Learning Objectives

Intellectual Point
Reconnaissance Techniques

Understand and apply various footprinting and reconnaissance techniques, including search engine and social networking site analysis, and implement countermeasures to protect organizational assets.

Intellectual Point
System Hacking and Malware Threats

Gain proficiency in system hacking phases such as gaining access, escalating privileges, and maintaining access, along with understanding malware types, analysis, and countermeasures.

Intellectual Point
Network and Perimeter Hacking

Explore network-based attacks including sniffing, social engineering, denial-of-service, session hijacking, and techniques to evade IDS, firewalls, and honeypots, along with corresponding defense mechanisms.

Intellectual Point
Web Application and Server Exploitation

Learn methodologies to identify and exploit vulnerabilities in web servers and applications, including SQL injection attacks, and apply appropriate countermeasures to secure web assets.

Intellectual Point
Wireless, Mobile, IoT, and OT Security

Understand the security challenges and hacking methodologies associated with wireless networks, mobile platforms, Internet of Things (IoT), and Operational Technology (OT), and implement strategies to mitigate associated risks.

  • Intellectual Point's Certified Ethical Hacker (CEH) Training Course provides learners with the critical skills and knowledge needed to excel in the niche field of cybersecurity. This course is designed to teach you the practical aspects of ethical hacking through hands-on labs, real-world scenarios, and in-depth security protocols. It aims to prepare you for the CEH certification, ensuring you have a strong foundation in identifying vulnerabilities, system threats, and implementing defensive strategies.
  • Throughout the training, you will explore the various phases of ethical hacking, starting with reconnaissance, gaining and maintaining access, and followed by covering tracks. You will delve deep into the latest tools and techniques used by both ethical hackers and malicious attackers. By the end of the course, you will be adept at identifying potential security risks, fortifying network infrastructures, and conducting vulnerability assessments. By the end of this course, participants will:
  • 1) Develop expertise in ethical hacking methodologies and penetrate testing techniques.
  • 2) Identify and mitigate vulnerabilities in computer systems and networks effectively.
  • 3) Perform comprehensive vulnerability assessments and implement strategic security defenses.
  • 4) Understand and counteract techniques used by attackers to compromise systems.
  • 5) Prepare for and achieve the Certified Ethical Hacker certification, advancing your career in cyber.

Module by Module Learning Outline

Program Materials

Introduction to Ethical Hacking

Learning Objectives

  • Understand the role and importance of ethical hacking in cybersecurity.
  • Differentiate between ethical hacking and malicious hacking.

Topics Covered

  • Ethical Hacking Fundamentals: Definition, scope, legal implications, and ethical guidelines.
  • Cybersecurity Landscape: Common cyber threats, vulnerabilities, and security trends.

Reconnaissance Techniques

Learning Objectives

  • Learn various tools and techniques for information gathering.
  • Understand the first phase of ethical hacking: reconnaissance.

Topics Covered

  • Passive and Active Reconnaissance: Differences, information gathering tools.
  • Social Engineering: Human factor vulnerabilities, successful attack techniques.

Scanning Networks

Learning Objectives

  • Master network scanning methodologies to identify system loopholes.
  • Gain familiarity with scanning tools and techniques.

Topics Covered

  • Network Scanning Tools: Overview and practical use of popular tools.
  • Scanning Techniques: Types of scans (ping, port, vulnerability) and analyzing results.

Gaining Access

Learning Objectives

  • Understand different methods of gaining unauthorized access to systems.
  • Learn how to exploit system vulnerabilities.

Topics Covered

  • System Hacking Concepts: Exploiting vulnerabilities, password cracking, escalation.
  • Malware Threats: Types, characteristics, detection, and prevention.

Maintaining Access & Covering Tracks

Learning Objectives

  • Learn methods used to maintain access to compromised systems.
  • Understand techniques for erasing tracks to avoid detection.

Topics Covered

  • Persistent Threats: Maintaining long-term access, use of backdoors and rootkits.
  • Covering Tracks: Hiding activities, avoiding detection, and removing traces.

Vulnerability Assessment & Security Measures

Learning Objectives

  • Conduct comprehensive vulnerability assessments.
  • Implement defensive strategies to protect network infrastructures.

Topics Covered

  • Vulnerability Analysis: Scanning tools, interpreting scan results.
  • Defensive Security Techniques: Security protocols, updates, patch management.

Tuition & Hours

Tuition is charged by course. The cost of the certification exam is not included in the tuition and is a separate cost based on the current rates as set by the exam vendor.

Course Total Hours Tuition
SEC-200: Certified Ethical Hacker (CEH) 72 $3,999.00

Books & Supplies

There are no additional charges for books or supplies.

Indirect Costs

If you wish to obtain the Certified Ethical Hacker (CEH) certification exam, the cost is an additional fee not covered in tuition. While encouraged, the exam is not a required expense to be paid at the time of enrollment. To obtain an exam voucher, you will need to purchase it separately.

Course Exam Exam Fee
SEC-200: Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) $1,199

Program Award

Upon successful completion of the course, the student will receive a Certificate of Completion for Certified Ethical Hacker (CEH) Training.

* Exam fees are quoted based on time of publication. Voucher prices may change based on vendor rates and are updated accordingly. Please contact Intellectual Point to verify exam fee charges.

Class Registration

Date

Price

Location

May: 10, 2025 - June 8, 2025 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$3,999.00 In-Person & Virtual Register
July: 12, 2025 - August 3, 2025 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$3,999.00 In-Person & Virtual Register
August: 16, 2025 - September 14, 2025 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$3,999.00 In-Person & Virtual Register
September: 13, 2025 - October 5, 2025 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$3,999.00 In-Person & Virtual Register
February: 9, 2026 - March 6, 2026 - 6 PM - 10 PM (EST)
Schedule: Mon - Fri
$3,999.00 In-Person & Virtual Register
February: 14, 2026 - March 8, 2026 - 8 AM - 6 PM (EST)
Schedule: Sat & Sun
$3,999.00 In-Person & Virtual Register

Download Course PDF

Private Team Training

Enrolling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training

For details, call 704-554-3827

Event Presentation in crowded room

Come Learn With Intellectual Point

Price Match Guarantee!

We will match Competitor’s Price Quote.
Call for more details 703-554-3827

A Certified Ethical Hacker Course at Intellectual Point Includes:
  • Live instructor-led training in modern classrooms
  • Hands-on labs on real tools like Kali Linux, Metasploit, WireShark, Nmap, etc.
  • 24 x 7 access to the real labs in classrooms and remotely
  • Confidence building hands-on training led by industry experts
  • Authorized Pearson VUE Testing at the same location to help you complete your exam*
  • 100% latest material, notes, videos, and practice questions included in the course price

happy clients

What Our Customers Say - Based on over 600+ Reviews!

Our Top Customers
Training and Testing Partners