"Truly the best classes I have ever attended. My only regret is that I didn't take the training from them sooner. No fluff, filler, or extraneous material, just hard-hitting nuts and bolts of the profession. Gladly would have paid triple the price." Ryan Emerson - Digital Forensic Examiner

"I attended a well-known class from one of your competitors. I speak for many students when I say that I learned more in the first day of your course than I did in an entire week of the other course." Allan Womac - Evidence Technician

"A co-worker of mine and student of yours is planning to dedicate his personal time off taking training from you again - this speaks volumes of you and your courses." Paul Rodvik - H.P. Corporate Backup Services

"It is rare to find an instructor who is both a good teacher and a true expert in his field. Your teaching style has really sparked my interest in network/computing security." John Bell - The Boeing Company

"I believe I speak for all of your students when I say THANKYOU for all that you do. You show a true dedication to your students and their success - a dedication I have never seen in any other instructor." Donny Neil - The Boeing Company

"I look forward to taking many more classes from you, as you have proven yourself to be one of the true 'Subject Matter Experts' that the entire IT industry builds their certification criteria on. Thanks." James Gotner - Fred Hutchinson Cancer Research Center

"You are not just being taught the fundamentals but are being instructed on how to approach forensics work like a 20 year veteran would. Invaluable training!" Frank Dauenhauer -ICT Security Manager -Aurenav

"I wish I would have known about your course sooner. Now after many months of wasted time and money, I'm finally on the right track." Allan Womac - Evidence Technician

"Mike and Steve have a wealth of forensic knowledge and "real life" professional experience that, when layered onto the CHFI, creates a potent training experience not available anywhere else.  If you want expert training by true experts in the forensic field, Mike and Steve can deliver." Gregg Braunton - Regional Information Security Officer

"These guys are world-class. Superb training, and they helped me solve a Cybercrime case during the week!" Special Agent - Federal Agency

"This was not my first course from CyberSecurity Academy, nor will it be my last.  These gentlemen are amazing instructors that truly are subject matter experts." Tracy Stanley - Information Technology System Specialist

"There is no better place to take a cyber-security class than CyberSecurity Academy!  Steve Hailey and Mike Andrew bring years of experience in the digital forensics area to their classes, and teach not only the class materials but also what it's like to really work on a case. Passing my CHFI certification directly led to my securing a contract position in cyber security with a large government agency." Dennis York - Cyber Security Analyst

"Steve and Mike are great instructors. I learnt a lot and because of them the notes that I took in class made studying for the exam very easy." Neumann Lim - Computer Systems Specialist

"This is the third class I have taken from Steve and Mike and the standard keeps rising! These guys are all about ensuring the student walks out with the BEST training experience possible and they do it CONSISTENTLY! With one of their classes, you won't be disappointed! THANKS!!!!" Jeffrey L Colorossi - CISO

"The class was excellent. Steve and Mike are fabulous instructors and I appreciate everything they did for me." Casey Tilton - Security

"The instructors do a great job in focusing on the important facts in the course materials while providing hands on time to learn and reinforce the core concepts. Their practical knowledge has been earned through years of experience. It is clear that they never take their eyes off of the football and clearly know their stuff. Anyone with an interest in digital forensics would be well served by attending any of their courses." James Clark - Systems Engineer

"This was not my first course from CyberSecurity Academy, nor will it be my last. These gentlemen are amazing instructors that truly are subject matter experts." Tracy Stanley - Information Technology Systems Specialist






COURSE LOGISTICS AND LOCATION: Your course will be held at the Edmonds Police Department in Edmonds Washington. Class times are 9:00 AM to 5:00 PM daily. The closest airport is the Seattle-Tacoma International Airport (SEA) which is approximately 30 miles away.


CLOSEST HOTEL: Best Western Plus Edmonds Harbor Inn

OTHER LODGING: Apartments, Studios, Rooms


Certified Ethical Hacker v10

Certified Ethical Hacker banner

If you are viewing this page, then you have probably already made the decision to attend the CEH class and you are shopping for prices and locations. You'll not find a better price in the United States for the on-ground instructor led CEH training. If you do, we will match it plus take off an additional 100.00. Take a look at our quarantee and be sure to check out your instructors.

The following comes standard with your class tuition:

Best Price Guarantee Test Pass Guarantee
5 Days of Instructor Led Training Lifetime Retakes
Access to the Latest Hacking Tools and Exploits Official EC-Council CEH Curriculum Manuals
CEH Certification Test Study Guide
Hundreds of Exam Practice Questions Access to iLabs online hacking environment included!

Course Description:

The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.

Arguably the CEH is the most popular information security related certification today, and is part of the DoD 8570 Directive.

Who Should Attend:

Lesson 1: Introduction to Ethical Hacking

Lesson 2: Footprinting and Reconnaissance

Lesson 3: Scanning Networks

Lesson 4: Enumeration

Lesson 5: System Hacking

Lesson 6: Malware Threats

Lesson 7: Sniffing

Lesson 8: Social Engineering

Lesson 9: Denial-of-Service

Lesson 10: Session Hijacking

Lesson 11: Hacking Webservers

Lesson 12: Hacking Web Applications

Lesson 13: SQL Injection

Lesson 14: Hacking Wireless Networks

Lesson 15: Hacking Mobile Platforms

Lesson 16: Evading IDS, Firewalls, and Honeypots

Lesson 17: Cloud Computing

Lesson 18: Cryptography