Ethical Hacking Dual Certification Boot Camp
Earn Your CEH and PenTest+ Credentials
Did you know the demand for information security analysts, which includes ethical hackers, is projected to increase 33% by 2030, with professionals in this field having a median annual wage of $102,600?
This five-day boot camp powered by Infosec, a leading provider of cybersecurity training, will teach you how to use ethical hacking methodologies to legally and ethically discover security vulnerabilities before cybercriminals exploit them. Get hands-on experience with the same tools and techniques used by malicious hackers while also preparing to pass the EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+ certification exams.
Everything you need to get certified will be provided, including unlimited practice exam attempts and both certification exam vouchers. You can even review boot camp materials and replay daily video lessons for a year. With your provided Infosec Skills subscription, advance your skills with a one-year subscription to hundreds of additional on-demand courses and labs.
Testimonial:
“I have never had a better experience in any previous training. The instructor gave the information needed for the test and also shared his real-world experience to bring it together. I would not hesitate recommending this class to anyone interested in CEH.”
- Online, immersive format
- 5 days of live, expert-led training
- Learn in a cohort of peers
- Limited seats per session
To enroll, you should have a firm understanding of the Windows Operating System, exposure to the Linux Operating System or other Unix-based operating systems, and a grasp of the TCP/IP protocols.
This boot camp is ideal for penetration and vulnerability testers, cybersecurity analysts and consultants, offensive security professionals, or anyone interested in learning more about ethical hacking and developing their penetration testing skills.
In our Ethical Hacking Dual Certification Boot Camp, you will explore:
- Ways to use the tools and techniques used by cybercriminals to help protect your company against attacks
- Ethical hacking methodologies and hands-on hacking experience in a cloud-hosted cyber range
- How to assess and measure threats to information assets
- How to compromise web servers, virtual machines, databases, routers, and firewalls, and then put it all together in an unscripted evening Capture the Flag (CTF) exercise
Ethical Hacking & Penetration Testing Methodologies
- Security testing methodologies
- The ethical hacking profession
- Planning and scoping an engagement
- Legal and compliance considerations
- Ethical hacking methodologies
- Tools of the trade
- Linux overview
- Passive intelligence gathering
- Abusing DNS and SNMP
- Security testing methodologies
Network Scanning and Service Identification
- Understanding TCP packets and structures
- Passive network discovery and scanning
- TCP scanning
- Using differences in RFC implementations to your advantage
- Scanning through firewalls
- How to prevent the discovery of your reconnaissance activities
- Using zombies to mask network scanning
- Avoiding IDS/IPS detection
- Proper identification of services
- Vulnerability identification
Vulnerabilities
- Vulnerability life cycles
- Types of vulnerabilities
- Flaws in encryption
- Configuration errors
- Buffer overflows
- Stack overflows
- Vulnerability mapping
- Exploit utilization and delivery methods
- Client-side exploits
- Server side exploits
- Password security
- Social engineering techniques
- Attacking physical controls
- Hashing
- Rainbow tables
- Attacking Windows password security
- Weaknesses in Windows authentication protocols
Exfiltration of Data & SQL Injection
- Use of Trojans
- Redirecting ports to thwart firewall rules
- Avoiding anti-virus detection
- Lateral movement and persistence
- Use of keyloggers
- IDS operations and avoidance
- Encrypting your communications
- Protocol abuse for covert communications
- Creating custom encryption tunneling applications
- E-shoplifting
- XSS attacks
- Cross-site forgery
- Circumventing authentication
- SQL injection discovery and exploitation
- SQL data extraction
Wireless Security, Basic Scripts for Ethical Hacking & Covering Your Tracks
- Sniffing in different environments
- Attack sniffers
- Man-in-the-middle attacks
- Wireless networking
- Shared key authentication weaknesses
- WEP/WPA/WPA2 cracking
- Anti-forensics
- Log modification/deletion
- Rootkits
- Introduction to scripting
- Common script components
- Writing effective reports
- Providing mitigation recommendations
- CEH exam review
- PenTest+ exam review
Enroll Now
FAQs About Ethical Hacking Boot Camp
Earning ethical hacking certifications like the CEH and PenTest+ is a great way to break into a career as a cybersecurity professional. Many organizations require applicants to have a CEH certification to qualify for security-related jobs, especially roles related to penetration testing and social engineering or those requiring security clearance. It is likely that you will command a higher salary than non-certified individuals, and you can use the EC-Council CEH and CompTIA PenTest+ certifications to negotiate a higher salary when entering a new role.
There are many roles for ethical hackers that are currently in high demand across the U.S. Some of the most common job titles include network security administrator, information security analyst, computer network defense analyst, penetration tester, and forensic analyst.
The need for ethical hackers has grown tremendously over the last 10 years and demand is only accelerating. Ethical hackers fall under the U.S. Bureau of Labor Statistics (BLS) category of Information Security Analysts, and the BLS is predicting a 33% growth in jobs in this area over the next decade.
Getting a certification that validates your ability to protect valuable information will put you at the top of employer candidate lists. The CEH and PenTest+ certifications are well known in the industry for providing individuals with an in-depth view of ethical hacking and penetration testing.
Yes, this boot camp prepares you for certifications that meet U.S. Department of Defense Directive 8570.1 requirements for government employees or contractors engaged in work related to information security.
Registration and Enrollment
This course is a self-paced course that can be completed 100% online. Open enrollment means that you can register and start the course whenever you are ready. Access to your course can take 24-48 business hours.