CEH: Certified Ethical Hacker v8

April 30 – May 4
9am – 5pm

This 5 day bootcamp is a comprehensive ethical hacking course focusing on the latest security threats, advanced attack vectors and practical demonstrations of the latest hacking techniques, methodologies, tools, tricks and offensive security measures. By understanding how perimeter defenses work, you can then move onto scanning and attacking networks during labs and other hacking exercises. You will also learn how intruders escalate privileges and how to effectively secure systems. Plus, gain first-hand knowledge of Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation, Intrusion Detection, Policy Creation and much more. The lab-intensive environment gives you in-depth knowledge and practical experience with the current, critical security systems. Unlike other strictly theoretical training, you will be immersed in interactive sessions with hands-on labs throughout the week – putting this newfound knowledge to the test by pen testing, hacking and securing systems. When you leave this intensive 5 day class you will have hands-on experience with an in-depth understanding of how hackers attack and how to better protect your network against these malicious attacks.


1. Key issues plaguing the info security world, incident management process, and penetration testing
2. Various types of footprinting, footprinting tools, and countermeasures
3. Network scanning techniques and scanning countermeasures
4. Enumeration techniques and enumeration countermeasures
5. System hacking methodology, steganography, steganalysis attacks, and covering tracks
6. Different types of Trojans, Trojan analysis, and Trojan countermeasures
7. Workings of viruses, virus analysis, computer worms, malware analysis procedure, & countermeasures
8. Packet sniffing techniques and how to defend against sniffing
9. Social Engineering techniques, identify theft, and social engineering countermeasures
10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
11. Session hijacking techniques and countermeasures
12. Different types of webserver attacks, attack methodology, and countermeasures
13. Different types of web app attacks, web application hacking methodology, and countermeasures
14. SQL injection attacks and injection detection tools
15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
16. Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, Windows phone 8 vulnerabilities, mobile security guidelines, and tools
17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
18. Various buffer overflows, how to mutate a buffer overflow exploit, buffer overflow detection tools, and countermeasures
19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
20. Various types of penetration testing, security audit, vulnerability assessment, and pen testing roadmap


1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffing
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Hacking Mobile Platforms
17. Evading IDS, Firewalls and Honeypots
18. Buffer Overflows
19. Cryptography
20. Penetration Testing


• Award-Winning Instructor
• Instructor Certified in What They Teach
• Instructor Who Is a Practitioner – Bringing Expertise and Real-World Experience to Classroom
• Official Courseware
• Labs
• Study Guides
• Exam Voucher
• Certification Preparedness
• Certificate of Completion
• Lunch Every Day
• Snacks and Coffee Breaks for Duration of Training
• Instructor Availability
• Lifetime Membership to Hacker University
• Reduced Rates on Parameter Security’s Services
• Complimentary Pass to the Two Day ShowMeCon Conference
• Access to Conference Welcome Reception & After Parties
• And More


• Student to inform Hacker U if taking exam at Hacker U after con or at another testing center
• Deep understanding of Basic Networking Technologies
• Basic Knowledge of Operating Systems
• At least 3 years IT security experience
• A strong working knowledge of TCP/IP
• Windows Server (NT, 2000, 2003, 2008)
• Basic familiarity with Linux and/or Unix
• Basic Linux BASH experience

COST: $2,250 per person


QUESTIONS? Call us at 314.442.0472 or email info (at) showmecon (dot) com

(C) 2014 Parameter Security