Ethical Hacking Bootcamp
Ethical Hacking Bootcamp provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. v13 powered with AI capabilities will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the ethical hacker course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.
This course prepares you for the EC-Council® Certified Ethical Hacker® (CEH®) exam 312-50. This course incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker
- Exam Number:
- 312-50
- Exam Name:
- Ethical Hacking
- Certifications:
- Ethical Hacking
Upcoming Dates
Class Date | Class Hours | Location | GTR | Price | |
---|---|---|---|---|---|
Live Online | $3499.00 | Register Quote | |||
Live Online | $3499.00 | Register Quote | |||
Live Online | $3499.00 | Register Quote | |||
Live Online | $3499.00 | Register Quote | |||
Live Online | $3499.00 | Register Quote | |||
Live Online | $3499.00 | Register Quote |
What's Included
- Courseware and Labs
- Boson ExSim-Max for Ethical Hacking
- Exam voucher and retake (if needed)
Course Outline
- Module 1: Introduction to Ethical Hacking
- Module 2: Footprinting and Reconnaissance
- Module 3: Scanning Networks
- Module 4: Vulnerability Analysis
- Module 5: System Hacking
- Module 6: Malware Threats
- Module 7: Sniffing
- Module 8: Social Engineering
- Module 9: Web Application Security
- Module 10: Hacking Wireless Networks
- Module 11: IoT and Cloud Security
Labs
- Lab 1: Using OSINT Tools for Information Gathering
- Lab 2: Advanced Google Hacking Techniques
- Lab 3: Network Scanning and OS Fingerprinting with Nmap
- Lab 4: Conducting Vulnerability Scanning and Assessment
- Lab 5: Exploit Research and Proof-of-Concept (PoC) Creation
- Lab 6: Password Cracking and Privilege Escalation Techniques
- Lab 7: Malware Analysis Using Cuckoo Sandbox
- Lab 8: Bypassing Anti-Virus Detection Techniques
- Lab 9: Packet Sniffing and Network Analysis with Wireshark
- Lab 10: Phishing Attacks Using Social Engineering Toolkit (SET)
- Lab 11: Exploiting Web Application Vulnerabilities
- Lab 12: Wireless Network Cracking with Aircrack-ng
- Lab 13: Exploiting IoT Devices and Cloud Environments
- Lab 14: Final Capture the Flag (CTF) Challenge
Military Requirements
In addition to validating your IT skills and networking training, CEH Certifications are a must for certain IT positions.
DoD Mandate: The DoD Directive 8570.01-M mandates all government personnel, civilians, and contractors with privileged access working on networks are required to receive industry IT certifications. This directive include the Certified Ethical Hacker across the Computer Network Defense Categories “CND”.
Certified Ethical Hacker, CEH, and EC-Council are registered trademarks of International Council of E-Commerce Consultants DBA EC-Council. All Boson products sold on this site are independently developed and are not affiliated with, nor have been sponsored or approved by EC-Council. All third party trademarks and/or registered trademarks referenced are the property of their respective owners.