Course Overview:

This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. Students are in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. All while teaching students how to scan, test, hack, and secure target systems.

The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

This course delivers in-demand ethical hacking skills while preparing you for the internationally-recognized Certified Ethical Hacker certification exam (312-50) from EC-Council.

Students have access to over 140 labs which EC Council security experts have designed to mimic real-time scenarios to help you “live” through an attack as if it were real. Students will also receive access to over 2,200 commonly used hacking tools to immerse you into the hacker world.

This course supports a certification that is DoD approved 8570 Baseline Certificate and meets DoD 8140/8570 training requirements.

What’s Included:

  • EC-Council official E-Courseware
  • EC-Council official iLabs 2.0
  • EC-Council official Certificate of Attendance
  • CEH Exam Voucher


Security Course Flow
Document Flow Chart iconsm


Date/Time Event
10/21/2019 - 10/25/2019
08:00 -17:00
TN-555: Certified Ethical Hacker v10
TechNow – San Antonio, TX, San Antonio TX
01/13/2020 - 01/17/2020
08:00 -17:00
TN-555: Certified Ethical Hacker v10
Tech Now, Inc., San Antonio TX

Duration: 5 Days

Course Content:

  • Module 01. Introduction to Ethical Hacking
  • Module 02. Foot-printing and Reconnaissance
  • Module 03. Scanning Networks
  • Module 04. Enumeration
  • Module 05. Vulnerable Analysis
  • Module 06. System Hacking
  • Module 07. Malware Threats
  • Module 08. Sniffers
  • Module 09. Social Engineering
  • Module 10. Denial of Service
  • Module 11. Session Hijacking
  • Module 12. Evading IDS,Firewalls, and Honeypots
  • Module 13. Hacking Web Servers
  • Module 14. Hacking Web Applications
  • Module 15. SQL Injection
  • Module 16. Hacking Wireless Networks
  • Module 17. Hacking Mobile Platforms
  • Module 18. IoT Hacking
  • Module 19. Cloud Computing
  • Module 20. Cryptography



  • Windows operating system and/or Linux operating system or other Unix-based OS
  • TCP/IP protocols and implementation
  • At least 2 years of IT security experience
  • TN-325:Security+

Target Audience:

Security Officers, Auditors, Security Professional, Site Admins, Penetration Testers, Red Team, Individuals concerned about the integrity of network infrastructure


About us:

TechNow has taught security courses for almost 30 years, before most certifications existed and has successfully moved students through certification programs associated with IAPP, SANS, EC-Council and ISC2. Our instructor maintains over a dozen security certifications and has been the director of a company with internationals sales in security training, consulting, and compliance.

Tech Now, Inc. is an accredited Training Center with Ec-Council.


Latest comments from students

Liked the class?  Then let everyone know!