Get Q/ualified!

Q/EH® Qualified/ Ethical Hacker Qualification/Certification Exam and Class
+ learn HANDS-on for CEH EXAM

The only Q/EH Qualified/ Ethical Hacking "Hands-on" Tactical Security skills training AND what you need to know to secure networks, systems and secure information. 30+ hands-on labs focused on 22 areas of the network/enterprise - You will leave knowing how to hack AND secure networks while staying ahead of the hackers!

'when asked by a Navy contractor whats the difference in the Q/EH training than a CEH training class? CEH presents security testing tools modules that only describe and demo tools. The Q/EH presents the process and methodology of security testing with more detail which makes you a more effective security tester. Making the CEH modules more conceptual where the Q/EH is more tactical and hands-on more focused on what you need to know to do penetration testing and security analysis.

View our Q/EH® Training videos on our YouTube Channel:

This Intense 5 day Q/EH® Qualified/ Ethical Hacker class provides you with basic to advanced understanding of the hacking tools and hone your skills to discover security weakness in your organization. This class would be before or after Security+, CISSP® is not needed. Are you for SERIOUS tactical hands-on labs? Do you want to know how to block attacks with a single tool? leap over sys admins to defend your box? Step up to Qualified.

"Yes. Pls quote me, The instructor was great, he was very knowledgeable. I had CEH and CHFI training from another vendor and I did receive certification but I wish I had attended your classes instead, I would have learned much more."

No death by power point - the Q/EH® study guide engages you in real world scenarios, no old hacking tools, like other Certifying Ethical Hacking classes. More than 35 hands-on tactical security labs to ensure your qualified and validated to defend networks from cyber threats.

We are dedicated to your tactical security success. We constantly add new security tools, white papers and update SU hacking labs to keep you motivated and expand your tactical security knowledge & hacking skills.

What is "Qualified"

Q/ISP Certification is obtained through Security University for the purpose of recognizing qualified individuals who have distinguished themselves as knowledgeable, skilled and proficient information security practitioners with validated hands-on tactical security skills. The Q/ISP certificate also provides the ONLY means of identifying qualified security professionals who subscribe to a rigorous requirement for maintaining their knowledge and proficiency in information security with "validated" hands-on tactical security skills.

Certificates are awarded to those qualified individuals who validate their security skills to a prescribed qualified level of tactical hands-on information security experience, comply with a professional code of ethics, and pass rigorous examinations on the Q/ISP Body of Knowledge for information security.

Keeping your Q/ISP Valid

In order to maintain currency in the field, each Q/ISP must complete participation in research or study, attendance at recognized subject-matter training and professional educational programs, presentation or publication of information security papers, contributions to the information security Q/ISP Body of Knowledge, or service in professional organizations. Each Q/SIP must acquire 120 CPE continuing professional education credits every three years. (40 credits per year)

The Q/ISP Certification does not require you to complete Q/ISP hands-on classes - however to "validate" your security skills and use the "Qualified" symbol as your trust mark, you will be asked to complete the Q/PTL workshop, the Q/FE & Q/ND practical's that validate your tactical security skills.

Class Fee: $2,995
Time: 7:45am - 6pm
Location: Click here to view the class schedule
CPE Credits:

40 - CNSS 4011, 4012, 4013A, 4105, 4016E /NSA-approved!

Download the SU class RoadMap
Prerequisites: Understanding of TCP/IP protocols,
SU optional Q/EH EXAM onsite last day
Method of Delivery - Residential On Ground
Method of Evaluation: 1. 95 % attendance 2. 100 % completion of Lab
Grading: Pass = 95% Attendance and 100% Completion of Labs and Practical
Fail => 95% Attendance and > 100% Completion of Labs and Practical

Security Training Reviews - 2013
This has been a fantastic experience for me, and I look forward to working with you in the future for my IT training needs. Sondra, I can already tell CISSP, Q/EH, Q/SA, and Q/PTL will be the best $7K investment I have ever made for my future.  Good luck with the 8570 certification!!  See you in 2 weeks.

Security University has proven itself by obtaining an industry leader in Information Security. ken's CISSP class has without a doubt provided me with the necessary knowledge I require to pass the CISSP as well as prepare me to be a successful contributor to the Information Systems Security industry. I look forward to future classes with Security University and I would most definitely recommend them for anyone's training needs. Travis, retiring military


One of the concerns that I have is most of the cert's which exist on the list tend toward paper IA personnel. Over the years, I have seen this in the MSCE® and CCNA® as examples. I have more than my fair share of certifications and I have taught cert courses for over 20 years.

I sat through Security University's Q/EH class which was fairly impressive and asked a large number of questions concerning their other exams. Looking at the challenges that the DoD is attempting to address, the Q/ISP strikes me as more appropriate than most of the current exams. This course/exam group is multi-functional, each section dealing with a very IA oriented goal/need. The Q/PTL which is part of the Q/ISP requires a written test, a three hour examination of a specialized test scenario (also graded) and finally a two week period to complete a full diagnostic report. One of the student reports was 20 pages in length.

Definitely a high level of competence to receive a certification. DoD Sparks.

Q/EH® Qualified Ethical Hacker Certification exam tests on the following domains.


Business of Ethical Hacking


Session Hijacking




Hacking Wireless Networks


Google Hacking


Hacking Web Servers

3. Scanningo 14 Web Application Vulnerabilities




Password Cracking Techniques




Physical security


System Hacking


Social Engineering


Buffer Overflows


Hacking Linux


SQL Injection


IDS, Firewalls and Honeypots


Virus Worms Trojans Rootkits




Denial of Service


Penetration Testing Methods

Core Security

SAINT Exploit tool

Class Tuition & Bonuses

Instruction and review with an experienced master hacker
Q/EH Exam on site last day of class
Access to Security University's IT Professional Reference Library of targeted pre-class reading, with:
Free download of Linux & 400+ up-to-date hacking tools and exploit

The business of Ethical Hacking your network
• Incident Management
• Laws & Legislation
• White & Black Box Testing
• Software Security Testing
• Code Review
• DRP Disaster Recovery Planning

Reconnaissance/ footprinting
•  Define the term Footprinting
•  Describe information gathering methodology
•  Describe competitive intelligence
•  Understand DNS enumeration
•  Understand Whois, ARIN lookup
•  Identify different types of DNS records
•  Understand how traceroute is used in Footprinting
•  Understand how e-mail tracking works
•  Understand how web spiders work

•  Define the term port scanning, network scanning and vulnerability scanning
•  Understand the Q/EH scanning methodology
•  Understand Ping Sweep techniques
•  Understand nmap command switches
•  Understand SYN, Stealth, XMAS, NULL, IDLE and FIN scans
•  List TCP communication flag types
•  Understand War dialing techniques
•  Understand banner grabbing and OF fingerprinting techniques
•  Understand how proxy servers are used in launching an attack
•  How does anonymizers work
•  Understand HTTP tunneling techniques
•  Understand IP spoofing techniques

•  What is Enumeration?
•  What is meant by null sessions
•  What is SNMP enumeration?
•  What are the steps involved in performing enumeration?

•  Understand the protocol susceptible to sniffing
•  Understand active and passive sniffing
•  Understand ARP poisoning
•  Understand ethereal capture and display filters
•  Understand MAC flooding
•  Understand DNS spoofing techniques
•  Describe sniffing countermeasure

System hacking
•  Understanding password cracking techniques
•  Understanding different types of passwords
•  Identifying various password cracking tools
•  Understand Escalating privileges
•  Understanding keyloggers and other spyware technologies
•  Understand how to Hide files
•  Understanding rootkits
•  Understand Steganography technologies
•  Understand how to covering your tracks and erase evidences

Buffer Overflows
•  Overview of stack based buffer overflows
•  Identify the different types of buffer overflows and methods of detection
•  Overview of buffer overflow mutation techniques

SQL Injection
•  What is SQL injection?
•  Understand the Steps to conduct SQL injection
•  Understand SQL Server vulnerabilities
•  Describe SQL Injection countermeasures

Virus and Worms / Trojans and Backdoors / Rootkits
•  Understand the difference between an virus and a Worm
•  Understand the types of Viruses
•  How a virus spreads and infects the system
•  Understand antivirus evasion techniques
•  Understand Virus detection methods
•  What is a Trojan?
•  What is meant by overt and covert channels?
•  List the different types of Trojans
•  What are the indications of a Trojan attack?
•  Understand how “Netcat” Trojan works
•  What is meant by “wrapping”
•  How does reverse connecting Trojans work?
•  What are the countermeasure techniques in preventing Trojans?
•  Understand Trojan evading techniques

Denial of Service
•  Understand the types of DoS Attacks
•  Understand how DDoS attack works
•  Understand how BOTs/BOTNETS work
•  What is “smurf” attack
•  What is “SYN” flooding
•  Describe the DoS/DDoS countermeasures

Session Hijacking
•  Understand Spoofing vs. Hijacking
•  List the types of Session Hijacking
•  Understand Sequence Prediction
•  What are the steps in performing session hijacking
•  Describe how you would prevent session hijacking

Wireless Hacking
•  Overview of WEP, WPA authentication systems and cracking techniques
•  Overview of wireless Sniffers and SSID, MAC Spoofing
•  Understand Rogue Access Points
•  Understand Wireless hacking techniques
•  Describe the methods in securing wireless networks

Hacking Web Servers
•  List the types of web server vulnerabilities
•  Understand the attacks Against Web Servers
•  Understand IIS Unicode exploits
•  Understand patch management techniques
•  Understand Web Application Scanner
•  What is Metasploit Framework?
•  Describe Web Server hardening methods

Web Application Vulnerabilities
•  Understanding how web application works
•  Objectives of web application hacking
•  Anatomy of an attack
•  Web application threats
•  Understand Google hacking
•  Understand Web Application Countermeasures

Physical Security
•  Physical security breach incidents
•  Understanding physical security
•  What is the need for physical security?
•  Who is accountable for physical security?
•  Factors affecting physical security

Social Engineering
•  What is Social Engineering?
•  What are the Common Types of Attacks
•  Understand Dumpster Diving
•  Understand Reverse Social Engineering
•  Understand Insider attacks
•  Understand Identity Theft
•  Describe Phishing Attacks
•  Understand Online Scams
•  Understand URL obfuscation
•  Social Engineering countermeasures

Linux Hacking
•  Understand how to a Linux Kernel
•  Understand GCC compilation commands
•  Understand how to install LKM modules
•  Understand Linux hardening methods

IDS, Honeypots and Firewalls
•  List the types of Intrusion Detection Systems and evasion techniques
•  List firewall and honeypot evasion techniques

•  Overview of cryptography and encryption techniques
•  Describe how public and private keys are generated
•  Overview of MD5, SHA, RC4, RC5, Blowfish algorithms

Penetration Testing Methodologies
•  Overview of penetration testing methodologies
•  List the penetration testing steps
•  Overview of the Pen-Test legal framework
•  Overview of the Pen-Test deliverables
•  List the automated penetration testing tools

Appendix I, II, II
•C&A Review
• Event Correlation
• Incident Mgt
• Law & Legislation
• Snort Rules
• Black Box Testing
• Software Security Testing
•Code Review
• BCP Business Continuity Planning
• DRP Disaster Recovery Planning

What is a Q/ISP® "Qualified"/ Information Security Professional Certification?

The 125 question online Q/ISP certification exam has questions from 4 Q/ISP Security Skills certification prep classes:
Qualified/Ethical Hacking
Qualified/Security Analysis Penetration Testing
Qualified/Forensics Expert
Qualified/Network Defense

The Q/ISP, Q/EH, Q/SA- Q/PTL, Q/FE & Q/ND certification exams do not require training classes.
The Q/ISP certification is selected to be reviewed for 8570 certification list.

What is a "Qualified" Q/ISP? A Qualified Q/ISP has attained 4 SU Q/ISP® Validation Certifications. Each Validation Certification is attained by attending the Q/ISP tactical security skills certification prep class to validates your tactical security skills - Q/EH, Q/SA - Q/PT License, Q/FE & Q/ND. Each validation & certification prep class is 5 days of hands-on labs, with an online certification exam AND a intense hands-on "Practical" exams. You have to pass both the On-line certification exam and the "Practical" validation projects before you earn a SU Q/ISP (Validation) Certification.

The Security University Security Pyramid represents enlightenment, man's breaking free of stagnant education and reaching towards the supreme source of security skills training and validation, globally illuminating risk preparedness.

Prior to 2008, if you attended Security University's EC-Council® Authorized CEH®, ECSA®, CHFI® classes and passed the certification exams you are eligible for the Q/ISP® Qualified/ Certifications but still have to pass the Q/ISP tactical certification exams.

Since 2004 SU has certified over 3500 ECSA®/ Q/SA® Qualified Security Analysts Penetration Testers in 7 countries!
Customize your Q/SA® Q/PTL training program today!

  US Congress wants hack teams for self-penetration download for more..

Compliance requirements aside, penetration testing is an absolutely critical aspect of any security program. Attackers test every company's defenses every day.

Free Security Threat Guides from Veracode: Cross Site Request Forgery

Legal Notice:
The CEH Certification is provided exclusively by EC-Council® and its ATC's, Security University is not sponsored by, approved by, or affiliated in any way with EC-Council®.