Discover Classes. Earn Rewards.

Ethical Hacking Dual Cert Boot Camp is unfortunately unavailable

Thankfully we have 9 other Cybersecurity Classes for you to choose from. Check our top choices below or see all classes for more options.

Fullstack Academy Cybersecurity Analytics Bootcamp

Fullstack Academy @ Virtual Classroom

Transform your career and join the fight against cybercrime with Fullstack Academy's immersive Fullstack Cybersecurity Analytics Bootcamp. Gain the defensive and offensive cybersecurity skills you need to succeed in this high-growth field. Don't miss out on the opportunity to build a successful cybersecurity career.

Beginner 18 and older
$14,995

60 sessions

Gift it!

Certified Information Systems Security Professional

Technical Institute of America @ Virtual Classroom

Become a cybersecurity expert with the nation's leading provider of CISSP certification training. Join thousands of successful students and unlock exclusive resources and networking opportunities with an (ISC)² membership. Prove your skills, advance your career, and earn the salary you deserve with the Technical Institute of America.

(632) All levels 18 and older
$1,499

10 sessions

Gift it!

CompTIA Security+ Certification (Virtual)

Technical Institute of America @ Virtual Classroom

Gain the knowledge and skills to protect information and secure networks with the CompTIA Security+ Certification course at the Technical Institute of America. Prepare for the Security+ exam through lectures, hands-on labs, and practice questions. Become a certified security professional with TIA's top training center.

(632) Beginner 18 and older
$699

4 sessions

Gift it!

Certified Cloud Security Professional (Virtual)

Technical Institute of America @ Virtual Classroom

Become a Certified Cloud Security Professional with the highly popular CCSP certification course by (ISC)². Master advanced test-taking techniques and receive customized study materials to ensure your success on the exam. Prepare to pass on your first try and join the ranks of industry experts in cloud security.

(632) All levels 18 and older
$1,499

5 sessions

Gift it!

Certified Info Systems Security Professional CISSP

Computer Training Source, Inc. @ Online Classroom

Master the eight CISSP domains and gain the skills and knowledge needed to thrive in the information system security field with this premier certification course from Computer Training Source, Inc.

(21) All levels 18 and older
$3,995

10 sessions

Gift it!
See all Cybersecurity classes Online

Ethical Hacking Dual Cert Boot Camp

  • All levels
  • 18 and older
  • $4,451
  • 2112 S Arlington Heights Rd, Chicago, IL
  • 40 hours over 5 sessions

Start Dates (0)

  • $4,451
  • Wingate by Wyndham Arlington Heights @ 2112 S Arlington Heights Rd, Chicago, IL 60005
  • 40 hours over 5 sessions
Showing 10 of 0

Class Description

Description

What you'll learn in this cybersecurity training:

Discover vulnerabilities before the bad guys do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black-hat hackers with attention-getting lectures and hands-on labs.

This boot camp teaches you how to use the tools and techniques used by cybercriminals to perform a white-hat, ethical hack on your organization. You’ll learn ethical hacking methodologies and gain hands-on hacking experience in our cloud-hosted cyber range, including reconnaissance, gaining access to systems, exploiting vulnerabilities and exfiltrating data.

You’ll leave with the ability to quantitatively assess and measure threats to information assets — and discover where your organization is most vulnerable to hacking. This boot camp also prepares you to earn two in-demand certifications: EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+.

What's included?

93% pass rate — the best in the industry

  • Five days of hands-on ethical hacking training
  • Infosec proprietary digital courseware (physical textbooks available to purchase)
  • EC-Council Certified Ethical Hacker (CEH) exam voucher
  • CompTIA PenTest+ exam voucher
  • Immediate access to in-depth ethical hacking pre-study course
  • 90-day access to cyber range (Flex Pro)
  • 90-day access to replays of daily lessons (Flex Pro)
  • Curated videos from other top-rated instructors (add-on)
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee (Flex Pro)

Hands-on labs

Hundreds of exercises in over 20 separate hands-on labs bring you up to speed with the latest threats to which your organization is most vulnerable. Practice penetration testing in our virtualized environment that simulates a full range of servers and services used in a real company. Learn how to  compromise web servers, virtual machines, databases, routers and firewalls, and then put it all together in an unscripted evening Capture the Flag (CTF) exercise.

CTF exercises are an opportunity for you to practice your hacking skills in a real-world environment. Infosec sets up a mock company that you can freely attack without having to worry about damaging production systems. The purpose of the CTF exercises is to ensure you understand how to apply the skills you learned during the day to a real-world, ethical hacking scenario.

Who should attend?

  • Security analysts
  • Security consultants
  • Security researchers
  • Anyone with a desire to learn about ethical hacking
  • and develop their penetration testing skills

Prerequisites

  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based operating system
  • Grasp of the TCP/IP protocols

Dual certification

Authorized training partner

Infosec is an authorized training partner of EC-Council and CompTIA, and we’ve won awards from both organizations for our boot camps. We go beyond the material covered in the CEH and PenTest+ to provide you with a well-rounded set of hacking and pentesting skills.

The EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+ are two of the most in-demand hacking certifications. Infosec instructors found around 80% of the material overlaps and students get the best value by training for both certifications at the same time.

Ethical Hacking Boot Camp details

Day 1

The first half of day one focuses on learning the job duties required of a penetration tester. You will learn the ins and outs of the various penetration testing methodologies required in order for an ethical hack to be used in a business or government setting. You will also delve deep into technical material, learning how to perform network reconnaissance against modern infrastructure.

Lectures include:

  • Security testing methodologies
  • The ethical hacking profession
  • Planning and scoping an engagement
  • Legal and compliance considerations
  • Ethical hacking methodologies
  • Tools of the trade
  • Linux overview
  • Passive intelligence gathering
  • Abusing DNS
  • Abusing SNMP
  • Security testing methodologies

Some of the instructor-led hands-on lab exercises:

  • Linux fundamentals
  • Passive intelligence gathering
  • Understanding the Domain Naming System
  • Enumerating DNS entries to develop a focused attack strategy
  • Attacking the Domain Naming System
  • Discovering SNMP vulnerabilities and flaws
  • Enumerating SNMP information
  • Brute forcing SNMP community strings
  • Capture the Flag exercises

Day 2

Having learned how to gather information about several targets, we begin day two with narrowing our attack by finding potentially vulnerable systems/services. You will master the art of network scanning and service identification, and gain a deeper understanding of how systems communicate using the TCP and UDP protocols

Lectures include:

  • Understanding TCP packets and structuresPassive network discovery and scanning
  • TCP scanning
  • Using differences in RFC implementations to your advantage
  • Scanning through firewalls
  • How to prevent the discovery of your reconnaissance activities
  • Using zombies to mask network scanning
  • Avoiding IDS/IPS detection
  • Proper identification of services
  • Vulnerability identification

Some of the hands-on lab exercises include:

  • Packet analysis
  • Obtaining authentication credentials via packet capture
  • Network scanning
  • Target scanning of potentially vulnerable targets
  • Remaining undetected while performing a network scan
  • Enumerating services and identifying vulnerabilities
  • Capture the Flag exercises

Day 3

After gathering information about your target system, you will put all that hard work to use when you learn how to exploit those vulnerabilities. You will learn the skills to demonstrate a successful exploit of a vulnerability as well as how to gather additional credentials to exploit vulnerabilities in other systems. You will also learn useful social engineering techniques, including phishing, and methods of attacking physical security.

Lectures include:

  • Vulnerability life cycles
  • Types of vulnerabilities
  • Flaws in encryption
  • Configuration errors
  • Buffer overflows
  • Stack overflows
  • Vulnerability mapping
  • Exploit utilization and delivery methods
  • Client side exploits
  • Server side exploits
  • Password security
  • Social engineering techniques
  • Attacking physical controls
  • Hashing
  • Rainbow tables
  • Attacking Windows password security
  • Weaknesses in Windows authentication protocols
  • Rainbow tables

Some of the hands-on lab exercises include:

  • Gaining unauthorized access to systems
  • Use of various payloads to increase privileges
  • Keystroke logging
  • DLL injection attack
  • Exploit server side applications
  • Gather password hashes
  • Exploit weaknesses in authentication protocols
  • Capture the Flag exercises

Day 4

After compromising a target, you will extend your access to all vulnerable systems at your target organization and learn how to covertly exfiltrate data. The second half of day four covers attacking web-based applications and understanding SQL injection.

Lectures include:

  • Use of Trojans
  • Redirecting ports to thwart firewall rules
  • Avoiding anti-virus detection
  • Lateral movement and persistence
  • Use of keyloggers
  • IDS operations and avoidance
  • Encrypting your communications
  • Protocol abuse for covert communications
  • Creating custom encryption tunneling applications
  • E-shoplifting
  • XSS attacks
  • Cross site forgery
  • Circumventing authentication
  • SQL injection discovery and exploitation
  • SQL data extraction

Some of the hands-on lab exercises include:

  • Use of Trojans
  • IDS usage and avoidance
  • Data transmission encryption techniques
  • Creating a custom covert channel
  • Web application parameter tampering
  • Cross site scripting attacks
  • SQL injection
  • Chaining exploits
  • Exploiting extended stored procedures
  • Capture the Flag exercises

Day 5
Day five is dedicated toward wireless security, using basic scripts for ethical hacking, covering your tracks and post-engagement activities. You will master the ability to sniff data, clean up all traces of your activities and learn best practices for writing reports and recommending mitigation strategies.

Lectures include:

  • Sniffing in different environments
  • Attack sniffers
  • Man-in-the-middle attacks
  • Wireless networking
  • Shared key authentication weaknesses
  • WEP/WPA/WPA2 cracking
  • Anti-forensics
  • Log modification/deletion
  • Rootkits
  • Introduction to scripting
  • Common script components
  • Writing effective reports
  • Providing mitigation recommendations
  • CEH exam review
  • PenTest+ exam review

Some of the hands-on lab exercises include:

  • ARP spoofing and man in the middle
  • Specialized sniffing
  • DNS spoofing
  • Phishing attacks

The day finishes with the CEH examination given on-site at the training location or online from home. You will receive an exam voucher to take the PenTest+ exam.

Learn from Experts

We don’t just have great instructors, our instructors have years of industry experience and are recognized as experts. InfoSec Institute instructors have authored two of the top Network Security and Ethical Hacking books.


Constantly Updated Training

Black hat hackers are always changing their tactics to get one step ahead of the good guys. At InfoSec Institute, we update our course materials regularly to ensure that you learn about the most current threats to your organization’s networks and systems.

Remote Learning

This course is available for "remote" learning and will be available to anyone with access to an internet device with a microphone (this includes most models of computers, tablets). Classes will take place with a "Live" instructor at the date/times listed below.

Upon registration, the instructor will send along additional information about how to log-on and participate in the class.

Refund Policy

Cancellations or Exceptions:

  • No Shows: 100% forfeiture
Cancellations:

  • 31 business days prior to start of class: 30% penalty of full price.
  • Within 16 business days of start of class: 50% penalty of full price.
  • Outside of 31 business days of start of class: 20% penalty of full price.
Reschedules:

  • First time outside of 31 business days: No penalty.
  • First time within 31 business days: 20% penalty of full price.
  • Any further reschedules regardless of timeframe will result in a penalty that will be determined by the nature of the reschedule.
In any event where a customer wants to cancel their enrollment and is eligible for a full refund, a 5% processing fee will be deducted from the refund amount.

In the event that an instructor or the school needs to cancel at the last minute, students will receive a refund less a 5% non-refundable registration fee.

Similar Classes

Benefits of Booking Through CourseHorse

  • Booking is safe. When you book with us your details are protected by a secure connection.
  • Lowest price guaranteed. Classes on CourseHorse are never marked up.
  • This class will earn you 44510 points. Points give you money off your next class!

Questions & Answers (0)

Get quick answers from CourseHorse and past students.

InfoSec Institute

The InfoSec Institute brand stands for the highest quality, the highest value, and an unswerving commitment to customer care and service. We've been training information security professionals since 1998. Unlike other general IT training companies or security vendors, each of us is a specialist in the...

Read more about InfoSec Institute

CourseHorse Approved

This school has been carefully vetted by CourseHorse and is a verified Online educator.

InfoSec Institute

Give This Course as a Gift Card

  • Thousands of classes
  • No expiration
  • Unique and memorable gifts for any occasion
  • Personalized
  • Explore a passion, gain a new skill, discover a new hobby, engage in a memorable experience
  • Instant delivery
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™

Buy a Gift Card

Book this Class as a Group Event

Booking this class for a group? Find great private group events

Or see all Professional Group Events

Explore group events and team building activities ranging from cooking, art, escape rooms, trivia, and more.

CourseHorse Gift Cards

  • Creative & unique gift for any occasion
  • Thousands of classes & experiences
  • No expiration date
  • Instant e-delivery (or choose a date)
  • Add a personalized message
  • Lock in a price with the Inflation Buster Gift Card Price Adjuster™
Buy a Gift Card
gift card with the CourseHorse logo gift card with the CourseHorse logo
Loading...