
CEH & CNDA: Certified Ethical Hacker and Certified Network Defense Architect Training Course V10
New York City
EC-Council Accredited Training Center
The Certified Ethical Hacker (CEH) & CNDA by EC-Council are some of the most respected security certifications in the world. Information systems security professionals use this certification to show organizations that they understand security concepts and penetration testing.
This course is great for anyone looking to pass the Certified Ethical Hacker exam 312-50. This course teaches the latest exam objectives for version 10.
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
All courses are live instructor-led. If you have a group of employees looking to get certified, call us for a customized quote. We offer great discounts and onsite training for groups of two or more.
Students will be taking the certification exam on the last day of the Boot Camp. Take this course and obtain the Certified Ethical Hacker certification in just 5 days. Don't spend thousands of dollars more for the same class with less experienced instructors and poor classroom quality, register with us to save and learn fast.
Money Back Guarantee
- If you cannot pass the 312-50 exam after 2 re-takes of the exam, we will refund the full amount of the tuition, no questions asked.
- High quality training. If you are not happy with the course with the course after the first day, let us know and we will issue you a refund.
Benefits of this course
- Small class sizes. This will allow for great personal training with the instructor.
- EC-Council Authorized Training Course
- EC-Council Authorized Courseware
- Onsite Testing Center
- Certified EC-Council Instructor
- 5-day course includes a mock exam, which allows students to know their weak and strong points.
- Take the official CEH exam on the last day of the course.
- Our training material is always updated to match the latest exam objectives.
- We have great instructors. Our CEH Certified Instructors all have over 15 years of experience.
- This is not a lecture only class, we conduct over 100 hands on hacking labs.
- As many free course retake as you need, for up to one year.
- Affordable cost. Some places charge more than double for less quality training.
- 100% Money Back Guarantee
- Exam Protection
545 8th Avenue, 4th Floor
New York, NY 10018
Between 37th and 38th street.
Click Here for Directions
1 2 3 7 A CE BD F M G J Z L S N Q R W
108 111 129 160 161 190 192
![]() |
Other Training Companies | |
Small classes Size | (classes with 18+ students) | |
5 Days of Training | ||
Instructor with real world Experience | (Instructors with no real world Experience) | |
Lowest price guaranteed | (Most schools are above $2500) | |
Money Back Guarantee. If you are not happy with the course after the first class | (If you are not happy with the course, you will not get are a refund) | |
Live instructor led training | ||
Licensed School | (Unlicensed, unauthorized training) | |
Online or Classroom, live instructor training | (Just classroom or online classes) | |
Realistic Mock Exam | (No Exam or unrealistic) | |
Over 1,100 practice questions | (Most offer a few questions to practice) | |
Allows you to speak to the instructor before you start the class. | (You never meet the instructor until the class starts) | |
Unlimited free retakes of the course for up to one year. | (No retakes allowed) | |
Updated course material to match the current exam topics | (Training material not updated to the latest exam content) |
Where is the school located?
New York City Location
545 8th Avenue, 4th Floor
New York, NY 10018
Click Here for Directions
Is this course hands on?
Yes this course is has many labs at the end of each lessons, such as SQL injections, web scanning, and system hacking.
Is this school an Authorize Training Center?
Yes, we are EC-Council Accredited Training Center. All course material are EC-Council authorized.
If I take the classroom course can I do a few days Online?
Yes you could. If you sign up for a classroom course you can attend a few days Online. Also if you sign up for an Online course you can attend a few days in the classroom.
What are your instructors like?
We only hire the best instructors. Our instructors for CEH must have a minimum of 10 years of experience in the security industry and at least 5 years of teaching experience. Call us if you would like to speak to the instructor, who would be teaching your class.
Dose the course tuition include books and exam?
Yes this course does include all books and 1 exam voucher. We are an authorized testing center. When you are finish with the course you can schedule the exam with us.
Why should I choose your training over other CEH training Providers?
Choosing a training provider can be tough choice. We all claim to offer the best value, in terms of price, passing rates, and guarantee. The Technical Institute of America offers the lowest price, has one of the best passing rates, and an excellent guarantee. As a New York State licensed school and Better Business Bureau Accredited business we can honestly say what we offer is the truth and you can verify it. It’s the reason why we offer the dual money back guarantee
Do you ever cancel a class because you don’t have enough students?
No, we never cancel a class. We will teach a class with 1 registered student if we have to. If unforeseen circumstances arise such as bad weather, instructor health or family problems and we have to cancel a class, we will offer all students a 100% refund or reschedule to another class.
I might miss one or more classes, can I make it up?
Yes we offer the most flexible schedule of all training centers. If you miss one or more of your classes you can attend a weekend, evening, or weekday class to make up your class. E.g. if you miss a Saturday class, attend the following week evening course to make it up.
Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands-on understanding and experience in Ethical Hacking.
Module 01: Introduction to Ethical Hacking
- Information Security Overview
- Information Security Threats and Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Incident Management Process
- Responsibilities of an Incident Response Team.
- Information Security Laws and Standards
Module 02: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
- Email Footprinting
- Competitive Intelligence
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Pen Testing
Module 03: Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Scanning Techniques
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Draw Network Diagrams
- Network Discovery Tools for Mobile
- Scanning Pen Testing
Module 04: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
- Enumeration Pen Testing
Module 05: Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Assessment Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
Module 06: System Hacking
- System Hacking Concepts
- Cracking Passwords
- Password Recovery Tools
- Microsoft Authentication
- How Hash Passwords Are Stored in Windows SAM?
- NTLM Authentication Process
- Kerberos Authentication
- Password Salting
- Tools to Extract the Password Hashes
- Password Cracking Tools
- How to Defend against Password Cracking
- How to Defend against LLMNR/NBT-NS Poisoning
- Escalating Privileges
- Hiding Files
- What is Steganography?
- Covering Tracks
- Penetration Testing
Module 07: Malware Threats
- Malware Concepts
- Trojan Concepts
- Virus and Worm Concepts
- Malware Analysis
- Countermeasures
- Anti-Malware Software
- Malware Penetration Testing
Module 08: Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
- Countermeasures
- Sniffing Detection Techniques
- Sniffing Pen Testing
Module 09: Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Countermeasures
- Social Engineering Pen Testing
Module 10: Denial-of-Service
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Tools
- Countermeasures
- DoS/DDoS Protection Tools
- DoS/DDoS Penetration Testing
Module 11: Session Hijacking
- Session Hijacking Concepts
- Application Level Session Hijacking
- Network Level Session Hijacking
- Session Hijacking Tools
- Countermeasures
- Penetration Testing
Module 12: Evading IDS, Firewalls, and Honeypots
- IDS, Firewall and Honeypot Concepts
- IDS, Firewall and Honeypot Solutions
- Evading IDS
- Evading Firewalls
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Countermeasures
- Penetration Testing
Module 13: Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Tools
- Countermeasures
- Patch Management
- Web Server Security Tools
- Web Server Pen Testing
Module 14: Hacking Web Applications
- Web App Concepts
- Web App Threats
- Hacking Methodology
- Web App Hacking Tools
- Countermeasures
- Web App Security Testing Tools
- Web App Pen Testing
Module 15: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Countermeasures
Module 16: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Countermeasures
- Wireless Security Tools
- Wireless Pen Testing
Module 17: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Spyware
- Mobile Device Management
- Mobile Security Guidelines and Tools
- Mobile Pen Testing
Module 18: IoT Hacking
- IoT Concepts
- IoT Attacks
- IoT Hacking Methodology
- IoT Hacking Tools
- Countermeasures
- IoT Pen Testing
Module 19: Cloud Computing
- Cloud Computing Concepts
- Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cloud Security Tools
- Cloud Penetration Testing
Module 20: Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Email Encryption
- Disk Encryption
- Cryptanalysis
Sale ends Oct 03, 2025
Filter Location
Upcoming Dates
We don't have any upcoming dates for this course. Please call us at (212) 564-2351 for more information.
Testimonials
"I was able to pass the CEH exam on the last day of the course with just the courseware and instructor Juan help. I cannot say thank you enough."
Paul. B
"The Instructor Alex made learning the concepts easy and was really helpful during the labs. He knows the material inside out and makes it easy to learn. I took the exam Friday at the end of class and passed."
Jesse C.
"This is crazy amount of materials to cover in 5 days. I wasn't sure it was possible, but Alex was able to cover it and do labs with us. My entire group of 5 was able to pass the exam on Friday. Thanks Alex and TIA."
Abe. K.
"I was trying to self-study for this exam for months with videos and books and was not able to get it done. I signed up for the CEH class with TIA and was certified in a week. It was a lot of work, but Alex just kept pushing me to stay with it. If you want to be CEH certified, this class is for you."
Nelson L.