Certified Ethical Hacking Course: CEH Certification Boot Camp

Transform your career in 5 days

Are you ready to earn your EC-Council Certified Ethical Hacker (CEH) certification? This five-day intensive training boot camp immerses students in real-world scenarios to enable practical application of course concepts and higher retention. Get the knowledge you need to obtain certification and begin making an impact in your career now.

4.7 (8,755 ratings)

Affirm Financing available
Exam Pass Guarantee

Course essentials

EC-Council Certified Ethical Hacker (CEH) training at a glance

  • Method

    Live online, in-person, team onsite

  • Duration

    5 days

  • Experience

    0-1 year OS systems experience

  • Average salary

    $134,217

  • Meets 8570.1

    DoD Information Assurance requirements

What you'll learn

Ethical Hacking Training overview

Delve into the tools and techniques used by cybercriminals over five days. Gain in-depth training in ethical hacking methodologies through lectures and hands-on labs. Our cloud-hosted cyber range provides practical experience in reconnaissance, system access, vulnerability exploitation and data exfiltration.

You’ll gain the knowledge needed to obtain your EC-Council Certified Ethical Hacker (CEH) certification. This certification validates your ability to assess and measure threats to information assets and identify vulnerabilities in your organization's systems. With this certification in hand, you’re well-equipped to protect your organization from malicious actors.

Who should attend

Who Should Attend Image

This CEH boot camp is especially beneficial for:

  • Penetration and vulnerability testers
  • Cybersecurity analysts
  • Cybersecurity consultants
  • Offensive security professionals

Earning the Ethical Hacking (CEH) certification helps open doors to exciting career opportunities.

Learn more about the pre-requirements for earning the CEH.

Award-winning training you can trust

Don't take our word for it

Read our independent reviews via TrustRadius

  • 10 out of 10 March 04, 2024

    An excellent choice to keep up with cybersecurity education

    The field of information security is constantly evolving as new threats are discovered each day. Our consultants have to keep up with new knowledge and techniques to conduct pentesting, vulnerability remediation, computer forensic audits, and so on. Traditional training in cybersecurity is very expensive, lengthy, and lacks practical experience. When we found Infosec Skills we were impressed with the many themes available in their library, their focus, and also with the price, which is very economic in comparison with other alternatives. Also, their cyber ranges allow our employees to practice the skills needed in a very practical way. We are very happy to count on Infosec [Skills] as an educational ally.

    Karina Astudillo

    Karina Astudillo

    CEO (Chief Executive Officer)

  • 10 out of 10 March 01, 2024

    Fantastic Product

    Our security department is in its infancy and we use it daily to learn best practices and educate ourselves on tools that can be used to help secure our environment. There are a couple of staff members looking to obtain certifications and it's also used to prepare them for the test.

    Brian Shetter

    Brian Shetter

    Security Engineer / Analyst

  • 10 out of 10 August 28, 2023

    The top notch cyber security knowledge hub

    We have relied on Infosec Skills to get the latest data and information on cyber security. The company has welcoming staff that interacts freely with our members during training sessions. I have acquired top notch skills of discovering threats from internet. The frequent awareness data helps us to set policies of countering new forms of ransomware attacks. I have advanced my knowledge on modern cyber attacks and I can collaborate with my colleagues with confidence.

    Susan Davone

    Susan Davone

    Administrative Clerk

Ready to discuss your training goals? We've got you covered.

Complete the form and book a meeting with a member of our team to explore your learning opportunities.

Sorry, we're unable to load the form at the moment. Please check your browser's settings to confirm the form is not blocked. You can contact us and report the issue here: infosec.info@cengage.com.

Step 1

Step 2

Finish

Step 1

Step 2

Finish

Thanks! We look forward to meeting with you!

What's included

Everything you need to know

 Certification Logo
  • 90-day extended access to Boot Camp components, including class recordings
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Exam voucher
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Hands-on cyber ranges and labs
  • Knowledge Transfer Guarantee
  • Onsite proctoring of exam
  • Pre-study learning path
  • Unlimited practice exam attempts

What makes the Infosec Ethical Hacking (CEH) prep course different?

Our Ethical Hacking (CEH) training is backed with an Exam Pass Guarantee. This means if you don’t pass the exam on the first attempt, we’ll pay for your second exam at no additional cost to you!

 

The CEH course training materials are fully updated and synced with the latest version of the exam. In addition, you’ll gain access to the Ethical Hacking (CEH) prep course the moment you enroll, so you can prepare for and get the most out of your boot camp.

Before your boot camp

Prerequisites

To make the most of this Ethical Hacking training, it’s important to have a solid foundation in the following areas:

  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based operating systems
  • Grasp of the TCP/IP protocols

In addition, all you need to complete the Ethical Hacking Boot Camp is a stable internet connection and a computer capable of streaming activities.

Syllabus

Training schedule

Preparation (before the boot camp starts)
Infosec Skills 90 day subscription logo

Ethical hacking prep course

Day 1
Morning session

Introduction to ethical hacking

The first half of day one focuses on learning the job duties required of a penetration tester. You will learn the ins and outs of the various penetration testing methodologies required in order for an ethical hack to be used in a business or government setting. You will also delve deep into technical material, learning how to perform network reconnaissance against modern infrastructure.
Afternoon session

Passive reconnaissance and OSINT

Evening session

CTF Exercises

Schedule may vary from class to class

Day 2
Morning session

Network scanning

Having learned how to gather information about several targets, we begin day two with narrowing our attack by finding potentially vulnerable systems/services. You will master the art of network scanning and service identification, and gain a deeper understanding of how systems communicate using the TCP and UDP protocols.
Afternoon session

Target system identification, service enumeration and vulnerability scanning

Evening session

CTF Exercises

Schedule may vary from class to class

Day 3
Morning session

Exploitation

After gathering information about your target system, you will put all that hard work to use when you learn how to exploit those vulnerabilities. You will learn the skills to demonstrate a successful exploit of a vulnerability as well as how to gather additional credentials to exploit vulnerabilities in other systems. You will also learn useful social engineering techniques, including phishing, and methods of attacking physical security.
Afternoon session

Password security, social engineering, and physical security

Evening session

CTF Exercises

Schedule may vary from class to class

Day 4
Morning session

Deep target penetration and covering tracks

After compromising a target, you will extend your access to all vulnerable systems at your target organization and learn how to covertly exfiltrate data. The second half of day four covers attacking web-based applications and understanding SQL injection.
Afternoon session

Web application attacks

Evening session

CTF Exercises

Schedule may vary from class to class

Day 5
Morning session

Scripting

Day five is dedicated toward wireless security, using basic scripts for ethical hacking, covering your tracks and post-engagement activities. You will master the ability to sniff data, clean up all traces of your activities and learn best practices for writing reports and recommending mitigation strategies.

Exam review

Afternoon session

Take CEH exam

Schedule may vary from class to class

What's next?

After you finish the Certified Ethical Hacking Boot Camp

What's Next Image

The demand for skilled ethical hacking professionals is growing with the rise in data breaches and other malicious activities. Professionals who hold the Ethical Hacking (CEH) certification have many job titles beyond ethical hackers, such as:

  • Vulnerability tester
  • Penetration tester
  • Information security manager
  • Cyber security engineer
  • Security analyst
  • Security consultant
  • Forensic analyst

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Exam Prep

Infosec Skills access

Your Infosec Skills access extends 90 days past your boot camp. Take advantage of this additional time to prepare for your exam, pursue your next certification goal or earn continuing professional education (CPE) credits.

Career Opportunities

What are the career opportunities like CEH certified professionals?

Becoming a Certified Ethical Hacker is a great way to land an important role as a cybersecurity professional. These ethical hacking certifications are a common prerequisite for security-related job roles, particularly roles related to penetration testing, red teaming or requiring security clearance.

Plus, as a certified security professional, you will likely earn a higher salary than non-certified professionals. You can use credentials like the Ethical Hacking (CEH) to earn a higher wage. Learn more with our comprehensive guide on certified ethical hacker job outlook.

What job titles are most common for people with Ethical Hacking (CEH) certification?

Some common positions that this certification can help you land include:

  • Vulnerability tester icon

    Vulnerability tester

  • Information security manager icon

    Information security manager

  • Forensic analyst icon

    Forensic analyst

  • Penetration tester icon

    Penetration tester

Average Salary

CEH certification salary expectations

Certified Ethical Hackers earn a wide range of salaries based on experience, job title, location and other factors, but the average salary for a CEH holder is roughly $134,217. Read our comprehensive guide on CEH salaries to gain insights into the average salaries in the industry.

Guaranteed results

Our boot camp guarantees

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

FAQ

Frequently asked questions

Why is getting certified an important part of an ethical hacking career?

The EC-Council Certified Ethical Hacker (CEH) certification demonstrates to employers that you have an in-depth knowledge of ethical hacking. This industry-recognized certification verifies the training required to identify system weaknesses and vulnerabilities.

How much programming experience is typically required?

Programming experience isn't a requirement, but we recommend you have a solid understanding of at least one programming language, a familiarity with networking concepts like TCP/IP Protocol and experience using Linux and/or Unix.

How has the ethical hacking industry grown in recent years? Has the need for ethical hacking skills changed in the last five or ten years?

The ethical hacking industry has grown tremendously over the past decade and shows no signs of slowing down. The growing popularity of cloud computing and IoT devices has introduced a myriad of new vulnerabilities, further increasing the need for ethical hackers.

How difficult is it to find security flaws in companies with significant resources? Do hackers still get paid if they fail to find security flaws?

Your experience will vary by company, but security flaws are surprisingly common in the real world. If your penetration test fails to identify any security vulnerabilities, you will still be paid for your time and services.

Do I receive one-on-one mentoring from my Ethical Hacking Boot Camp instructor? How much feedback will I receive on my coursework?

One-to-one chat sessions with instructors are an important part of our live online Ethical Hacking Boot Camp. During the Ethical Hacking training, instructors focus 100% of their time and attention on students to ensure they learn the skills to pass the Ethical Hacking (CEH) exam.

Does the program offer training on ethical hacking specialization skills?

The Certified Ethical Hacker Boot Camp dives deep into various specialized ethical hacking concepts, such as:

  • Information gathering
  • Network scanning
  • Footprinting and reconnaissance
  • Exploitation
  • Penetration testing
  • Web application hacking 

Once you learn the basics, there are many other certifications that focus on specialized training under the larger umbrella of penetration testing and ethical hacking.

Meets 8570.1 requirements

Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.

Enroll in a boot camp

December 9, 2024 - December 13, 2024

Online only | Start time: 7:30 AM (CST)

January 13, 2025 - January 17, 2025

Online only | Start time: 7:30 AM (CST)

January 27, 2025 - January 31, 2025

Online only | Start time: 6:30 AM (CST)

February 24, 2025 - February 28, 2025

Online only | Start time: 8:30 AM (CST)

March 24, 2025 - March 28, 2025

Online only | Start time: 7:30 AM (CST)

April 7, 2025 - April 11, 2025

Online only | Start time: 9:30 AM (CST)

April 28, 2025 - May 2, 2025

Dulles, Virginia | Start time: 6:30 AM (CST)

May 12, 2025 - May 16, 2025

Online only | Start time: 7:30 AM (CST)

June 9, 2025 - June 13, 2025

Online only | Start time: 8:30 AM (CST)

July 14, 2025 - July 18, 2025

Online only | Start time: 7:30 AM (CST)