    • Cisco
      • Cisco CCNP Routing and Switching
      • Cisco CCNA
  • Find Training
    • Training By Job Role
      • Developer
      • Administrator
      • Architect
      • Data Engineer
      • DevOps
      • Security
    • Vendors
      • Microsoft
      • Amazon
      • Cisco
      • CompTIA
      • Ec-Council
    • Microsoft Technical
      • Azure
      • Microsoft 365
      • Power Platform
      • Security
      • Messaging
      • Modern Desktop
      • Windows Server
      • SQL Server
    • Click here to find your course
  • SCHEDULE
  • Role Based Certifications
  • Pay an Invoice
Home > Bootcamps
INFORMATION SECURITY BOOTCAMP

Certified Ethical Hacker (CEH) – 5 Day Training Boot Camp

$3,995 REMOTE CLASSROOM LIVE
Price includes: Instructor Led Class, Official Courseware, Labs and Exams
The EC Council Certified Ethical Hacking (CEH) course provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures.  While attending this 5 day course - students will take the official certification exam.
Register for this bootcamp before the end of January (for any date) and get $250 discount.
Get Coupon Code.

Training Schedule and Pricing

Our training model blends knowledge and certification prep into one solution. Interact face-to-face with vendor certified trainers AT OUR TRAINING CENTER IN SARASOTA, FL - OR - attend the same instructor-led live camp ONLINE.

Select Delivery Format:
Remote Classroom Live
Check Box To Include:
  • Mar
    06
    2023
    Delivery Format:
    REMOTE CLASSROOM LIVE
    Date:
    03.06.2023 - 03.10.2023
    Location:
    ONLINE
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $3,995
    5 days
    Enroll Generate a Quote Ask a Question
  • May
    08
    2023
    Delivery Format:
    REMOTE CLASSROOM LIVE
    Date:
    05.08.2023 - 05.12.2023
    Location:
    ONLINE
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $3,995
    5 days
    Enroll Generate a Quote Ask a Question
  • Jun
    12
    2023
    Delivery Format:
    REMOTE CLASSROOM LIVE
    Date:
    06.12.2023 - 06.16.2023
    Location:
    ONLINE
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $3,995
    5 days
    Enroll Generate a Quote Ask a Question
  • View Entire Schedule
  • Jul
    10
    2023
    Delivery Format:
    REMOTE CLASSROOM LIVE
    Date:
    07.10.2023 - 07.14.2023
    Location:
    ONLINE
    Price Includes:
    Instructor Led Class, Official Courseware, Labs and Exams
    $3,995
    5 days
    Enroll Generate a Quote Ask a Question

Course Delivery

This course is available in the following formats:

Remote Classroom Live
Duration:
5 days
Request More Information

Exams Required And Administered During Camp:

312-50 - Certified Ethical Hacker

What's Included

  • 4 Microsoft Test Vouchers1 CEH Test Voucher
  • Microsoft Training BooksCEH Official Training Books
  • Instructor Led Classroom TrainingInstructor Led Classroom Training
  • Onsite Prometric Testing CenterOnsite Pearson Vue Testing Center
  • Microsoft Study Labs & Simulations24 Hour Access To Lab
  • Course Description
  • What's New in CEHv12
  • Facilities

Certification Camps - Course Description

CEHv12  is  a  comprehensive  Ethical  Hacking and Information  Systems  Security  Auditing program focusing  on  latest  security  threats,  advanced  attack vectors, and practical real time demonstration of the latest Hacking  Techniques, methodologies,  tools,  tricks,  and security measures.

Unlike other strictly theoretical training offered by most training centers, you will be immersed in interactive sessions with hands-on labs after each topic. You can explore your newly gained knowledge  right  away  in  your  classroom  by  pentesting, hacking and securing your own systems.

The lab intensive environment gives you in-depth knowledge and practical experience  with  the  current,  essential  security  systems.

You  will  first  begin  with  understanding  how  perimeter defenses work and then move into scanning and attacking networks,  of  course,  no  real  network  is  harmed. You  will also  learn  how  intruders  escalate  privileges  and  what

steps can be taken to secure a system. You will also gain knowledge  about  Intrusion  Detection,  Policy  Creation, Social  Engineering,  DDoS  Attacks,  Buffer  Overflows,  and Virus  Creation.

When you leave this intensive 5 day boot camp you will have hands on understanding and experience in Ethical  Hacking.

The CEH boot camp incorporates EC Council Official Courses

312-50  Certified Ethical Hacker

 

Topics Covered in this Official Boot Camp

Introduction to Ethical HackingFootprinting and ReconnaissanceScanning NetworksEnumerationVulnerability AnalysisSystem HackingMalware ThreatsSniffingSocial EngineeringDenial of ServiceSession HijackingEvading IDS, Firewalls, and HoneypotsHacking Web ServersHacking Web ApplicationsSQL InjectionHacking Wireless NetworksHacking Mobile PlatformsIoT and OT HackingCloud ComputingCyptography
Introduction to Ethical Hacking

Introduction to Ethical Hacking

  • Information Security Overview
  • Cyber Kill Chain Concepts
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards
Footprinting and Reconnaissance

Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Who is Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
Scanning Networks

Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Draw Network Diagrams
Enumeration

Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
Vulnerability Analysis

Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Solutions and Tools
  • Vulnerability Assessment Reports
System Hacking

System Hacking

  • System Hacking Concepts
  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
Malware Threats

Malware Threats

  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
Sniffing

Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
Social Engineering

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
Denial of Service

Denial of Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • BotnetsDDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
Session Hijacking

Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
Evading IDS, Firewalls, and Honeypots

Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
Hacking Web Servers

Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Countermeasures
  • Patch Management
  • Web Server Security Tools
Hacking Web Applications

Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security
SQL Injection

SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures
Hacking Wireless Networks

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
Hacking Mobile Platforms

Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
IoT and OT Hacking

IoT and OT Hacking

  • IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • OT Hacking
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • Countermeasures
Cloud Computing

Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Threats
  • Cloud Hacking
  • Cloud Security
Cyptography

Cyptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

This is the worlds most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the
information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers.

This course in its 12th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.
It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process.

Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

As “a picture tells a thousand words”, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

In short, you walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

CERTIFICATION CAMPS FACILITIES

CAMPUS - Certification Camps built out training center with spacious classrooms, new desk, Herman Miller Aeron chairs & comfortable common areas.  Each classroom has a maximum of two rows - so everyone is able to be engaged without the "back row" feeling.

CLASSROOM EQUIPMENT - Students work on a dedicated Dell Client Desktop with 32GB memory with 512GB SSD drives - All Labs are executed the extremely fast Microsoft Data Center Hosted Lab Environment .

CAMPUS INTERNET - The campus is connected with a 1Gbps (1,000 Mbps) Verizon Fios Business Connection which provides complete internet (including VPN) access for students.

COMMON AREA - Amenties including snacks, drinks (Coffee, 100% juices, sodas, etc) all complimentary.

LODGING - We use the Hyatt Place Lakewood Ranch. This "upgraded" hotel offers extremely comfortable beds, great breakfast and very fast  internet access.

NEAR BY - Many shops, restaurants and grocery options are available within walking distance. Additionally - the hotel provided scheduled shuttle services. Restaurants like Cheesecake Factory, California Pizza Kitchen, Panera Bread, Bone Fish Grill, Ruby Tuesday's, Five Guys, Chipotle, Chili's and over 20 additional choices in the immediate area.

About

  • About Us
  • Reviews
  • Contact Us
  • Blog

Bootcamps

  • SQL Server
  • Microsoft 365 Enterprise
  • Windows Server
  • Microsoft Azure Admin
  • Windows Client
  • Exchange Server
  • System Center
  • Microsoft Developer
  • Information Security
  • CompTia
  • Cisco

Vendors

  • Microsoft
  • Amazon
  • Cisco
  • CompTia
  • Ec-Council

Job Role

  • Developer
  • Administrator
  • Architect
  • Data Engineer
  • DevOps
  • Security

Registration

  • More Info
  • Register for a Bootcamp
  • Pay Invoice

Copyright © 2023 Certification Camps. All rights reserved.

  • Terms & Conditions
  • Privacy Policy