Certified Ethical Hacker (CEH) Certification Training Course
Baltimore | Columbia | Maryland | Washington DC | Northern Virginia

Certified Ethical Hacker (CEH) Certification Training

Phoenix TS offers Certified Ethical Hacker (CEH) Certification Training Courses at our state-of-the-art facilities in the Maryland, DC, and Virginia area. For those who live or work outside of this area, live virtual and on-site nationwide CEH training is available upon request.

The Certified Ethical Hacker (CEH) Certification is a professional certification achieved through the EC-Council (International Council of E-Commerce Consultants) that develops modern cyber security skills as they relate to protecting virtual environments. The objective of the ethical hacker is to enable organizations to establish preventative measures against malevolent cyber-attacks by probing the system themselves for security flaws while staying within legal confines. If you are interested in learning how attackers break into corporate networks or are considering moving into IT security, then the CEH training course and certification is the ideal career move for you.

Phoenix TS offers the official Certified Ethical Hacker training course which includes all the key components of the most current CEH curriculum. Phoenix TS instructors are also well adept and experienced at preparing students for the CEH certification and this has resulted in the center’s recognition as an EC-Council Authorized Training Center (ATC) that has earned the prestigious ‘Circle of Excellence’ title in 2010, 2011, 2012 and 2013.

Certified Ethical Hacker (CEH) Training Course Description:

During our five day EC-Council Certified Ethical Hacker Certification (CEH v8) training course students will learn to look for the vulnerabilities and weaknesses within different target systems using the same knowledge and tools as a malicious hacker. Through our CEH course, students will begin to understand how perimeter defenses work and, through hands-on exercises, will be monitoring and attacking a network specifically designed for this course. Students will then learn what steps to take to properly secure a system and how intruders escalate privileges. In addition, students will learn about policy creation, intrusion detection, virus creation, DDoS attacks, buffer overflows, and social engineering. At the end of the CEH training course, students will walk out the door with hacking skills that are highly in demand as well as the internationally recognized Certified Ethical Hacker certification!

The certification exam voucher is included and the student has the option of taking the exam on the last day of the class.

The United States Department of Defense has listed CEH as an approved certification for its Information Assurance Workforce Improvement Program (DoD 8570.1).

Certified Ethical Hacker (CEH v8) - Course Outline:

Overview of Ethical Hacking

  • Reports on Internet Crime and Data Breach Investigations
  • Typical Data Stolen
  • Common Terms and InfoSec Elements
  • Non-Repudiation and Authenticity
  • Triangle of Security, Functionality, and Usability
  • Challenges in Security and the Aftermath of Hacking
  • Overview of a Hacker
  • Hacktivism
  • 5 Phases of a Hack
  • Various Types of System Attacks
  • Purpose of Ethical Hacking and Necessary Skills
  • Scope and Limitations
  • Vulnerability Research
  • Overview of and Methods for Pen Testing

Footprinting and Recon

  • Common Terms and Overview of Footprinting
  • Objectives and Common Threats of Footprinting
  • Uncovering URLs, Public and Restricted Sites
  • Uncovering Company Information Online
  • Search Engine Footprinting
  • Gathering Information About Location and People
  • Uncovering Financial Services Information
  • Utilizing Job Sites
  • Utilizing Alerts for Target Monitoring
  • Gathering Competitive Intelligence
  • Overview of and Tools for WHOIS Lookup
  • Extracting Information about DNS
  • Locating Network Range
  • Traceroute Tools
  • Website Mirroring Techniques and Tools
  • Utilizing www.archive.org and Website Watcher
  • Email Tracking
  • Google Hacking Techniques
  • Google Advance Search Operators
  • Google Hacking Database (GHDB) and Other Google Hacking Tools
  • Additional Tools
  • Countermeasures and Penetration Testing for Footprinting

Network Scanning

  • Overview of and Tools for Network Scans
  • ICMP Scanning
  • Tools for Ping Sweep
  • 3-Way Handshake
  • TCP Communication Flags and Custom Packets
  • Hping2 / Hping3 and Commands for Hping
  • Techniques for Network Scanning
  • IDS Evasion
  • Tools for IP Fragmentation
  • Overview of Scanning Tools
  • IP Addresses to Avoid Scanning
  • Countermeasures for Scanning
  • Overview of War Dialing Tools and Countermeasures
  • OS Fingerprinting
  • Overview of the ID Serve Tool
  • GET REQUESTS Command Line
  • Netcraft and Other Banner Grabbing Tools
  • Banner Grabbing Countermeasures
  • Hiding File Extensions
  • Vulnerability Scanning Tools and Network Vulnerability Scanners
  • LANsurveyor
  • Network Mappers
  • Overview and Uses of Proxy Servers
  • MultiProxy, Free Proxy Servers and Proxy Workbench
  • Proxifier
  • SocksChain
  • TOR and TOR Proxy Chaining Software
  • HTTP Tunneling Overview and Techniques
  • Super Network
  • Httptunnel for Windows and other HTTP  Tunneling Tools
  • SSH Tunneling
  • Overview of the Tool for SSL Proxy
  • Other Types of Proxy Tools
  • Anonymizers Overview, Types and Tools
  • Avoid Filters
  • Circumventing Censorship
  • G-Zapper
  • IP Address Spoofing, Detection and Countermeasure Techniques
  • Scanning – Pen Testing


  • Enumeration Overview and Techniques
  • Netbios Tools
  • Enumerating User Accounts and Systems
  • SNMP Tools
  • UNIX/Linux Tools
  • LDAP Tools
  • NTP Tools
  • SMTP Tools
  • nslookup for DNS Zone Transfer
  • Countermeasures
  • Enumeration – Penetration Testing 

System Hacking

  • Gathering Information
  • Establishing Goals and CEH Hacking Method
  • Password Cracking Techniques
  • Microsoft Authentication
  • Overview of Hash Passwords in Windows SAM
  • LAN Manager Hash
  • Authentication Protocol – Kerberos
  • Cryptographic Salts
  • Password Dumping Tools
  • Password Cracking Tools
  • LM Hash Backward Compatibility
  • Password Cracking Defense Techniques
  • Privilege Escalation, Tools and Defense Techniques
  • Active@ Password Changer
  • Executing Applications and Remote Execution Tools
  • Overview and Types of Keystroke Loggers
  • Acoustic/CAM Keylogger
  • Overview and Types of Spyware
  • Keylogger Defense Techniques
  • Spyware Defense Techniques
  • Rootkits Overview, Types, Detection and Defense
  • NTFS Data Stream
  • Steganography Types, Techniques and Tools
  • Image, Document, Video, Audio, Folder, Spam/Email and Natural Text Steganography
  • Steganalysis Methods/Attacks
  • Steganography Detection Tools
  • Tools for Clearing Your Tracks
  • System Hacking – Pen Testing

Trojans and Backdoors

  • Introduction to Trojans and Their Purpose
  • Overt and Covert Channels
  • Infecting a System with a Trojan and Signs of a Trojan Attack
  • Common Ports Used and Ways to Get a Trojan into a System
  • Wrappers
  • Deploying Trojans
  • Evading Anti-Virus
  • Trojan Types
  • Destructive Trojans
  • Notification Trojans
  • Credit Card Trojans
  • Encrypted Trojans
  • PhoneSnoop – Blackberry Trojan
  • DNSChanger and Hell Raiser – MAC OS X Trojans
  • Trojan Detection
  • Monitoring Tools
  • Registry Entry Scanning and Monitoring Techniques
  • Device Drivers Scanning
  • Windows Services Scanning
  • Startup Programs Scanning
  • Files and Folders Scanning
  • Network Activities Scans
  • Trojan and Backdoor Countermeasures
  • Trojan Horse Construction Kit
  • Types of Anti-Trojan Software
  • Trojans and Backdoors – Pen Testing

Viruses and Worms

  • Overview of Viruses and 2010 Virus and Worm Statistics
  • Virus Life Stages
  • Virus Infection and Attack Phases
  • Signs of an Attack
  • Virus Hoaxes
  • Analysis of a Virus
  • Virus Types
  • Transient and Terminate and Stay Resident Viruses
  • Making a Simple Virus
  • Overview of Worms
  • Worms vs. Viruses
  • Analysis of Worms
  • Creating a Worm
  • Sheep Dip Computer
  • Anti-Virus Sensors Systems
  • Process for Malware Analysis
  • Bintext – String Extraction Tool
  • UPX – Compression and Decompression Tool
  • Process Monitor – Process Monitoring Tools
  • NetResident – Log Packet Content Monitoring Tools
  • Ollydbg – Debugging Tool
  • IDA Pro – Virus  Analysis Tool
  • Tools for Online Malware Testing and Analysis Services
  • Methods for Virus Detection and Countermeasures
  • Immunet Protect
  • Anti-virus Tools
  • Virus – Pen Testing


  • Lawful Intercept
  • Wiretapping
  • Overview of a Sniffer and Prevalent Threats
  • Switch Attacks
  • Active and Passive Sniffing
  • Vulnerable Protocols
  • OSI Model – Data Link Layer Ties
  • Analyzers for Hardware Protocol
  • SPAN Port
  • MAC Flooding
  • DHCP Overview and Attacks
  • ARP Overview and Attacks
  • DHCP Snooping and Dynamic ARP Inspection Configuration on Cisco Switches
  • MAC Spoofing/Duplicating
  • Domain Name System Poisoning Techniques
  • Sniffing Tools
  • Discovery Tools
  • Password and Packet Sniffing Tools
  • OmniPeek
  • Observer
  • NetWitness
  • Big-Mother
  • Packet Builder
  • Other Sniffing Tools
  • Network Hacking with Sniffers
  • Sniffing Defense and Prevention Techniques
  • Detecting a Sniffer
  • Promiscuous Detection Tools

Social Engineering

  • Overview and Effectiveness of Social Engineering
  • Vulnerable Behaviors
  • Signs of a Social Engineering Attack
  • Attack Phases
  • Organizational Impact
  • Command Injection Attacks
  • Common Targets
  • Social Engineering Types
  • Insider Attacks
  • Intrusion Tactics and Prevention Strategies
  • Social Engineering on Social Networks
  • Social Networking Risks
  • 2010 Statistics on Identity Theft
  • Countermeasures
  • Phishing Detection
  • Identity Theft Countermeasures
  • Social Engineering – Pen Testing

Denial of Service

  • Overview of a DoS Attack
  • DoS Attack Symptoms
  • Cyber Criminals
  • ICQ – Internet Chat Query
  • IRC – Internet Relay Chat
  • Techniques for a DoS Attack
  • Botnets
  • WikiLeak Operation Payback
  • DoS Tools for Attack
  • Detection Techniques
  • Strategies for Countermeasures
  • DoS/DDoS Attack Countermeasures
  • Forensics After the Attack
  • Botnets Defensive Techniques
  • DoS/DDoS ISP Level Protection
  • TCP Intercept on Cisco IOS Software
  • IntelliGuard DDoS Protection System (DPS) – Advanced DDoS Protection
  • DoS/DDoS Protection Tools
  • DoS – Penetration Testing

Session Hijacking

  • Overview of Session Hijacking
  • Dangers of Hijacking
  • Why Session Hijacking is Successful?
  • Hijacking Techniques
  • Brute Force Attack
  • HTTP Referrer Attack
  • Spoofing vs. Hijacking
  • The Hijacking Process
  • Local Session Hijack Packet Analysis
  • Session Hijacking Types
  • Predictable Session Token
  • Man-in-the-Middle and Man-in-the-Browser Attacks
  • Client-Side and Cross-Site Script Attacks
  • Session Fixation
  • Hijacking at the Network Level Session
  • Three-Way Handshake
  • Sequence Numbers
  • TCP/IP Hijacking
  • IP Spoofing: Source Routed Packets
  • RST and Blind Hijacking
  • Packet Sniffer for Man-in-the-Middle Attack
  • UDP Hijacking
  • Tools for Session Hijacking
  • Countermeasures
  • Session Hijacking Protection
  • Methods for Web Developers to Prevent Session Hijacking
  • Methods for Web Users to Prevent Session Hijacking
  • Defense for Session Hijack Attacks
  • Session Hijacking Remediation
  • IPSec
  • Session Hijacking – Penetration Testing

Hijacking Webservers

  • Webserver Market Shares
  • Open Source and IIS Webserver Architectures
  • Defacing a Website
  • Webserver Attack Impacts and Misconfiguration
  • Directory Traversal Attacks
  • HTTP Response Splitting Attack
  • Web Cache Poisoning Attack
  • HTTP Response Hijacking
  • SSH Bruteforce Attack
  • Man-in-the-Middle Attack
  • Webserver Password Cracking Tools and Techniques
  • Application Attacks
  • Methods and Tools for a Webserver Attack
  • Attack Countermeasures
  • Defense Options for Web Server Attacks, Web Cache Poisoning and HTTP Response Splitting
  • Patches and Hotfixes
  • Overview of Patch Management
  • Sources for Updates and Patches
  • Patch Installation and Patch Management Tools
  • Sandcat
  • Wikto
  • HackAlert
  • Webserver Security Tools
  • Web Server – Pen Testing

Hacking Web Apps

  • Introduction and Statistics of Web Applications
  • App Components and Architecture
  • Web 2.0 Apps
  • Vulnerability Stack
  • Web Attack Vectors
  • Threats to Web Applications
  • Unvalidated Input
  • Tampering Parameters and/or Forms
  • Directory Traversal
  • Misconfigured Security
  • Injection Flaws and Attacks
  • Overview of LDAP Injection
  • Manipulating Hidden Fields
  • XSS Attacks Overview and Types
  • Web App DoS Attack
  • Buffer Overflow Attacks
  • Cookie Poisoning
  • Session Fixation Attacks
  • Insufficient Transport Layer Protection
  • Improper Error Handling
  • Cryptographic Storage Insecurities
  • Broken Authentication and Session Management
  • Unvalidated Redirects and Forwards
  • Web Services Architecture and Attacks
  • Types of Footprint Web Infrastructure
  • Burp Suite for Web Spidering
  • Web Server Hacks
  • Web Applications Analysis
  • Mechanisms for Attack Authentication
  • Username Enumeration
  • Types of Password Attacks
  • Session Attack Types
  • Exploiting Cookies
  • Tampering for an Authorization Attack
  • Session Management Attack
  • Injection Attacks
  • Data Connectivity Attacks
  • Web App Client and Web Services Attacks
  • Probing Attacks
  • Tools for Web Services Attacks
  • Tools for Web Application Hacks
  • Encoding Schemes
  • Countermeasures to Web App Attacks
  • Types of Firewalls for Web Applications
  • Web Application – Penetration Testing 

SQL Injection

  • Overview and Threats of SQL Injection
  • Types of SQL Injection Attacks
  • Server Side Technologies
  • HTTP Post Request
  • Attack Detection
  • Black Box Pen Testing for SQL Injection
  • Blind SQL Injection
  • Methods for SQL Injection
  • Extracting Information
  • Advanced Enumeration
  • Various DBMSs Features
  • Grabbing and Extracting Server Hashes
  • Database Transfer to Attacker’s Machine
  • OS Interaction
  • FileSystem Interaction
  • Full Query Network Reconnaissance
  • Tools for SQL Injection
  • Intrusion Detection System Evasion Techniques
  • Defense Methods and Detection Tools
  • Snort Rule for Detection

Hacking Wireless Networks

  • Introduction to Wireless Networks
  • U.S. Wi-Fi Usage
  • Wi-Fi Public Hotspots and Home Networks
  • Types of and Standards for Wireless Networks
  • Service Set Identifier (SSID)
  • Authentication Process for Wi-Fi
  • Common Terms
  • Wi-Fi Chalking
  • Popular Hotspot Finders
  • Wireless and Parabolic Grid Antennas
  • Wireless Encryption Types – WEP, WPA, WPA2
  • Differences in Encryption Types
  • Issues with WEP
  • Weak Initialization Vectors (IV)
  • Breaking WEP and WPA/WPA2 Encryption
  • WPA Defense Techniques
  • Types of Wireless Threats
  • Types of Attacks through Unauthorized Access Point
  • DoS Attacks
  • Jamming Signal Attacks and Wi-Fi Jamming Devices
  • Methods for Wireless Hacking
  • Wi-Fi Network Scanning
  • Wireless Network Footprinting
  • Wi-Fi Discovery Tools
  • GPS Mapping
  • Wardriving
  • Analyzing Wireless Traffic
  • Wireless Cards and Chipsets
  • AirPcap
  • Wi-Fi Packet Sniffers
  • Spectrum Analysis
  • Wireless Sniffers
  • Aircrack-ng Suite
  • Uncovering Hidden SSIDs
  • Fragmentation Attack
  • Launching a MAC Spoofing Attack
  • Deauthentication and Disassociation – DoS Attacks
  • Man-in-the-Middle Attack – Aircrack-ng
  • ARP Poisoning Attack and Rogue AP
  • Creating a Hotspot Evil Twin
  • Cracking WEP with Aircrack
  • Cracking WPA-PSK with Aircrack?
  • WPA Cracking Tools
  • WEP/WPA Cracking with Cain & Abel
  • WEP/WPA Cracking Tools
  • Wi-Fi Sniffers
  • Wardriving Tools
  • RF Monitoring Tools
  • Tools for Wi-Fi Connection Manager
  • Tools for Wi-Fi Traffic Analyzer
  • Tools for Wi-Fi Raw Packet Capturing
  • Tools for Wi-Fi Spectrum Analyzing
  • Overview and Tools for Hacking Bluetooth
  • BlueJack a Victim
  • Bluetooth Defense
  • Rogue AP Detection and Defense Techniques
  • Layers for Wireless Security
  • Wireless Attack Defense Measures
  • Wireless IPS and IPS Deployment
  • Wi-Fi Security Auditing Tools
  • Wi-Fi IPS
  • Tools for Wi-Fi Predictive Planning
  • Tools for Wi-Fi Vulnerability Scanning
  • Wireless – Pen Testing

IDS, Honeypot and Firewall Evasion

  • Overview and Detection Techniques for IDS
  • IDS Types
  • System Integrity Verifiers (SIV)
  • Signs of Intrusion and System Intrusion
  • Firewall Architecture
  • DMZ
  • Firewall Types
  • Identifying Firewalls
  • Types of Honeypots and Configuration Steps
  • Tools for Intrusion Detection
  • IDS – Tipping Point
  • Firewall – Sunbelt Personal Firewall
  • Honeypot Tools
  • Insertion Attack
  • Evasion
  • DoS
  • Obfuscating
  • False Positive Generation
  • Session Splicing
  • Unicode Evasion
  • Fragmentation Attack
  • Overlapping Fragments
  • Time-To-Live
  • Invalid RST Packets
  • Urgency Flag
  • Polymorphic Shellcode
  • ASCII Shellcode
  • Application-Layer Attacks
  • Desynchronization
  • Pre and Post Connection SYN
  • Evasion Types
  • Bypassing Blocked Sites
  • Bypassing Firewalls
  • Honeypot Detection Tools and Techniques
  • Firewall Evasion Tools
  • Packet Fragment Generators
  • Countermeasures
  • Firewall/IDS – Pen Testing

Buffer Overflow

  • Introduction to Buffer Overflows
  • Program and Application Vulnerability
  • Understanding Stacks
  • Buffer Overflow – Stack-Based
  • Understanding Heap
  • Stack Operations
  • Programming Buffer Overflow Exploits
  • Steps in the Buffer Overflow Process
  • Simple Uncontrolled Overflow
  • Simple Buffer Overflow in C
  • Code Analysis
  • Exploiting Semantic Comments in C
  • Mutation of Buffer Overflow Exploitation
  • Buffer Overflows Identification and Detection
  • Buffer Overflow Utility
  • heap.exe
  • OllyDbg Debugger for Testing Stack Overflow
  • IDA Pro for Testing Format String Conditions
  • BoF Detection Tools
  • Defense Options
  • Data Execution Prevention
  • Enhanced Mitigation Experience Toolkit (EMET) Systems Settings and Application Window
  • /GS http://microsoft.com
  • BoF Security Tools
  • Buffer Overflow – Pen Testing


  • Overview and Types of Cryptography
  • Government Access to Keys
  • Ciphers
  • Advanced Encryption Standard and Data Encryption Standard
  • Algorithms: RC4, RC5, RC6
  • DSA and Related Signature Schemes
  • RSA Algorithm and Signature Scheme
  • One-way Bash Functions
  • Secure Hashing Algorithm
  • Overview of SSH
  • Types of MD5 Hash Calculators
  • Cryptography Tools
  • PKI
  • Certification Authorities
  • Digital Signature
  • SSL
  • Transport Layer Security
  • Disk Encryption Tools
  • Attacks on Cryptography
  • Methods for Code Breaking Attacks
  • Meet-in-the-Middle Attack – Digital Signature Schemes
  • Cryptanalysis Tools
  • Online MD5 Decryption Tools

Penetration Testing

  • Overview of Pen Testing
  • Security and Vulnerability Assessments
  • Details of a Good Pen Test
  • Pen Testing ROI
  • Testing Points and Locations
  • Testing Types
  • Pen Testing Techniques
  • DNS Domain Name and IP Address Information
  • Enumerating Information about Hosts through Publicly-Available Networks
  • Pen Testing Attack Phases and Methodology
  • Outsourcing Services
  • Evaluating Tools
  • Application and Network Security Assessment Tools
  • Tools for Assessing Wireless/Remote Access
  • Tools for Assessing Telephony Security
  • Testing Network-Filtering Device Tools

CEH v8 Exam (312-50) and Testing:

 CEH v8 Exam Details

  • 125 Questions
  • Passing Score: 70%
  • Test Duration: 4 hours
  • Test Format: Multiple choice
  • Test Delivery: Prometric or Pearson VUE

CEH Exam Code

The exam code varies when taken at different testing centers.

  • Exam 312-50-ANSI: Web based ‘Prometric Prime’ at Accredited Training Centers (ATC).
  • Exam 312-50v8: Pearson VUE Testing centers
  • Exam 350CEHv8: Proctored test at Authorized Prometric Testing Centers (APTC) globally.

Skills Measured

Exam 312-50 tests CEH candidates on each of the 19 topics covered in-depth through the training course, including:

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System Hacking
  6. Trojans and Backdoors
  7. Viruses and Worms
  8. Sniffers
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Hacking Webservers
  13. Hacking Web Applications
  14. SQL Injection
  15. Hacking Wireless Networks
  16. Evading IDS, Firewalls, and Honeypots
  17. Buffer Overflow
  18. Cryptography
  19. Penetration Testing

CEH Exam Price: $500

Students interested in purchasing EC-Council exam vouchers can do so through a Phoenix TS representative by calling our headquarters at 240-667-7757.

Phoenix TS is an authorized testing center for both Pearson VUE and Prometric. In order to register for your CEH Certification Exam at the Phoenix TS testing center, simply visit the Pearson VUE or Prometric website or call us directly at 301-258-8200.

Certified Ethical Hacker (CEH) - Standard Price:

 Total Cost


5 Day Course

GSA Eligible´╗┐

The Standard Price Includes:

  • Expert training instructor and all course materials including in-class exercises, sample exam questions, textbooks, notepads and any other materials students may need to complete the course.
  • Free exam voucher
  • Exam retake option (offer only valid for students who pay the listed tuition price)´╗┐
  • Course retake option
  • Full breakfast including doughnuts, bagels, fruits, yogurt, and juice
  • Full array of beverages including coffee, tea, water and soda available free all day
  • Fresh baked cookies every afternoon only at participating locations

Certified Ethical Hacker (CEH) Group Price:

In order to discuss group pricing options and accommodations please call us at (240) 667-7757.

View all Certified Ethical Hacker (CEH) classes

Start Date
Apr 27, 2015
5 days
8:30AM - 4:30PM
Columbia, MD
May 04, 2015
5 days
8:30AM - 4:30PM
Columbia, MD
May 05, 2015
10 days
Columbia, MD
Jun 01, 2015
5 days
8:30AM - 4:30PM
Gaithersburg, MD
Jun 22, 2015
5 days
8:30AM - 4:30PM
Columbia, MD
Jul 27, 2015
5 days
8:30AM - 4:30PM
Columbia, MD
Aug 03, 2015
5 days
8:30AM - 4:30PM
Columbia, MD
Aug 24, 2015
5 days
8:30AM - 4:30PM
Gaithersburg, MD
Sep 15, 2015
10 days
Columbia, MD
Oct 05, 2015
5 days
8:30AM - 4:30PM
Columbia, MD
Nov 16, 2015
5 days
8:30AM - 4:30PM
Columbia, MD
Dec 14, 2015
5 days
8:30AM - 4:30PM
Alexandria, VA
Jan 25, 2016
5 days
8:30AM - 4:30PM
Columbia, MD
Mar 07, 2016
5 days
8:30AM - 4:30PM
Columbia, MD
Click here to learn about earning potential for: CEH v8

CEH Certification Training Maryland, DC, Virginia, Online and On-site

Interested in watching for CEH videos? Check out our CEH Playlist on YouTube.

Who Should Enroll in CEH Training?

This course is ideal for IT Professionals concerned with the integrity of their organization’s network infrastructure and who possess the following job titles:

  • Auditors
  • Site Administrators
  • Security Officers
  • Security Professionals

Recommended Experience

Candidates should also have two years of professional IT security work experience and a strong knowledge of TCP/IP and how to implement them. Successful completion of the CompTIA Security+ training course, while not required, is highly recommended and will prove beneficial throughout this CEH course.

How will the CEH Course Prove Beneficial to Your Professional IT Career?

Working knowledge of how a malicious hacker thinks and acts will prove beneficial to your organization throughout your IT career. A CEH certification will fortify the knowledge of IT Security Professionals and teach them how to apply their skills in the most beneficial hacking manner. After completing the CEH course, students will understand how and be able to spot weaknesses and vulnerabilities within a network infrastructure from the standpoint of a malicious hacker. These vulnerabilities are normally overlooked by the average IT Professional who doesn’t understand how to think from the viewpoint of someone committed to compromising your “secure” network. Certified Ethical Hackers can and will do this and by doing so can potentially save a company from severe and financially draining network attacks. After gaining a CEH certification, IT Security Professionals can be sure that their value within their organizations will not only increase but their opportunities within the IT field as a whole will grow exponentially.

If you are Ready to Earn Your CEH Certification, Enroll Today with Phoenix TS!

If the Phoenix TS EC-Council Certified Ethical Hacking course will help advance your IT career, don’t hesitate and enroll in one of our upcoming classes today. Registration can be done either by contacting us via the form on the right hand side of this page or by calling us at (301) 258-8200. Additionally, if you would like more information regarding our CEH training course you can fill out the form or call to speak with one our course experts and they will gladly answer all of the questions you may have.

View upcoming Certified Ethical Hacker (CEH) Classes

View all IT and Computer Training Courses in MD/DC/VA

Go back to the PhoenixTS.com HOMEPAGE