Ethical Hacking Bootcamp

Ethical Hacking Bootcamp provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. v13 powered with AI capabilities will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the ethical hacker course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.

This course prepares you for the EC-Council® Certified Ethical Hacker® (CEH®) exam 312-50. This course incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker

Exam Number:
312-50
Exam Name:
Ethical Hacking
Certifications:
Ethical Hacking

Upcoming Dates

Apply
Class Date Class Hours Location GTR Price  
Date Range Date Range Live Online   $3499.00 Register Quote
Date Range Date Range Live Online   $3499.00 Register Quote
Date Range Date Range Live Online   $3499.00 Register Quote
Date Range Date Range Live Online   $3499.00 Register Quote
Date Range Date Range Live Online   $3499.00 Register Quote
Date Range Date Range Live Online $3499.00 Register Quote

What's Included

  • Courseware and Labs
  • Boson ExSim-Max for Ethical Hacking
  • Exam voucher and retake (if needed)

Course Outline

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Footprinting and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Vulnerability Analysis
  • Module 5: System Hacking
  • Module 6: Malware Threats
  • Module 7: Sniffing
  • Module 8: Social Engineering
  • Module 9: Web Application Security
  • Module 10: Hacking Wireless Networks
  • Module 11: IoT and Cloud Security

Labs

  • Lab 1: Using OSINT Tools for Information Gathering
  • Lab 2: Advanced Google Hacking Techniques
  • Lab 3: Network Scanning and OS Fingerprinting with Nmap
  • Lab 4: Conducting Vulnerability Scanning and Assessment
  • Lab 5: Exploit Research and Proof-of-Concept (PoC) Creation
  • Lab 6: Password Cracking and Privilege Escalation Techniques
  • Lab 7: Malware Analysis Using Cuckoo Sandbox
  • Lab 8: Bypassing Anti-Virus Detection Techniques
  • Lab 9: Packet Sniffing and Network Analysis with Wireshark
  • Lab 10: Phishing Attacks Using Social Engineering Toolkit (SET)
  • Lab 11: Exploiting Web Application Vulnerabilities
  • Lab 12: Wireless Network Cracking with Aircrack-ng
  • Lab 13: Exploiting IoT Devices and Cloud Environments
  • Lab 14: Final Capture the Flag (CTF) Challenge

Military Requirements

In addition to validating your IT skills and networking training, CEH Certifications are a must for certain IT positions.

DoD Mandate: The DoD Directive 8570.01-M mandates all government personnel, civilians, and contractors with privileged access working on networks are required to receive industry IT certifications. This directive include the Certified Ethical Hacker across the Computer Network Defense Categories “CND”.

Certified Ethical Hacker, CEH, and EC-Council are registered trademarks of International Council of E-Commerce Consultants DBA EC-Council. All Boson products sold on this site are independently developed and are not affiliated with, nor have been sponsored or approved by EC-Council. All third party trademarks and/or registered trademarks referenced are the property of their respective owners.