Certified Ethical Hacker
The C|EH® v12 certification is a comprehensive program that combines hands-on training, labs, assessment, a mock engagement (practice), and global hacking competitions to equip you with the essential knowledge and skills in ethical hacking. Stay on top of your game with the most in- demand skills required to succeed in the field of cybersecurity.



Ideal For
There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.
There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.
There are no specific prerequisites for the CIEH program, however working IT professionals with at least 2 years of experience will reap full benefits.
What to Expect
SKILL LEVEL
Beginner
DURATION
5 days (Live Training) + Practice Lab + Examination
CERTIFICATION
After Completion
LANGUAGE
English
Skills You Will Learn
Introduction to Ethical Hacking
Foot Printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Introduction to Ethical Hacking
Foot Printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Introduction to Ethical Hacking
Foot Printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Session Hijacking
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Session Hijacking
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Session Hijacking
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Course Outcome
New challenges every month
4-hour capture-the-flag (CTF)
Compete with your peers all over the world
Hack your way to the top of the leaderboard
Conduct a real-world ethical hacking assignment
100% virtualization for a complete learning experience
Over 3,500 hacking tools
519 attack techniques covered
Apply the 5 phases of ethical hacking
• Reconnaissance
• Scanning
• Gaining access
• Maintaining access
• Covering your tracks
New challenges every month
4-hour capture-the-flag (CTF)
Compete with your peers all over the world
Hack your way to the top of the leaderboard
Conduct a real-world ethical hacking assignment
100% virtualization for a complete learning experience
Over 3,500 hacking tools
519 attack techniques covered
Apply the 5 phases of ethical hacking
• Reconnaissance
• Scanning
• Gaining access
• Maintaining access
• Covering your tracks
New challenges every month
4-hour capture-the-flag (CTF)
Compete with your peers all over the world
Hack your way to the top of the leaderboard
Conduct a real-world ethical hacking assignment
100% virtualization for a complete learning experience
Over 3,500 hacking tools
519 attack techniques covered
Apply the 5 phases of ethical hacking
• Reconnaissance
• Scanning
• Gaining access
• Maintaining access
• Covering your tracks
Course Intake
4 March 2025 → 20 May 2025
2 days | Tuesday and Thursday | 8PM → 10PM
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2
Module
Expand All +
Pre-Work: Preparatory Lessons
Module Title 1
Module Title 2