Main Menu
My Infosec
Main Menu
My Infosec

Hacker Training Online

Get your certification and learn Penetration Testing Skills in a hands-on lab environment that you can directly apply to your job the day you leave training.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted information security training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Live Online students.

Comprehensive Hands on Labs

Learn to hack into real servers and networks with the most extensive hacking lab environment in the industry.

Hacker Training Course Overview

Our most popular information security and hacking training covers the techniques used by malicious, black hat hackers with high energy lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You’ll leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.

The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical hacking training course has a significant return on investment, since you gain hacking skills that are highly in demand, as well as two certifications, the EC-Council Certified Ethical Hacker and the IACRB Certified Penetration Tester.

Learn from Experts

We don’t just have great instructors, our instructors have years of industry experience and are recognized as experts. InfoSec Institute instructors have authored two of the top Network Security and Ethical Hacking books.

Constantly Updated Training

Black Hat hackers are always changing their tactics to get one step ahead of the good guys. InfoSec Institute updates our course materials regularly to ensure that you learn about the current threats to your organization’s networks and systems.

Award-Winning Training

Course Delivery

Public-Classroom
20 Years of Success Immersive Experience Get Course Pricing
Live-Online
Most Convenient Live Instruction Exam Pass Guarantee Get Course Pricing
Mentored-Online
Train On Your Own Time Access Anywhere Get Course Pricing

Our Major Clients

What You'll Learn

Some of the hacking concepts you will learn to master during this hands on hacking course…

  • Penetration testing methodologies
  • Stealthy network recon
  • Passive traffic identification
  • Remote root vulnerability exploitation
  • Privilege escalation hacking
  • IPv6 Vulnerabilities
  • Remote access trojan hacking
  • Running shellcode in RAM vs. on disk
  • Wireless insecurity
  • Breaking IP-based ACLs via spoofing
  • Abusing Windows Named Pipes for Domain Impersonation
  • Evidence removal and anti-forensics
  • Attacking network infrastructure devices
  • Hacking by brute forcing remotely
  • Hiding exploit payloads in jpeg and gif image files
  • Hacking Web Applications
  • Breaking into databases with SQL Injection
  • Cross Site Scripting hacking
  • Hacking into Cisco routers
  • Justifying a penetration test to management & customers
  • CEH/CPT review
  • Defensive techniques

What You'll Do

  • Capture the Flag hacking exercises every night!

  • Abusing DNS for host identification

  • Leaking system information from Unix and Windows

  • Windows 2003 Server & Vista DNS Cache Poisoning Attacks

  • Unix, Windows and Cisco password cracking

  • Remote buffer overflow exploit lab - heap vs. stack overflows

  • Attacking Kerberos Pre-Auth Hashes

  • Spoofing endpoints of communication tunnels

  • Impersonation of other Users- Hijacking kernel tokens

  • Attacking RDP (Remote Desktop Protocol) in Windows XP, 2003 & Vista

  • Remote keylogging

  • Data mining authentication information from clear-text protocols

  • Sniffing and hijacking SSL encrypted sessions

  • Breaking wireless security via hacking

  • Malicious event log editing

  • Client side IE & Firefox exploits

  • Tunneling through IPSec VPNs by abusing ESP

  • Data retrieval with SQL Injection Hacking

  • Calculating the Return on Investment (ROI) for an ethical hack

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Dual Certification - Certified Ethical Hacker V10 and Certified Penetration Tester

In any hands on hacking training course, it is important to have the opportunity to prove to current or potential employers that you have the skills you say you do. This course prepares you for the two top hacking certifications in the industry, the CEH and the CPT. Both exams are given on-site, we have achieved a 93% pass rate for these certifications. Contact us to learn more about the requirements for the Certified Ethical Hacker and the Certified Penetration Tester.

We make sure you are fully prepared to pass the CEH. InfoSec Institute goes way beyond the material covered in the CEH to give you a more well-rounded exposure to hacking and penetration testing.

Book your course

    Additional Information

    Prerequisites:

    • Firm understanding of the windows operating system
    • Exposure to the Linux operating system or other Unix-based OS
    • Grasp of the TCP/IP protocols
    • Desire to learn about the hacking and network security profession, stay ethical, and get great security training!

    Who This Class is For:

    • Security Analysts
    • Security Consultants
    • Security Researchers

    Core Classes:

    • Ethical Hacking (SEC-200)
    • Advanced Ethical Hacking (SEC-300)
    • Reverse Engineering Malware (SEC-303)

    Specialization:

    • Advanced Reverse Engineering Malware (SEC-503)
    • Web App Pen Testing (SEC-402)

    What Our Students Are Saying

    Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
    JH

    John Hollan GE

    Advanced Ethical Hacking Training Boot Camp

    Hacker Training Online Frequently Asked Questions

    What’s the value in earning an Ethical Hacking certification?

    Earning the CEH certification is a definitive way of proving your knowledge and skill to employers and others within the industry. Beyond this, the CEH provides you with the skills and techniques required to identify and prevent system weaknesses and vulnerabilities.

    What are the Pre-Requirements for earning the CEH?

    While there are no hard requirements to sit for the CEH exam, a strong familiarity with the windows operating system and networking concepts (TCP/IP Protocol) is suggested. It’s also recommended that students know at least one programming language.

    What career opportunities are available to CEH Boot Camp graduates? What’s the job outlook like for CEH professionals?

    If you want to break into the cyber security industry, earning an ethical hacking certification can help you land a great job. The CEH certification is a common prerequisite for security-related job roles, particularly those related to penetration testing and social engineering. Certified professionals typically earn more than non-certified individuals, and you can use your CEH certificate as a bargaining chip when negotiating with employers for a higher salary.

    How does the CEH Examination Process work?

    The CEH exam consists of 125 multiple-choice questions that you must complete within a four-hour duration. You need to score at least a 70% on the exam (88 correct answers) in order to pass. The test can be administered through an ECC test center, a ProctorU testing center, or a Pearson VUE testing center.

    How has the ethical hacking industry grown in recent years? Has the need for ethical hacking skills changed in the last five or 10 years?

    The ethical hacking industry has grown by leaps and bounds over the past decade, with no signs of changing pace. As computer technology becomes increasingly complex, the need for white-hat hackers to protect sensitive corporate data will grow along with it. The changing landscape and increasing shift towards mobile computing has introduced a plethora of new vulnerabilities, increasing the demand for qualified penetration testers and ethical hackers.

    What does this Ethical Hacking course offer that other certification prep classes do not?

    InfoSec Institute’s CEH training provides the highest certification pass rate in the industry—93%! If you choose to take the course online, you will also receive our Exam Pass Guarantee, meaning that if you fail the exam on your first attempt, we’ll pay for your second FREE.

    How long Is the CEH certification good for after you pass the test?

    The ECE policy states that EC-Council certifications are valid for three years from the date of receiving your CEH certification.

    What are the Renewal Requirements for the CEH?

    During the three year period of your certification, you must participate in the EC-Council Continuing Education (ECE) Program to remain certified. After those three years are up, if you meet the ECE Program requirements, your certification validity will be extended for another three years.

     

    Why is the Ethical Hacking Boot Camp a necessary addition to the other popular certification programs?

    The CEH certification immerses you in the world of ethical hacking and penetration testing, teaching the skills needed to put you at the top of the field. The CEH dives deep into subject matter that other security certifications, such as the Security+ and CISSP, only cover at a high level.

    What job titles are most common for people who hold the EC-Council CEH certification?

    The need for ethical hackers has increased dramatically in recent years. Common job roles include: penetration tester, network security administrator, forensic analyst, and computer network defense analyst, along with many more.

    Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
    View instant course pricing