The Certified Ethical Hacker (CEH) also known as the Certified Network Defense Architect (CNDA) by EC-Council is one of the most respected security certification in the world. Information systems security professionals uses this certifications to show organizations that not only do they understand security concepts but can conduct an actual penetration test. This course will prepare students for the CEH exam within 5 days. Our documented 99% passing rate, has allowed us to train hundreds of students to pass their CEH exam on the first try.
We use a large variety of labs and lectures to ensure students are ready for the exam right after class. This CEH course will immerse students in an interactive environment where they will be shown how to scan, test, hack and secure systems. The lab intensive environment gives each student in-depth knowledge and practical experience needed not only to secure networks but also to hack them.
CEH EXAM
Students must pass one exam, with 125 questions in 240
minutes to become CEH certified. Students can take the certification exam on
the last day of the Boot Camp. One exam voucher is included in the course
tuition.
CEH COURSE LABS
This course prepares students for the
actual certification exam using a series lectures and hands on labs to get
students ready for the for the exam and real world.
Some of the hands on labs will include conducting footprinting of a network,
enumerating systems, finding vulnerabilities, hacking systems, installing malware,
sniffing network traffic, conducting social engineering,
evading IDS and firewalls, hacking web servers, hacking web applications, hacking
wireless networking, hacking mobile phones, hacking the cloud, and using
cryptography.
Don't spend thousands of dollars more for the same or a less quality CEH course. We are an EC-Council Accredited training center and all courses, materials, and instructor are EC-Council authorized.
Based on a monthly survey of our enrolled students, who were able to pass after attending our course.
If after the first class you are not happy with our instructor or training environment, let us know on the first day and we will issue a full refund of the course tuition.
You can retake the course as many times as needed completely free.
Reduced pricing & customized training available for companies and government agencies.
If you cannot pass the CEH exam after 2 retakes we will refund the full course tuition. Must take the exams within 6 months from your first class completion
Our CEH certified and licensed instructors will ensure students only get the best in training. Our instructors have taught thousands of classes is the last 15 years.
Others | ||
---|---|---|
Small class size. | (classes with 18+ students) | |
5 Days of Training | ||
Instructor with real world Experience | (Instructors with no real world Experience) | |
Lowest price guaranteed | (Most schools are above $2,500) | |
Money Back Guarantee. If you are not happy with the course after the first class | (If you are not happy with the course, you will not get are a full refund) | |
Live instructor led training | ||
Licensed School | (Unlicensed, unauthorized training) | |
Online or Classroom, live instructor training. | (Just classroom or online classes) | |
Realistic Mock Exam | (No Exam or unrealistic) | |
Over 1,100 practice questions | (Most offer a few questions to practice) | |
Allows you to speak to the instructor before you start the class. | (You never meet the instructor until the class starts) | |
Unlimited free retakes of the course for up to one year. | (No retakes allowed) | |
Updated course material to match the current exam topics | (Training material not updated to the latest exam content) |
Continuing Education Courses only for businesses, government contractors, and government employees.
Yes this course is has many labs at the end of each lessons, such as SQL injections, web scanning, and system hacking.
Yes, we are EC-Council Accredited Training Center. All course material are EC-Council authorized.
Yes you could. If you sign up for a classroom course you can attend a few days Online. Also if you sign up for an Online course you can attend a few days in the classroom.
We only hire the best instructors. Our instructors for CEH must have a minimum of 10 years of experience in the security industry and at least 5 years of teaching experience. Call us if you would like to speak to the instructor, who would be teaching your class.
Yes this course does include all books and 1 exam voucher. We are an authorized testing center. When you are finish with the course you can schedule the exam with us.
Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rates, and guarantee. The Technical Institute of America offers the lowest price, has one of the best passing rates, and an excellent guarantee. As a New York State licensed school and Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer the dual money back guarantee.
No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.
Yes we offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class. E.g. if you miss a Saturday class, attend the following week evening course to make it up.
Module 01: Introduction to Ethical Hacking
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Incident Management Process
Responsibilities of an Incident Response Team.
Information Security Laws and Standards
Module 02: Footprinting and Reconnaissance
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Website Footprinting
Email Footprinting
Competitive Intelligence
Whois Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Pen Testing
Module 03: Scanning Networks
Network Scanning Concepts
Scanning Tools
Scanning Techniques
Scanning Beyond IDS and Firewall
Banner Grabbing
Draw Network Diagrams
Network Discovery Tools for Mobile
Scanning Pen Testing
Module 04: Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
SMTP and DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Enumeration Pen Testing
Module 05: Vulnerability Analysis
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 06: System Hacking
System Hacking Concepts
Cracking Passwords
Password Recovery Tools
Microsoft Authentication
How Hash Passwords Are Stored in Windows SAM?
NTLM Authentication Process
Kerberos Authentication
Password Salting
Tools to Extract the Password Hashes
Password Cracking Tools
How to Defend against Password Cracking
How to Defend against LLMNR/NBT-NS Poisoning
Escalating Privileges
Hiding Files
What is Steganography?
Covering Tracks
Penetration Testing
Module 07: Malware Threats
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Countermeasures
Anti-Malware Software
Malware Penetration Testing
Module 08: Sniffing
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Sniffing Tools
Countermeasures
Sniffing Detection Techniques
Sniffing Pen Testing
Module 09: Social Engineering
Social Engineering Concepts
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures
Social Engineering Pen Testing
Module 10: Denial-of-Service
DoS/DDoS Concepts
DoS/DDoS Attack Techniques
Botnets
DDoS Case Study
DoS/DDoS Attack Tools
Countermeasures
DoS/DDoS Protection Tools
DoS/DDoS Penetration Testing
Module 11: Session Hijacking
Session Hijacking Concepts
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
Countermeasures
Penetration Testing
Module 12: Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot Solutions
Evading IDS
Evading Firewalls
IDS/Firewall Evading Tools
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Penetration Testing
Module 13: Hacking Web Servers
Web Server Concepts
Web Server Attacks
Web Server Attack Methodology
Web Server Attack Tools
Countermeasures
Patch Management
Web Server Security Tools
Web Server Pen Testing
Module 14: Hacking Web Applications
Web App Concepts
Web App Threats
Hacking Methodology
Web App Hacking Tools
Countermeasures
Web App Security Testing Tools
Web App Pen Testing
Module 15: SQL Injection
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
Countermeasures
Module 16: Hacking Wireless Networks
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Countermeasures
Wireless Security Tools
Wireless Pen Testing
Module 17: Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Spyware
Mobile Device Management
Mobile Security Guidelines and Tools
Mobile Pen Testing
Module 18: IoT Hacking
IoT Concepts
IoT Attacks
IoT Hacking Methodology
IoT Hacking Tools
Countermeasures
IoT Pen Testing
Module 19: Cloud Computing
Cloud Computing Concepts
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing
Module 20: Cryptography
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
"I was able to pass the CEH exam on the last day of the course with just the courseware and instructor Juan help. I cannot say thank you enough."
Paul. B
"The Instructor Alex made learning the concepts easy and was really helpful during the labs. He knows the material inside out and makes it easy to learn. I took the exam Friday at the end of class and passed."
Jesse C.
"This is crazy amount of materials to cover in 5 days. I wasn't sure it was possible, but Alex was able to cover it and do labs with us. My entire group of 5 was able to pass the exam on Friday. Thanks Alex and TIA."
Abe. K.
"I was trying to self-study for this exam for months with videos and books and was not able to get it done. I signed up for the CEH class with TIA and was certified in a week. It was a lot of work, but Alex just kept pushing me to stay with it. If you want to be CEH certified, this class is for you."
Nelson L.