The Certified Ethical Hacker (CEH) also known as the Certified Network Defense Architect (CNDA) by EC-Council is one of the most respected security certification in the world. Information systems security professionals uses this certifications to show organizations that not only do they understand security concepts but can conduct an actual penetration test. This course will prepare students for the CEH exam within 5 days. Our documented 99% passing rate, has allowed us to train hundreds of students to pass their CEH exam on the first try.
We use a large variety of labs and lectures to ensure students are ready for the exam right after class. This CEH course will immerse students in an interactive environment where they will be shown how to scan, test, hack and secure systems. The lab intensive environment gives each student in-depth knowledge and practical experience needed not only to secure networks but also to hack them.
Students must pass one exam, with 125 questions in 240 minutes to become CEH certified. Students can take the certification exam on the last day of the Boot Camp. One exam voucher is included in the course tuition.
CEH COURSE LABS
This course prepares students for the actual certification exam using a series lectures and hands on labs to get students ready for the for the exam and real world. Some of the hands on labs will include conducting footprinting of a network, enumerating systems, finding vulnerabilities, hacking systems, installing malware, sniffing network traffic, conducting social engineering, evading IDS and firewalls, hacking web servers, hacking web applications, hacking wireless networking, hacking mobile phones, hacking the cloud, and using cryptography.
Don't spend thousands of dollars more for the same or a less quality CEH course. We are an EC-Council Accredited training center and all courses, materials, and instructor are EC-Council authorized.
Based on a monthly survey of our enrolled students, who were able to pass after attending our course.
If after the first class you are not happy with our instructor or training environment, let us know on the first day and we will issue a full refund of the course tuition.
You can retake the course as many times as needed completely free.
Reduced pricing & customized training available for companies and government agencies.
If you cannot pass the CEH exam after 2 retakes we will refund the full course tuition. Must take the exams within 6 months from your first class completion
Our CEH certified and licensed instructors will ensure students only get the best in training. Our instructors have taught thousands of classes is the last 15 years.
|Small class size.||(classes with 18+ students)|
|5 Days of Training|
|Instructor with real world Experience||(Instructors with no real world Experience)|
|Lowest price guaranteed||(Most schools are above $2,500)|
|Money Back Guarantee. If you are not happy with the course after the first class||(If you are not happy with the course, you will not get are a full refund)|
|Live instructor led training|
|Licensed School||(Unlicensed, unauthorized training)|
|Realistic Mock Exam||(No Exam or unrealistic)|
|Over 1,100 practice questions||(Most offer a few questions to practice)|
|Allows you to speak to the instructor before you start the class.||(You never meet the instructor until the class starts)|
|Unlimited free retakes of the course for up to one year.||(No retakes allowed)|
|Updated course material to match the current exam topics||(Training material not updated to the latest exam content)|
Yes this course is has many labs at the end of each lessons, such as SQL injections, web scanning, and system hacking.
Yes, we are EC-Council Accredited Training Center. All course material are EC-Council authorized.
We only hire the best instructors. Our instructors for CEH must have a minimum of 10 years of experience in the security industry and at least 5 years of teaching experience. Call us if you would like to speak to the instructor, who would be teaching your class.
Yes this course does include all books and 1 exam voucher.
Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rates, and guarantee. The Technical Institute of America offers the lowest price, has one of the best passing rates, and an excellent guarantee. As a Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer the dual money back guarantee.
No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.
Yes we offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class. E.g. if you miss a Saturday class, attend the following week evening course to make it up.
Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands-on understanding and experience in Ethical Hacking.
Module 01: Introduction to Ethical Hacking
Information Security Overview
Information Security Threats and Attack Vectors
Ethical Hacking Concepts
Information Security Controls
Incident Management Process
Responsibilities of an Incident Response Team.
Information Security Laws and Standards
Module 02: Footprinting and Reconnaissance
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Footprinting through Social Engineering
Footprinting Pen Testing
Module 03: Scanning Networks
Network Scanning Concepts
Scanning Beyond IDS and Firewall
Draw Network Diagrams
Network Discovery Tools for Mobile
Scanning Pen Testing
Module 04: Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Pen Testing
Module 05: Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 06: System Hacking
System Hacking Concepts
Password Recovery Tools
How Hash Passwords Are Stored in Windows SAM?
NTLM Authentication Process
Tools to Extract the Password Hashes
Password Cracking Tools
How to Defend against Password Cracking
How to Defend against LLMNR/NBT-NS Poisoning
What is Steganography?
Module 07: Malware Threats
Virus and Worm Concepts
Malware Penetration Testing
Module 08: Sniffing
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Detection Techniques
Sniffing Pen Testing
Module 09: Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Impersonation on Social Networking Sites
Social Engineering Pen Testing
Module 10: Denial-of-Service
DoS/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Tools
DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing
Module 11: Session Hijacking
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Module 12: Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot Solutions
IDS/Firewall Evading Tools
IDS/Firewall Evasion Countermeasures
Module 13: Hacking Web Servers
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Web Server Security Tools
Web Server Pen Testing
Module 14: Hacking Web Applications
Web App Concepts
Web App Threats
Web App Hacking Tools
Web App Security Testing Tools
Web App Pen Testing
Module 15: SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Module 16: Hacking Wireless Networks
Wireless Hacking Methodology
Wireless Hacking Tools
Wireless Security Tools
Wireless Pen Testing
Module 17: Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Mobile Device Management
Mobile Security Guidelines and Tools
Mobile Pen Testing
Module 18: IoT Hacking
IoT Hacking Methodology
IoT Hacking Tools
IoT Pen Testing
Module 19: Cloud Computing
Cloud Computing Concepts
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security Tools
Cloud Penetration Testing
Module 20: Cryptography
Public Key Infrastructure (PKI)
"I was able to pass the CEH exam on the last day of the course with just the courseware and instructor Juan help. I cannot say thank you enough."Paul. B
"The Instructor Alex made learning the concepts easy and was really helpful during the labs. He knows the material inside out and makes it easy to learn. I took the exam Friday at the end of class and passed."Jesse C.
"This is crazy amount of materials to cover in 5 days. I wasn't sure it was possible, but Alex was able to cover it and do labs with us. My entire group of 5 was able to pass the exam on Friday. Thanks Alex and TIA."Abe. K.
"I was trying to self-study for this exam for months with videos and books and was not able to get it done. I signed up for the CEH class with TIA and was certified in a week. It was a lot of work, but Alex just kept pushing me to stay with it. If you want to be CEH certified, this class is for you."Nelson L.