• Thousands have come from all over the world to visit our Training Facilities in South Florida!
    Thousands have come from all over the world to visit our Training Facilities in South Florida!
  • Interested in Cyber Security? Register for The Academy's Cyber Security Program!
    Interested in Cyber Security? Register for The Academy's Cyber Security Program!
  • Put your Microsoft Software Assurance Training Vouchers to use here!
    Put your Microsoft Software Assurance Training Vouchers to use here!
  • Now offering training for Government employees through GSA!
    Now offering training for Government employees through GSA!
  • Cisco is launching new voice certifications: CCNA & CCNP Collaboration.
    Cisco is launching new voice certifications: CCNA & CCNP Collaboration.
  • NEW for 2015! The Academy is now offering MCSE training!
    NEW for 2015! The Academy is now offering MCSE training!

CEH: Certified Ethical Hacking Boot Camp

Microsoft CEH: Certified Ethical Hacking Boot Camp

Click Here to View Schedules & Pricing and to Enroll Online

Duration: 5 Days

Descriptiion

During this 5-day lab intensive course, candidates will be immersed into an interactive environment where they will learn how perimeter defenses work and then be lead into scanning and attacking their own networks. No real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class, they will have hands-on understanding and experience in Ethical Hacking.

This course prepares students for EC-Council Exam 312-50 CEH.

 

Prerequisites
Curriculum

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: System Hacking

Module 06: Trojans and Backdoors

Module 07: Viruses and Worms

Module 08: Sniffers

Module 09: Social Engineering

Module 10: Denial of Service

Module 11: Session Hijacking

Module 12: Hijacking Webservers

Module 13: Hacking Web Applications

Module 14: SQL Injection

Module 15: Hacking Wireless Networks

Module 16: Evading IDS, Firewalls, and Honeypots

Module 17: Buffer Overflow

Module 18: Cryptography

Module 19: Penetration Testing

What’s Included:
Training Formats

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

Speak to an Admissions Representative for complete details