Certified Ethical Hacker
Certified Ethical Hacker
Certified Ethical Hacker

Certified Ethical Hacker

The C|EH® v12 certification is a comprehensive program that combines hands-on training, labs, assessment, a mock engagement (practice), and global hacking competitions to equip you with the essential knowledge and skills in ethical hacking. Stay on top of your game with the most in- demand skills required to succeed in the field of cybersecurity.

Ideal For

There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.

There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.

There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.

What to Expect

SKILL LEVEL
Beginner
DURATION
5 days (Live Training) + Practice Lab + Examination
CERTIFICATION
After Completion
LANGUAGE
English

Skills You Will Learn

  • Introduction to Ethical Hacking

  • Foot Printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Introduction to Ethical Hacking

  • Foot Printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Introduction to Ethical Hacking

  • Foot Printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Session Hijacking

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Session Hijacking

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Session Hijacking

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Course Outcome

  • New challenges every month

  • 4-hour capture-the-flag (CTF)

  • Compete with your peers all over the world

  • Hack your way to the top of the leaderboard

  • Conduct a real-world ethical hacking assignment

  • 100% virtualization for a complete learning experience

  • Over 3,500 hacking tools

  • 519 attack techniques covered

  • Apply the 5 phases of ethical hacking
    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering your tracks

  • New challenges every month

  • 4-hour capture-the-flag (CTF)

  • Compete with your peers all over the world

  • Hack your way to the top of the leaderboard

  • Conduct a real-world ethical hacking assignment

  • 100% virtualization for a complete learning experience

  • Over 3,500 hacking tools

  • 519 attack techniques covered

  • Apply the 5 phases of ethical hacking
    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering your tracks

  • New challenges every month

  • 4-hour capture-the-flag (CTF)

  • Compete with your peers all over the world

  • Hack your way to the top of the leaderboard

  • Conduct a real-world ethical hacking assignment

  • 100% virtualization for a complete learning experience

  • Over 3,500 hacking tools

  • 519 attack techniques covered

  • Apply the 5 phases of ethical hacking
    • Reconnaissance
    • Scanning
    • Gaining access
    • Maintaining access
    • Covering your tracks

Course Intake

4 March 2025 → 20 May 2025

2 days | Tuesday and Thursday | 8PM → 10PM

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2

Module

Expand All +

Pre-Work: Preparatory Lessons

Module Title 1

Module Title 2