Professional Development

Ethical Hacking Dual Certification Boot Camp


Earn Your CEH and PenTest+ Credentials


Did you know the demand for information security analysts, which includes ethical hackers, is projected to increase 33% by 2030, with professionals in this field having a median annual wage of $102,600?

This five-day boot camp powered by Infosec, a leading provider of cybersecurity training, will teach you how to use ethical hacking methodologies to legally and ethically discover security vulnerabilities before cybercriminals exploit them. Get hands-on experience with the same tools and techniques used by malicious hackers while also preparing to pass the EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+ certification exams.

Everything you need to get certified will be provided, including unlimited practice exam attempts and both certification exam vouchers. You can even review boot camp materials and replay daily video lessons for a year. With your provided Infosec Skills subscription, advance your skills with a one-year subscription to hundreds of additional on-demand courses and labs.


“I have never had a better experience in any previous training. The instructor gave the information needed for the test and also shared his real-world experience to bring it together. I would not hesitate recommending this class to anyone interested in CEH.”


  • Online, immersive format
  • 5 days of live, expert-led training
  • Learn in a cohort of peers
  • Limited seats per session

To enroll, you should have a firm understanding of the Windows Operating System, exposure to the Linux Operating System or other Unix-based operating systems, and a grasp of the TCP/IP protocols.

 This boot camp is ideal for penetration and vulnerability testers, cybersecurity analysts and consultants, offensive security professionals, or anyone interested in learning more about ethical hacking and developing their penetration testing skills.

In our Ethical Hacking Dual Certification Boot Camp, you will explore:

  • Ways to use the tools and techniques used by cybercriminals to help protect your company against attacks
  • Ethical hacking methodologies and hands-on hacking experience in a cloud-hosted cyber range
  • How to assess and measure threats to information assets
  • How to compromise web servers, virtual machines, databases, routers, and firewalls, and then put it all together in an unscripted evening Capture the Flag (CTF) exercise

Ethical Hacking & Penetration Testing Methodologies

  1. Security testing methodologies
  2. The ethical hacking profession
  3. Planning and scoping an engagement
  4. Legal and compliance considerations
  5. Ethical hacking methodologies
  6. Tools of the trade
  7. Linux overview
  8. Passive intelligence gathering
  9. Abusing DNS and SNMP
  10. Security testing methodologies

Network Scanning and Service Identification

  1. Understanding TCP packets and structures
  2. Passive network discovery and scanning
  3. TCP scanning
  4. Using differences in RFC implementations to your advantage
  5. Scanning through firewalls
  6. How to prevent the discovery of your reconnaissance activities
  7. Using zombies to mask network scanning
  8. Avoiding IDS/IPS detection
  9. Proper identification of services
  10. Vulnerability identification


  1. Vulnerability life cycles
  2. Types of vulnerabilities
  3. Flaws in encryption
  4. Configuration errors
  5. Buffer overflows
  6. Stack overflows
  7. Vulnerability mapping
  8. Exploit utilization and delivery methods
  9. Client-side exploits
  10. Server side exploits
  11. Password security
  12. Social engineering techniques
  13. Attacking physical controls
  14. Hashing
  15. Rainbow tables
  16. Attacking Windows password security
  17. Weaknesses in Windows authentication protocols

Exfiltration of Data & SQL Injection

  1. Use of Trojans
  2. Redirecting ports to thwart firewall rules
  3. Avoiding anti-virus detection
  4. Lateral movement and persistence
  5. Use of keyloggers
  6. IDS operations and avoidance
  7. Encrypting your communications
  8. Protocol abuse for covert communications
  9. Creating custom encryption tunneling applications
  10. E-shoplifting
  11. XSS attacks
  12. Cross-site forgery
  13. Circumventing authentication
  14. SQL injection discovery and exploitation
  15. SQL data extraction

Wireless Security, Basic Scripts for Ethical Hacking & Covering Your Tracks

  1. Sniffing in different environments
  2. Attack sniffers
  3. Man-in-the-middle attacks
  4. Wireless networking
  5. Shared key authentication weaknesses
  6. WEP/WPA/WPA2 cracking
  7. Anti-forensics
  8. Log modification/deletion
  9. Rootkits
  10. Introduction to scripting
  11. Common script components
  12. Writing effective reports
  13. Providing mitigation recommendations
  14. CEH exam review
  15. PenTest+ exam review

Boot camps are led by instructors that have years of industry experience and are recognized as subject matter experts.


Enroll Now

FAQs About Ethical Hacking Boot Camp

Earning ethical hacking certifications like the CEH and PenTest+ is a great way to break into a career as a cybersecurity professional. Many organizations require applicants to have a CEH certification to qualify for security-related jobs, especially roles related to penetration testing and social engineering or those requiring security clearance. It is likely that you will command a higher salary than non-certified individuals, and you can use the EC-Council CEH and CompTIA PenTest+ certifications to negotiate a higher salary when entering a new role. 

There are many roles for ethical hackers that are currently in high demand across the U.S. Some of the most common job titles include network security administrator, information security analyst, computer network defense analyst, penetration tester, and forensic analyst. 

The need for ethical hackers has grown tremendously over the last 10 years and demand is only accelerating. Ethical hackers fall under the U.S. Bureau of Labor Statistics (BLS) category of Information Security Analysts, and the BLS is predicting a 33% growth in jobs in this area over the next decade. 

Getting a certification that validates your ability to protect valuable information will put you at the top of employer candidate lists. The CEH and PenTest+ certifications are well known in the industry for providing individuals with an in-depth view of ethical hacking and penetration testing. 

Yes, this boot camp prepares you for certifications that meet U.S. Department of Defense Directive 8570.1 requirements for government employees or contractors engaged in work related to information security. 


Registration and Enrollment

This course is a self-paced course that can be completed 100% online. Open enrollment means that you can register and start the course whenever you are ready. Access to your course can take 24-48 business hours.

Have Questions? Contact Us By Filling Out the Form Below

Enroll Now