Search results for:
No result found! Try with different keywords!

2019 Certified Ethical Hacker Classes


2019 Certified Ethical Hacker Classes

Registration now open.  Only 20 slots available, so register soon! partnership with Palmetto Cyber

Certified Ethical Hacker (CEH) Preparation Course  -


“To beat a hacker, you need to think like a hacker”  

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

This program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. 

All materials and exam are included in the cost of this program. Upon completion of this program, you will sit for the Certified Ethical Hacker (CEH) Exam 312-50 which is overseen by our proctor.

What You'll Learn...

This program will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. 

Upon completion of this program, you will know...

Key issues plaguing the information security world, incident management process, and penetration testing

Various types of footprinting, footprinting tools, and countermeasures

Network scanning techniques and scanning countermeasures

System hacking methodology, steganography, steganalysis attacks, and covering tracks

Different types of Trojans, Trojan analysis, and Trojan countermeasures

Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures

Packet sniffing techniques and how to defend against sniffing

Social Engineering techniques, identify theft, and social engineering countermeasures

DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

Session hijacking techniques and countermeasures

Different types of webserver attacks, attack methodology, and countermeasures

Different types of web application attacks, web application hacking methodology, and countermeasures

SQL injection attacks and injection detection tools

Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools

Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures

Various cloud computing concepts, threats, attacks, and security techniques and tools

Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap

Materials Included...

EC-Council CEH e-Courseware and iLabs Subscription 

CEH Certified Ethical Hacker Bundle, Third Edition (All-in-One) 3rd Edition by Matt Walker

All of the domains from the Exam Blueprint are covered

Class Date


Planned Activity

Mon Mar 18

6 pm - 9 pm

Introduction/ Registration/Essential Knowledge

Tue Mar 19

6 pm - 9 pm


Wed Mar 20

6 pm - 9 pm

Scanning & Enumeration

Thu Mar 21

6 pm - 9 pm

Sniffing & Evasion

Fri Mar 22

6 pm - 9 pm

Attacking a System

Sat Mar 23

10 am - 2 pm

Web-Based Hacking

Mon Mar 25

6 pm - 9 pm

Wireless Hacking

Tues Mar 26

6 pm - 9 pm

Security in Cloud Computing

Wed Mar 27

6 pm - 9 pm

Trojans & Other Attacks

Thu Mar 28

6 pm - 9 pm

Cryptography/ Chpt 11 Social Engineering

Fri Mar 29

6 pm - 9 pm

The Pen Test/ Course review

Sat Mar 30

10 am - 2 pm

Certification Exam




 Are there ID or minimum age requirements to enter the event?

No, everyone is welcome. 

 What are my transportation/parking options for getting to and from the event?

Free street parking after 5 pm and on weekends.  Paid parking is avaiable at parking decks behind Marriott and on 9th Street. 

What can I bring into the event?

Computers are available but feel free to bring any note taking material. 

 How can I contact the organizer with any questions?

Via email aGV5YSB8IHRoZUNsdWJob3UgISBzZQ== Attn: Cyber Classes

Do I have to bring my printed ticket to the event?

No, we will have your registratoin information already. 


You may also like the following events from

Map Georgia Cyber Center Hull Mcknight Building, 100 Grace Hopper Lane, Augusta, United States
Loading venue map..
Event details from Report a problem

Are you going to this event?


More Events in Augusta

Explore More Events in Augusta