Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)

This comprehensive boot camp teaches you how to use the tools and techniques used by cybercriminals to perform an ethical hack on your organization. You will learn ethical hacking methodologies and gain hands-on hacking experience in our cloud-hosted cyber range, including reconnaissance, gaining access to systems, exploiting vulnerabilities, and exfiltrating data.

You will gain the ability to quantitatively assess and measure threats to information assets — and discover where your organization...

SHARE
5 Days
Open Enrollment
Offered in partnership with your preferred school

George Mason University

Change School
Learning method

for additional information

Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)

Enroll Now

Course code: LBC105

What you will learn

  • Ways to use the tools and techniques used by cybercriminals to help protect your company against attacks
  • Ethical hacking methodologies and hands-on hacking experience in a cloud-hosted cyber range
  • How to assess and measure threats to information assets
  • How to compromise web servers, virtual machines, databases, routers, and firewalls, and then put it all together in an unscripted evening Capture the Flag (CTF) exercise

How you will benefit

  • Practice your skills in the Ethical Hacking Cyber Range
  • Access to hands-on labs brings you up to speed with the latest threats to which your organization is most vulnerable
  • Dozens of hands-on exercises and Capture the Flags (CTFs)
  • Prepare to earn two in-demand certifications: EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+

How the course is taught

  • Live Online, Instructor-Led
  • 5 Days to complete Boot Camp
  • 90-day extended access to all boot camp materials
  1. Day 1- Ethical Hacking & Penetration Testing Methodologies
    1. Security testing methodologies
    2. The ethical hacking profession
    3. Planning and scoping an engagement
    4. Legal and compliance considerations
    5. Ethical hacking methodologies
    6. Tools of the trade
    7. Linux overview
    8. Passive intelligence gathering
    9. Abusing DNS and SNMP
    10. Security testing methodologies
  2. Day 2 - Network Scanning and Service Identification
    1. Understanding TCP packets and structures
    2. Passive network discovery and scanning
    3. TCP scanning
    4. Using differences in RFC implementations to your advantage
    5. Scanning through firewalls
    6. How to prevent the discovery of your reconnaissance activities
    7. Using zombies to mask network scanning
    8. Avoiding IDS/IPS detection
    9. Proper identification of services
    10. Vulnerability identification
  3. Day 3 - Vulnerabilities
    1. Vulnerability life cycles
    2. Types of vulnerabilities
    3. Flaws in encryption
    4. Configuration errors
    5. Buffer overflows
    6. Stack overflows
    7. Vulnerability mapping
    8. Exploit utilization and delivery methods
    9. Client side exploits
    10. Server side exploits
    11. Password security
    12. Social engineering techniques
    13. Attacking physical controls
    14. Hashing
    15. Rainbow tables
    16. Attacking Windows password security
    17. Weaknesses in Windows authentication protocols
  4. Day 4 - Exfiltration of Data & SQL Injection
    1. Use of Trojans
    2. Redirecting ports to thwart firewall rules
    3. Avoiding anti-virus detection
    4. Lateral movement and persistence
    5. Use of keyloggers
    6. IDS operations and avoidance
    7. Encrypting your communications
    8. Protocol abuse for covert communications
    9. Creating custom encryption tunneling applications
    10. E-shoplifting
    11. XSS attacks
    12. Cross site forgery
    13. Circumventing authentication
    14. SQL injection discovery and exploitation
    15. SQL data extraction
  5. Day 5 - Wireless Security, Basic Scripts for Ethical Hacking & Covering Your Tracks
    1. Sniffing in different environments
    2. Attack sniffers
    3. Man-in-the-middle attacks
    4. Wireless networking
    5. Shared key authentication weaknesses
    6. WEP/WPA/WPA2 cracking
    7. Anti-forensics
    8. Log modification/deletion
    9. Rootkits
    10. Introduction to scripting
    11. Common script components
    12. Writing effective reports
    13. Providing mitigation recommendations
    14. CEH exam review
    15. PenTest+ exam review

Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.

Prerequisites:

To attend the boot camp, you will need to have:

  • A Firm understanding of the Windows Operating System.
  • Exposure to the Linux Operating System or other Unix-based operating systems.
  • A Grasp of the TCP/IP protocols.

Certification Requirements:

To sit for the CEH exam, you will need to meet the following requirements:

  • Complete the exam application.
  • The CEH (ANSI) program requires the candidate to have two years of work experience in the Information Security domain and should be able to provide proof of the same as validated through the application process unless the candidate attends official training.

To Sit for the CompTIA PenTest+ exam, you will need to meet the following is recommended:

  • Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC, Mac, or Chromebook.
  • A microphone.
  • Speakers.
  • Webcam.

Software Requirements:

  • PC: Windows 7 or later.
  • Mac: macOS 10.7 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
  • Microsoft Word Online.
  • Adobe Acrobat Reader.
  • Zoom Meetings.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The student materials required for this course are included in enrollment and will be available online.

A Certified Ethical Hacker’s salary can vary. According to Certification Magazine’s 2022 Salary Survey reported in March 2022, the average salary of a certified ethical hacker was $128,000 in the US and $96,030 worldwide. Certified Ethical Hackers report making an average of $108,747 in December 2022, according to Glassdoor.

Ethical hacking is the practice of attempting to bypass the security of a particular system in order to identify threats and the potential for data breaches within a network. Unlike malicious hacking, this process of ethical hacking is planned, authorized, and completely legal. By locating potential threats and weaknesses, companies can strengthen and reinforce their networks—shielding them against future attacks.

Professionals who obtain the EC-Council CEH and CompTIA PenTest+ certifications will open the door to a variety of in-demand ethical hacking jobs and cybersecurity roles such as penetration tester, vulnerability tester, cybersecurity analyst, cybersecurity consultant, and offensive security professional. These certifications are ideal for any IT professional with a desire to learn about ethical hacking and develop their penetration testing skills.

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Lightcast, previously known as Burning Glass Technologies, reports that the median annual salary for penetration testers is $100,329. While ZipRecruiter lists the penetration tester salary as $116,323 on average per year.

Yes, you will be prepared for the EC-Council Certified Ethical Hacker (CEH) and the CompTIA PenTest+ certification exams and receive an exam voucher with your enrollment.

To sit for the CEH exam, you will need to meet the following requirements:

  • Complete the exam application
  • The CEH (ANSI) program requires the candidate to have two years of work experience in the Information Security domain and should be able to provide a proof of the same as validated through the application process unless the candidate attends official training.

To sit for the CompTIA PenTest+ exam, the following experience is recommended:

  • Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

You can register for the boot camp whenever you are ready. Our team will help you select the session that will best fit you.

Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country's regulations prior to enrolling in courses that prepare for certification.

The boot camp is 5 days in length. You will have 3 months from the completion of the boot camp to access all boot camp materials.

The boot camp instructor will be available during the session to answer any questions. You will also have access to the Infosec Skills platform where you will be able to create support requests, as needed.

Upon successful completion of your boot camp session, you will be awarded a certificate of completion from Infosec and the school or organization that you registered through.

ed2go courses will help you gain the skills and knowledge you need to take the next step in your career and stand out to potential employers. However, you should always research the job market in your area before enrolling.

ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA, and Pell Grant. In some states, vocational rehab or workforce development boards may provide funding to take our courses. Additionally, you may qualify for financial assistance if you meet certain requirements. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us."

;