Certified Ethical Hacker (CEH) in Washington, D.C.

Certified Ethical Hacker
(CEH) in Washington, D.C.

Get Official EC-Council Training

Certified Ethical Hacker Program
Live Online or Live In Person

Register for Training

The world’s most advanced ethical hacking course with 20 of the most current security domains an ethical hacker needs to know to further their cybersecurity career. In 20 comprehensive modules, the course covers over 270 attack technologies commonly used by hackers. Our security experts have designed over 140 labs which mimic real scenarios and provide you with access to over 2,000 commonly used hacking tools to immerse you into the hacker world.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification once you pass the included exam!

Course Outline:

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service

  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

Register for Training

Pricing
$3,499

Dates
March 11th – March 15th | Washington, D.C. and Live Online
July 15th – July 19th | Washington, D.C. and Live Online

Meet the Instructor

Kevin King

IoT, The Cloud, Quantum Computing, Artificial Intelligence, Atomically Precise Manufacturing, crowd funding, crowd sourcing, accelerating change, The Singularity.

These are just some of the technologies and interests that have held the attention of Kevin King, EC Council’s Director of Integrated Learning. Kevin has worked with many companies large to small in the roles of network infrastructure consulting, as well as training in network infrastructure, automation and security.

Kevin maintains many technical certifications and teaches classes such as Certified Ethical Hacker, Certified Incident Handler, Certified Threat Intelligence Analyst, and certifications from Cisco and Microsoft. He is an avid Science Fiction and general book reader, and someone who enjoys ethical hacking, hacking nutrition, hacking fitness, and hacking learning. ​

EC-Council Certified Ethical Hacker (CEH) MasterClass Program

  • Live Course Delivered by an EC-Council Master Trainer
  • Official Printed Courseware
  • Online Labs (6 months access)
  • Online Exam Prep Program
  • Certification Exam
  • Exam Retakes – 1 qty
  • CEH On-Demand Course (1 year access)

Don’t just take a class. Join a program.

The Ethical Hacker Program includes your choice of either a complete Certfied Pen-Testing Professional (CPENT), or a Certified Hacking Forensice Investigator (CHFI) course. Courses include e-courseware, labs, and exams.

The Computer Hacking Forensic Investigator (CHFI) course delivers the security discipline of digital forensics from a vendor-neutral perspective. CHFI is a comprehensive course covering major forensic investigation scenarios and enabling students to acquire necessary hands-on experience with various forensic investigation techniques and standard forensic tools necessary to successfully carry out a computer forensic investigation leading to the prosecution of perpetrators.

EC-Council’s Certified Penetration Tester (CPENT) program is all about the pen test and will teach you to perform in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you to pen test IoT systems, OT systems, as well as how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and customization of scripts and exploits to get into the innermost segments of the network.

Ask a Training Consultant

Name(Required)
Country(Required)
Area of Interest (Multi-Select)(Required)
Training Method (Multi-Select)(Required)