Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Cyberkraft
  4. Cyberkraft EC Council CEH Bootcamp

Cyberkraft EC Council CEH Bootcamp

Learn how to conduct penetration tests with EC-Council’s flagship certification. The C|EH provides you with hands-on experiences with the latest hacking tools and techniques so you can understand the exploits performed by real-world hackers. Use these skills to protect your organization’s assets and network. Practice with EC Council's Official CEH Labs to learn actual hacking tools to gain an understanding of techniques used by real Advanced Persistent Threats.
This course includes:
• 40 Hours of live instruction with our EC Council Trained and Certified Instructors
• 24 months subscription to Official EC Council Courseware
• 6 months access to the Official EC Council Labs
• 12 months access to EC Council Engage and Compete
• Official EC Council Video Library
• Lifetime access to Cyberkraft training materials and bootcamp recordings
• Exam voucher
• Five Exam Retakes

Provider Information

More courses from this provider:
Contact Information

Cyberkraft
1603 Capitol Ave, Suite 513J
Cheyenne, WY 82001

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
CKCEH12
Course Prerequisites

None

Training Purpose
Functional Development
Skill Development
Specific Audience
Academia
All
Contractor
Federal Employee
General Public
Delivery Method
Online, Instructor-Led
  • Online, Instructor-Led

Learning Objectives

Prepare students to pass their EC-Council CEH certification exam on their first attempt.
The course will follow the Official EC-Council Modules:
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov(link sends email). Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date:

You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies.

Would you like to participate in our survey?

If you accept you will be leaving the National Initiative for Cybersecurity Careers and Studies website and going to a third party site.
That site may have different privacy, security and accessibility policies than the National Initiative for Cybersecurity Careers and Studies site.
National Initiative for Cybersecurity Careers and Studies does not endorse any commercial products, services, programs or content on the third party website.
Thank you for visiting our site. We hope your visit was informative and enjoyable.