Course essentials
Boot camp at a glance
-
Method
Live online, in-person, team on-site
-
Duration
5 days
-
Experience
0-1 year OS systems experience
-
Average salary
$103,000
-
Meets 8570.1
DoD Information Assurance requirements
What you'll learn
Training overview

In our ethical hacking boot camp, you delve into the tools and techniques used by cybercriminals. Gain in-depth knowledge of ethical hacking methodologies through attention-getting lectures and hands-on labs. Our cloud-hosted cyber range provides practical experience in reconnaissance, system access, vulnerability exploitation and data exfiltration.
You’ll leave prepared for two highly sought-after certifications: EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+. These certifications validate your ability to assess and measure threats to information assets and identify vulnerabilities in your organization’s systems. With these certifications in hand, you’re well-equipped to protect your organization from malicious actors.
Award-winning training you can trust
What's included
Everything you need to know

- 90-day extended access to Boot Camp components, including class recordings
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
- Exam voucher
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Hands-on cyber ranges and labs
- Knowledge Transfer Guarantee
- Onsite proctoring of exam
- Pre-study learning path
- Unlimited practice exam attempts
Before your boot camp
Prerequisites
To make the most of this Ethical Hacking Boot Camp, it’s important to have a solid foundation in the following areas:
- Firm understanding of the Windows Operating System
- Exposure to the Linux Operating System or other Unix-based operating systems
- Grasp of the TCP/IP protocols
In addition, all you need to complete the Ethical Hacking Boot Camp is a stable internet connection and a computer capable of streaming activities. If you can watch Netflix on your computer, you’re ready to start hacking!
Syllabus
Training schedule
Preparation (before the boot camp starts)
Ethical hacking prep course
Day 1
Introduction to ethical hacking
The first half of day one focuses on learning the job duties required of a penetration tester. You will learn the ins and outs of the various penetration testing methodologies required in order for an ethical hack to be used in a business or government setting. You will also delve deep into technical material, learning how to perform network reconnaissance against modern infrastructure.
Pentesting process
Passive reconnaissance and OSINT
CTF Exercises
Schedule may vary from class to class
Day 2
Network scanning
Having learned how to gather information about several targets, we begin day two with narrowing our attack by finding potentially vulnerable systems/services. You will master the art of network scanning and service identification, and gain a deeper understanding of how systems communicate using the TCP and UDP protocols.
Target system identification, service enumeration and vulnerability scanning
CTF Exercises
Schedule may vary from class to class
Day 3
Exploitation
After gathering information about your target system, you will put all that hard work to use when you learn how to exploit those vulnerabilities. You will learn the skills to demonstrate a successful exploit of a vulnerability as well as how to gather additional credentials to exploit vulnerabilities in other systems. You will also learn useful social engineering techniques, including phishing, and methods of attacking physical security.
Password security, social engineering, and physical security
CTF Exercises
Schedule may vary from class to class
Day 4
Deep target penetration and covering tracks
After compromising a target, you will extend your access to all vulnerable systems at your target organization and learn how to covertly exfiltrate data. The second half of day four covers attacking web-based applications and understanding SQL injection.
Web application attacks
CTF Exercises
Schedule may vary from class to class
Day 5
Scripting
Day five is dedicated toward wireless security, using basic scripts for ethical hacking, covering your tracks and post-engagement activities. You will master the ability to sniff data, clean up all traces of your activities and learn best practices for writing reports and recommending mitigation strategies.
Exam review
Take CEH exam
Schedule may vary from class to class
Guaranteed results
Our boot camp guarantees

Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
Unlock team training discounts
If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

FAQ
Frequently asked questions
Why is getting certified an important part of an ethical hacking career?
The EC-Council Certified Ethical Hacker (CEH) certification and the CompTIA PenTest+ certification demonstrate to employers you have an in-depth knowledge of ethical hacking and penetration testing. They are industry-recognized certifications that teach you the skills and techniques required to identify system weaknesses and vulnerabilities.
How much programming experience is typically required?
Programming experience isn’t a requirement, but we recommend you have a solid understanding of at least one programming language, a familiarity with networking concepts like TCP/IP Protocol and experience using Linux and/or Unix.
How has the ethical hacking industry grown in recent years? Has the need for ethical hacking skills changed in the last five or ten years?
The ethical hacking industry has grown tremendously over the past decade and shows no signs of slowing down. As computer technology advances, the need for white-hat hackers to protect corporate data will continue to grow. The growing popularity of cloud computing and IoT devices has introduced a myriad of new vulnerabilities, further increasing the need for ethical hackers and pentesters.
How difficult is it to find security flaws in companies with significant resources? Do hackers still get paid if they fail to find security flaws?
Your experience will vary by company, but security flaws are surprisingly common in the real world. If your penetration test fails to identify any security vulnerabilities, you will still be paid for your time and services.
Is it possible to receive one-on-one mentoring from an Ethical Hacking Boot Camp instructor? How much feedback will I receive on my coursework?
Absolutely! One-to-one chat sessions with instructors are an important part of our live online Ethical Hacking Boot Camp. During the boot camp, instructors focus 100% of their time and attention on students to ensure they learn the skills to pass your CEH and PenTest+ exams.
Does the program offer training on ethical hacking specialization skills?
Our Ethical Hacking Boot Camp dives deep into various specialized ethical hacking concepts: information gathering, network scanning, footprinting and reconnaissance, exploitation, penetration testing, web application hacking and more. Once you learn the basics, we offer a variety of other in-depth boot camps specializing in cloud pentesting, web application pentesting and more. Browse our boot camp library for the full list.
Why is the Ethical Hacking Boot Camp a necessary addition to the other popular certification programs?
The CEH and PenTest+ certifications provide an in-depth view into ethical hacking and penetration testing, putting you at the top of your field.
Meets 8570.1 requirements
Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.
You’re in Good Company
I have never had a better experience in any previous training. The instructor gave the information needed for the test and also shared his real-world experience to bring it together. I would not hesitate recommending this class to anyone interested in CEH.
Chris Young, Maintech
I thoroughly enjoyed the Ethical Hacking class. I would venture to say it is one of the best technical classes I have ever attended. I feel very confident that I will be able to take my learning experience and be better able to defend our company assets.
Jeremy Kicklighter, ACI Worldwide
The course materials were excellent. The class format was fantastic. The instructor not only prepared us for the examination but also spent a considerable amount of time in learning practical skills for the real world.
Stephen Field, Thomas Compliance Associates, Inc.
Enroll in a boot camp
Explore our top boot camps
More learning opportunities
-
Most popularBoot camp
CompTIA Security+ Training Boot Camp
Infosec’s CompTIA Security+ Boot Camp teaches you information security theory and reinforces that theory with hands-on exercises to help you learn by doing. You’ll learn how to configure and operate many different technical security controls — and leave prepared to pass your Security+ exam.
Learn More
-
#1 FOR BEGINNERSBoot camp
Cisco CCNA Associate & CyberOps Associate Training Boot Camp with Dual Certification
Infosec’s authorized CCNA Dual Certification Boot Camp helps you build your knowledge of networking and provides hands-on experience installing, configuring and operating network devices — all while preparing you to earn two Cisco certifications.
Learn More
-
Most requestedBoot camp
(ISC)² CISSP® Certification Training and Boot Camp
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Learn More