Training plan
Certified Ethical Hacker (CEHv13) (EC6154)
Module 1: Introduction to Ethical Hacking
Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Module 2: Foot printing and Reconnaissance
Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking.
Module 3: Scanning Networks
Learn different network scanning techniques and countermeasures.
Module 4: Enumeration
Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Module 5:Vulnerability Analysis
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.
Module 6: System Hacking
Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Module 7: Malware Threats
Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Module 8: Sniffing
Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Module 9: Social Engineering
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Module 10: Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Module 11: Session Hijacking
Learn the various session-hijacking techniques used to discover
network-level session management, authentication, authorization,
and cryptographic weaknesses and associated countermeasures.
Module 12: Evading IDS, Firewalls, and Honeypots
Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Module 13: Hacking Web Servers
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Module 14: Hacking Web Applications
Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.
Module 15: SQL Injection
Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Module 16: Hacking Wireless Networks
Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17: Hacking Mobile Platforms
Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18: IoT Hacking
Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Module 19: Cloud Computing
Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Module 20: Cryptography
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
Certified Information Systems Security Professional (CISSP) (CS8502)
Module 1: Security and Risk Management
- Security Governance Principles
- Compliance
- Professional Ethics
- Security Documentation
- Risk Management
- Threat Modeling
- Business Continuity Plan Fundamentals
- Acquisition Strategy and Practice
- Personnel Security Policies
- Security Awareness and Training
Module 2: Asset Security
- Asset Classification
- Privacy Protection
- Asset Retention
- Data Security Controls
- Secure Data Handling
Module 3: Security Engineering
- Security in the Engineering Lifecycle
- System Component Security
- Security Models
- Controls and Countermeasures in Enterprise Security
- Information System Security Capabilities
- Design and Architecture Vulnerability Mitigation
- Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
- Cryptography Concepts
- Cryptography Techniques
- Site and Facility Design for Physical Security
- Physical Security Implementation in Sites and Facilities
Module 4: Communications and Network Security
- Network Protocol Security
- Network Components Security
- Communication Channel Security
- Network Attack Mitigation
Module 5: Identity and Access Management
- Physical and Logical Access Control
- Identification, Authentication, and Authorization
- Identity as a Service
- Authorization Mechanisms
- Access Control Attack Mitigation
Module 6: Security Assessment and Testing
- System Security Control Testing
- Software Security Control Testing
- Security Process Data Collection
- Audits
Module 7: Security Operations
- Security Operations Concepts
- Physical Security
- Personnel Security
- Logging and Monitoring
- Preventative Measures
- Resource Provisioning and Protection
- Patch and Vulnerability Management
- Change Management
- Incident Response
- Investigations
- Disaster Recovery Planning
- Disaster Recovery Strategies
- Disaster Recovery Implementation
Module 8: Software Development Security
- Security Principles in the System Lifecycle
- Security Principles in the Software Development Lifecycle
- Database Security in Software Development
- Security Controls in the Development Environment
- Software Security Effectiveness Assessment
Recommended prerequisite knowledge
Certified Ethical Hacker (CEHv13) (EC6154)
- Knowledge of the operation of client and server operating systems (file systems, permissions, Windows security, Linux, etc.).
- Basic knowledge of network protocols, for example TCP / IP.
- General notions of server roles and services present in a network.
Certified Information Systems Security Professional (CISSP) (CS8502)
- Basic Understanding of Information Security: Participants should have a fundamental knowledge of information security concepts, such as confidentiality, integrity, and availability.
- Experience in IT or Related Fields: While not mandatory, it’s beneficial to have some experience in IT, networking, or cybersecurity. This helps in understanding the course content more effectively.
- Familiarity with Networking Concepts: A basic understanding of networking principles, including TCP/IP, firewalls, and network security, is recommended.
- Knowledge of Security Policies and Practices: Awareness of security policies, risk management, and security frameworks can be advantageous.
- Technical Background: While not required, having a technical background in areas such as system administration, software development, or network administration can be helpful in grasping more complex topics covered in the course.
- Interest in Security Management: A strong interest in cybersecurity management and the desire to learn about advanced security practices is essential.
Even though these prerequisites are helpful, many CISSP course objectives are designed to cater to a wide range of professionals, often providing a start with foundational concepts to build up the knowledge necessary for more advanced topics.
Credentials and certification
CEHv13 exams features
Cost: $0 (included in your training)
CEH Knowledge exam
- Code: 312-50
- Online with EC-Council Exam Center
- Number of Questions: 125
- Question Format: Multiple choice
- Duration: 4 hours
CEH Practical exam
- Number of Questions: 20
- Question Format: Scenario based
- Monitored online
- Duration: 6 hours
- Helps you acquire the CEH Master certification
CISSP exam features
- Preparation for the Certified Information Systems Security Professional (CISSP) Certification
- Cost: 749 USD
- Questions Format: Multiple choice and advanced innovative questions
- Duration: 3 hours
- Number of Questions: 150
- Passing Score: 700/1000
Cybersecurity Bootcamp Training
The Cybersecurity Bootcamp training is an intensive training program that combines the Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP) certifications. It is designed for IT professionals who aim to excel in the field of cybersecurity. This unique program offers a comprehensive and hands-on approach to mastering critical concepts and technical skills necessary for securing information systems and network infrastructures.
This all-inclusive training prepares participants for the CEH and CISSP certification exams, two globally recognized credentials that demonstrate advanced expertise in information security.
Why Choose the Cybersecurity Bootcamp?
With the rise of cyberattacks and threats, organizations need skilled professionals to safeguard their digital assets. This bootcamp offers a unique opportunity to gain advanced technical skills while preparing for two of the most sought-after certifications in cybersecurity.
Participants benefit from expert-led training focused on practical applications, enabling them to develop robust security strategies and ensure the resilience of IT systems.
Key Features of the Training
Dual Certification: CEH and CISSP
Prepare to earn two globally recognized certifications in one comprehensive and intensive program.In-depth Technical Expertise
Learn to identify and exploit vulnerabilities, design robust security architectures, and manage risks effectively.Real-World Practical Training
Engage in hands-on labs and case studies to apply your knowledge to real-world scenarios.Comprehensive Approach to Cybersecurity
Master both the technical and strategic aspects of security, from ethical hacking to organizational risk management.Intensive Exam Preparation
Access tailored resources and exercises designed to ensure success in the CEH and CISSP exams.Globally Recognized Certification
Enhance your career prospects with credentials valued by employers worldwide.
Skills Developed
- Identify, analyze, and exploit security vulnerabilities
- Develop incident response and disaster recovery strategies
- Design security architectures aligned with industry best practices
- Implement governance and compliance policies
- Protect systems against internal and external threats
- Collaborate effectively with multidisciplinary teams to secure IT infrastructures
Who Should Attend?
This bootcamp is ideal for:
- IT professionals seeking specialization in cybersecurity
- Security analysts and consultants responsible for protecting network infrastructures
- IT managers aiming to strengthen their knowledge of organizational security
- Individuals preparing for the CEH and CISSP certifications
Advance Your Career in Cybersecurity with the Bootcamp
The Cybersecurity Bootcamp (CS8524) provides a unique opportunity to acquire advanced expertise while earning two prestigious certifications. Enroll today to strengthen your skills, gain globally recognized certifications, and play an active role in protecting organizations against cyber threats.
Frequently asked questions - CISSP and CEH certification preparation bootcamp (FAQ)
What topics are covered in the bootcamp?
The training covers ethical hacking, risk management, compliance, cryptography, and incident response.
What are the prerequisites for this program?
A basic understanding of IT and security concepts is recommended.
Does the program include practical exercises?
Yes, interactive labs allow participants to apply the concepts learned to real-world scenarios.
Is the training aligned with the CEH and CISSP exams?
Yes, the content is designed to cover the objectives of both certifications.
What are the benefits of these certifications?
They validate advanced cybersecurity skills, enhancing career opportunities.
Is this bootcamp suitable for beginners?
Prior experience in IT or networking is recommended to maximize the benefits of this program.















