Reston, VA, Certified Ethical Hacker (CEH) Training
Whether you’re a network administrator or a member of corporate security staff, the CEH core curriculum empowers you to stay ahead of hackers — and in a fun, interactive environment that’s exciting, not overwhelming. Rather than a boring lecture hall, our learning environment is collaborative, where you are hands-on experimenting with what you’re being taught. We show you how to examine, test, invade, and fully secure your own system, beginning by covering network perimeter defense and moving into vulnerability scanning and systems hacking. Some of the topics we’ll cover include buffer overflows, virus development, intruder detection and policy influence.
With TrainACE, you have your choice of an in-classroom environment, online sessions with live instructors or prerecorded courses that allow you to learn at your own pace. In every case, our curriculum tangibly prepares you to defend your systems properly.
An Overview of the CEH Program
One of the most recently authorized programs of its type under the DoD 8570 Directive, our CEH training is one of the highest and most highly sought after certifications in the IT security industry. The program is designed to parallel the CEH Certification Exams 312-50 and ECO-350 as established by the EC-Council, complete with official CEH texts, lab materials, and the latest in hacking tools. At the end of the five-day intensive program, participants take the CEH certification exam in order to leave with immediate access to testing results.
Some of the topics you can expect to learn about in the Reston, VA, CEH Training Program include the following:
- Document grinding
- Internet application testing
- Implementing effective response tactics
- Finding and resolving system vulnerabilities
- Recognizing network weaknesses
- Remote system attacking
CEH Program Prerequisites
While you do not need to have previous hacking experience in order to participate in TrainACE’s CEH program, you do need at least two years of experience in an IT security role, working as a network administrator, system administrator, an auditor, a security officer or another professional position focused on safeguarding networking security. You need knowledge of TCP/IP and a working knowledge of Linux and/or Microsoft XP/Vista.