EC-Council Accredited Training Center
The Certified Ethical Hacker (CEH) & Certified Network Defense Architect (CNDA) by EC-Council are some of the most respected security certifications in the world. Information systems security professionals use this certification to show organizations that they understand security concepts and penetration testing.
This course is great for anyone looking to pass the Certified Ethical Hacker exam 312-50. This course teaches the latest exam objectives for version 10.
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
All courses are live instructor-led. If you have a group of employees looking to get certified, call us for a customized quote. We offer great discounts and onsite training for groups of two or more.
Students will be taking the certification exam on the last day of the Boot Camp. Take this course and obtain the Certified Ethical Hacker certification in just 5 days. Don't spend thousands of dollars more for the same class with less experienced instructors and poor classroom quality, register with us to save and learn fast.
|Small class size.||(classes with 18+ students)|
|5 Days of Training|
|Instructor with real world Experience||(Instructors with no real world Experience)|
|Lowest price guaranteed||(Most schools are above $2,500)|
|Money Back Guarantee. If you are not happy with the course after the first class||(If you are not happy with the course, you will not get are a full refund)|
|Live instructor led training|
|Licensed School||(Unlicensed, unauthorized training)|
|Online or Classroom, live instructor training.||(Just classroom or online classes)|
|Realistic Mock Exam||(No Exam or unrealistic)|
|Over 1,100 practice questions||(Most offer a few questions to practice)|
|Allows you to speak to the instructor before you start the class.||(You never meet the instructor until the class starts)|
|Unlimited free retakes of the course for up to one year.||(No retakes allowed)|
|Updated course material to match the current exam topics||(Training material not updated to the latest exam content)|
Yes this course is has many labs at the end of each lessons, such as SQL injections, web scanning, and system hacking.
Yes, we are EC-Council Accredited Training Center. All course material are EC-Council authorized.
Yes you could. If you sign up for a classroom course you can attend a few days Online. Also if you sign up for an Online course you can attend a few days in the classroom.
We only hire the best instructors. Our instructors for CEH must have a minimum of 10 years of experience in the security industry and at least 5 years of teaching experience. Call us if you would like to speak to the instructor, who would be teaching your class.
Yes this course does include all books and 1 exam voucher. We are an authorized testing center. When you are finish with the course you can schedule the exam with us.
Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rates, and guarantee. The Technical Institute of America offers the lowest price, has one of the best passing rates, and an excellent guarantee. As a New York State licensed school and Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer the dual money back guarantee.
No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.
Yes we offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class. E.g. if you miss a Saturday class, attend the following week evening course to make it up.
Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands-on understanding and experience in Ethical Hacking.
Module 01: Introduction to Ethical Hacking
Information Security Overview
Information Security Threats and Attack Vectors
Ethical Hacking Concepts
Information Security Controls
Incident Management Process
Responsibilities of an Incident Response Team.
Information Security Laws and Standards
Module 02: Footprinting and Reconnaissance
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Footprinting through Social Engineering
Footprinting Pen Testing
Module 03: Scanning Networks
Network Scanning Concepts
Scanning Beyond IDS and Firewall
Draw Network Diagrams
Network Discovery Tools for Mobile
Scanning Pen Testing
Module 04: Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Pen Testing
Module 05: Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 06: System Hacking
System Hacking Concepts
Password Recovery Tools
How Hash Passwords Are Stored in Windows SAM?
NTLM Authentication Process
Tools to Extract the Password Hashes
Password Cracking Tools
How to Defend against Password Cracking
How to Defend against LLMNR/NBT-NS Poisoning
What is Steganography?
Module 07: Malware Threats
Virus and Worm Concepts
Malware Penetration Testing
Module 08: Sniffing
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Detection Techniques
Sniffing Pen Testing
Module 09: Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Impersonation on Social Networking Sites
Social Engineering Pen Testing
Module 10: Denial-of-Service
DoS/DDoS Attack Techniques
DDoS Case Study
DoS/DDoS Attack Tools
DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing
Module 11: Session Hijacking
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Module 12: Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot Solutions
IDS/Firewall Evading Tools
IDS/Firewall Evasion Countermeasures
Module 13: Hacking Web Servers
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Web Server Security Tools
Web Server Pen Testing
Module 14: Hacking Web Applications
Web App Concepts
Web App Threats
Web App Hacking Tools
Web App Security Testing Tools
Web App Pen Testing
Module 15: SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Module 16: Hacking Wireless Networks
Wireless Hacking Methodology
Wireless Hacking Tools
Wireless Security Tools
Wireless Pen Testing
Module 17: Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Mobile Device Management
Mobile Security Guidelines and Tools
Mobile Pen Testing
Module 18: IoT Hacking
IoT Hacking Methodology
IoT Hacking Tools
IoT Pen Testing
Module 19: Cloud Computing
Cloud Computing Concepts
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security Tools
Cloud Penetration Testing
Module 20: Cryptography
Public Key Infrastructure (PKI)
"I was able to pass the CEH exam on the last day of the course with just the courseware and instructor Juan help. I cannot say thank you enough."Paul. B
"The Instructor Alex made learning the concepts easy and was really helpful during the labs. He knows the material inside out and makes it easy to learn. I took the exam Friday at the end of class and passed."Jesse C.
"This is crazy amount of materials to cover in 5 days. I wasn't sure it was possible, but Alex was able to cover it and do labs with us. My entire group of 5 was able to pass the exam on Friday. Thanks Alex and TIA."Abe. K.
"I was trying to self-study for this exam for months with videos and books and was not able to get it done. I signed up for the CEH class with TIA and was certified in a week. It was a lot of work, but Alex just kept pushing me to stay with it. If you want to be CEH certified, this class is for you."Nelson L.