Eccentrix - Trainings catalog - Information Security - Cybersecurity Bootcamp (CS8524)

Cybersecurity Bootcamp (CS8524)

The Cybersecurity Bootcamp training is a two-course package that covers the most important topics in information security. The CEH training provides technical knowledge on securing corporate network infrastructures, while the CISSP training focuses on information security and its management. Both courses prepare you for the prestigious Certified Ethical Hacker and Certified Information Systems Security Professional certifications.

Certified Ethical Hacker (CEHv13) (CS6154)

The Certified Ethical Hacker (CEH) certification is one of the most recognized and recommended by employers for cybersecurity and cyber defense specialists. It is one of the most in-demand certifications to enhance the security level of IT infrastructures and service providers. Since the first version of the training in 2003, the CEH program has always been recognized as a standard in the cybersecurity community. Version 13 of the CEH continues this path and introduces the latest hacking techniques with the most advanced tools and exploits used by today’s cybersecurity professionals. The five steps of ethical hacking and the course’s mission remain the same: to acquire knowledge of network attacks to provide an adequate countermeasure to hackers.

Our CEH computer security training will provide you with knowledge of the five phases of hacking, attack vectors, and preventive countermeasures. This rigorous training will help you recognize how a hacker operates to better protect your networks and defend your company against cyber criminals. Understanding a system’s weaknesses and vulnerabilities helps organizations maintain security controls and minimize the risk of incidents. The CEH has been designed to incorporate a practical environment and a systematic methodology across offensive security domains, giving you the opportunity to work on improving your knowledge and ethical hacking skills.

Download our CEHv13 brochure to view all the details of this exclusive training!

Certified Information Systems Security Professional (CISSP) (CS8502)

This course complements your broad knowledge and experience in information security. It expands your knowledge by covering the eight domains defined by the Common Body of Knowledge (CBK) for information security professionals. The training offers an approach based on implementing a security process within an enterprise, while also serving as a preparation tool for the CISSP certification.

The CISSP certification is highly regarded in the world of technology and security today. This reputation is maintained because the organization (ISC)² continually improves the content through the engagement of industry experts, ensuring that the material and questions remain relevant despite the ongoing changes and challenges in the security field. By defining the eight CBK domains, an industry standard has been established, and the CISSP training thoroughly covers all of them. The skills and knowledge you will gain from this course will give you a deep understanding of these eight domains, establishing credibility and success for every professional in the field of information security.

Related trainings

Exclusives

Certified Ethical Hacker (CEHv13) (EC6154)

  • ELITE package: Voucher included with one retake for the theoretical certification exam – value of $1650 each time, one attempt at the Practical exam – value of $750!, EC-Council Engage & Compete

See all exclusives >>

Certified Information Systems Security Professional (CISSP) (CS8502)

See all exclusives >>

Public class

Our public classes allow individual professionals from different organizations to join training sessions via Microsoft Teams, creating a dynamic learning environment. Perfect for individual attendances or smaller teams.

Each date below represents the start date of the training course. Courses may be single-day or multi-day, with most multi-day sessions delivered consecutively. Click on any date to proceed with registration for your preferred session.

Planned date
November 24, 2025
6595 CAD
English
Planned date
December 8, 2025
6595 CAD
English
Planned date
January 19, 2026
6595 CAD
English
Planned date
February 23, 2026
6595 CAD
English
Planned date
March 16, 2026
6595 CAD
English
Planned date
April 20, 2026
6595 CAD
English
Planned date
May 11, 2026
6595 CAD
English
Planned date
June 8, 2026
6595 CAD
English

Private class

Reserve this training exclusively for your organization with pricing adapted to the number of participants. Our pricing for private classes varies according to the size of your group, with a guaranteed minimum threshold to maintain pedagogical quality.

  • Volume-based pricing discount according to the number of participants
  • Training delivered in an environment dedicated to your team
  • Scheduling flexibility according to your availability
  • Enhanced interaction among colleagues from the same organization
  • Same exclusive benefits as our public training sessions

How to get a proposal?

Use the request form by specifying the number of participants. We will quickly send you a complete proposal with the exact pricing, available dates, and details of all the benefits included in your private training.

Training plan

Certified Ethical Hacker (CEHv13) (EC6154)

Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking.

Learn different network scanning techniques and countermeasures.

Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.

Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Learn the various session-hijacking techniques used to discover
network-level session management, authentication, authorization,
and cryptographic weaknesses and associated countermeasures.

Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.

Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Certified Information Systems Security Professional (CISSP) (CS8502)

  • Security Governance Principles
  • Compliance
  • Professional Ethics
  • Security Documentation
  • Risk Management
  • Threat Modeling
  • Business Continuity Plan Fundamentals
  • Acquisition Strategy and Practice
  • Personnel Security Policies
  • Security Awareness and Training
  • Asset Classification
  • Privacy Protection
  • Asset Retention
  • Data Security Controls
  • Secure Data Handling
  • Security in the Engineering Lifecycle
  • System Component Security
  • Security Models
  • Controls and Countermeasures in Enterprise Security
  • Information System Security Capabilities
  • Design and Architecture Vulnerability Mitigation
  • Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
  • Cryptography Concepts
  • Cryptography Techniques
  • Site and Facility Design for Physical Security
  • Physical Security Implementation in Sites and Facilities
  • Network Protocol Security
  • Network Components Security
  • Communication Channel Security
  • Network Attack Mitigation
  • Physical and Logical Access Control
  • Identification, Authentication, and Authorization
  • Identity as a Service
  • Authorization Mechanisms
  • Access Control Attack Mitigation
  • System Security Control Testing
  • Software Security Control Testing
  • Security Process Data Collection
  • Audits
  • Security Operations Concepts
  • Physical Security
  • Personnel Security
  • Logging and Monitoring
  • Preventative Measures
  • Resource Provisioning and Protection
  • Patch and Vulnerability Management
  • Change Management
  • Incident Response
  • Investigations
  • Disaster Recovery Planning
  • Disaster Recovery Strategies
  • Disaster Recovery Implementation
  • Security Principles in the System Lifecycle
  • Security Principles in the Software Development Lifecycle
  • Database Security in Software Development
  • Security Controls in the Development Environment
  • Software Security Effectiveness Assessment

Recommended prerequisite knowledge

Certified Ethical Hacker (CEHv13) (EC6154)

  • Knowledge of the operation of client and server operating systems (file systems, permissions, Windows security, Linux, etc.).
  • Basic knowledge of network protocols, for example TCP / IP.
  • General notions of server roles and services present in a network.

Certified Information Systems Security Professional (CISSP) (CS8502)

  • Basic Understanding of Information Security: Participants should have a fundamental knowledge of information security concepts, such as confidentiality, integrity, and availability.
  • Experience in IT or Related Fields: While not mandatory, it’s beneficial to have some experience in IT, networking, or cybersecurity. This helps in understanding the course content more effectively.
  • Familiarity with Networking Concepts: A basic understanding of networking principles, including TCP/IP, firewalls, and network security, is recommended.
  • Knowledge of Security Policies and Practices: Awareness of security policies, risk management, and security frameworks can be advantageous.
  • Technical Background: While not required, having a technical background in areas such as system administration, software development, or network administration can be helpful in grasping more complex topics covered in the course.
  • Interest in Security Management: A strong interest in cybersecurity management and the desire to learn about advanced security practices is essential.

Even though these prerequisites are helpful, many CISSP course objectives are designed to cater to a wide range of professionals, often providing a start with foundational concepts to build up the knowledge necessary for more advanced topics.

Credentials and certification

CEHv13 exams features

Cost: $0 (included in your training)

CEH Knowledge exam
  • Code: 312-50
  • Online with EC-Council Exam Center
  • Number of Questions: 125
  • Question Format: Multiple choice
  • Duration: 4 hours

All details >>

CEH Practical exam
  • Number of Questions: 20
  • Question Format: Scenario based
  • Monitored online
  • Duration: 6 hours
  • Helps you acquire the CEH Master certification

All details >>

CISSP exam features

  • Preparation for the Certified Information Systems Security Professional (CISSP) Certification
  • Cost: 749 USD
  • Questions Format: Multiple choice and advanced innovative questions
  • Duration: 3 hours
  • Number of Questions: 150
  • Passing Score: 700/1000

All details >>

Cybersecurity Bootcamp Training

The Cybersecurity Bootcamp training is an intensive training program that combines the Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP) certifications. It is designed for IT professionals who aim to excel in the field of cybersecurity. This unique program offers a comprehensive and hands-on approach to mastering critical concepts and technical skills necessary for securing information systems and network infrastructures.

This all-inclusive training prepares participants for the CEH and CISSP certification exams, two globally recognized credentials that demonstrate advanced expertise in information security.

Why Choose the Cybersecurity Bootcamp?

With the rise of cyberattacks and threats, organizations need skilled professionals to safeguard their digital assets. This bootcamp offers a unique opportunity to gain advanced technical skills while preparing for two of the most sought-after certifications in cybersecurity.

Participants benefit from expert-led training focused on practical applications, enabling them to develop robust security strategies and ensure the resilience of IT systems.

Key Features of the Training

  1. Dual Certification: CEH and CISSP
    Prepare to earn two globally recognized certifications in one comprehensive and intensive program.

  2. In-depth Technical Expertise
    Learn to identify and exploit vulnerabilities, design robust security architectures, and manage risks effectively.

  3. Real-World Practical Training
    Engage in hands-on labs and case studies to apply your knowledge to real-world scenarios.

  4. Comprehensive Approach to Cybersecurity
    Master both the technical and strategic aspects of security, from ethical hacking to organizational risk management.

  5. Intensive Exam Preparation
    Access tailored resources and exercises designed to ensure success in the CEH and CISSP exams.

  6. Globally Recognized Certification
    Enhance your career prospects with credentials valued by employers worldwide.

Skills Developed

  • Identify, analyze, and exploit security vulnerabilities
  • Develop incident response and disaster recovery strategies
  • Design security architectures aligned with industry best practices
  • Implement governance and compliance policies
  • Protect systems against internal and external threats
  • Collaborate effectively with multidisciplinary teams to secure IT infrastructures

Who Should Attend?

This bootcamp is ideal for:

  • IT professionals seeking specialization in cybersecurity
  • Security analysts and consultants responsible for protecting network infrastructures
  • IT managers aiming to strengthen their knowledge of organizational security
  • Individuals preparing for the CEH and CISSP certifications

Advance Your Career in Cybersecurity with the Bootcamp

The Cybersecurity Bootcamp (CS8524) provides a unique opportunity to acquire advanced expertise while earning two prestigious certifications. Enroll today to strengthen your skills, gain globally recognized certifications, and play an active role in protecting organizations against cyber threats.

Frequently asked questions - CISSP and CEH certification preparation bootcamp (FAQ)

The training covers ethical hacking, risk management, compliance, cryptography, and incident response.

A basic understanding of IT and security concepts is recommended.

Yes, interactive labs allow participants to apply the concepts learned to real-world scenarios.

Yes, the content is designed to cover the objectives of both certifications.

They validate advanced cybersecurity skills, enhancing career opportunities.

Prior experience in IT or networking is recommended to maximize the benefits of this program.

Request form for a private class training

Dear Customer,

We thank you for your interest in our services. Here is the important information that will be provided to us upon completion of this form:

Training name: Cybersecurity Bootcamp (CS8524)

Language: English

Duration: 10 days / 70 hours

Number of participants from your organization *

Minimum number of participants: 6

Organization name *
Your first and last name *
Telephone number *
Professional email *
Please provide a work or professional email address.
How did you hear about us? *
Comments or Remarks
Promotional code
The General Conditions are accessible on this page.