CEH (Certified Ethical Hacker)

COURSE DESCRIPTION
The Certified Ethical Hacker (CEH) program is one of the most globally recognized cybersecurity certifications, designed to equip professionals with hands-on skills to identify, analyze, and mitigate security threats. This course provides practical experience in ethical hacking techniques, security assessment methodologies, and penetration testing tools.
The training blends real-world labs, case studies, and industry scenarios to prepare participants for modern cybersecurity challenges. Upon completion, learners will be able to analyze vulnerabilities, secure systems, and ethically test networks following global standards.
CEH Course Outline (Version 12 / Latest)
Module 1: Introduction to Ethical Hacking
-
Information security concepts
-
Cyber kill chain
-
Ethical hacking phases & scope
-
Legal and regulatory frameworks
Module 2: Footprinting and Reconnaissance
-
Passive & active information gathering
-
Footprinting tools
-
Website enumeration
-
Open-source intelligence (OSINT) techniques
Module 3: Scanning Networks
-
Network scanning techniques
-
Vulnerability scanning
-
Nmap, Nessus, OpenVAS basics
-
Host and service discovery
Module 4: Enumeration
-
SNMP, LDAP, SMB enumeration
-
NetBIOS and Active Directory enumeration
-
Enumeration tools & techniques
Module 5: Vulnerability Assessment
-
Vulnerability management lifecycle
-
Automated scanning tools
-
Reporting and false-positive analysis
Module 6: System Hacking
-
Password cracking techniques
-
Privilege escalation
-
Executing applications
-
Clearing logs
-
Covering tracks
Module 7: Malware Threats
-
Types of malware
-
Malware propagation
-
Malware analysis basics
-
Creating and deploying test malware in labs
Module 8: Sniffing
-
Packet capturing
-
ARP poisoning
-
DHCP attacks
-
Tools (Wireshark, tcpdump, Ettercap)
Module 9: Social Engineering
-
Social engineering attack types
-
Human-based and computer-based attacks
-
Social engineering countermeasures
Module 10: Denial of Service
-
DoS/DDoS attack techniques
-
Botnets
-
Detection & mitigation strategies
Module 11: Session Hijacking
-
Session management concepts
-
Token hijacking
-
Countermeasures
Module 12: Evading IDS, Firewalls & Honeypots
-
IDS/IPS evasion techniques
-
Firewall rules & bypassing
-
Honeypot detection
Module 13: Hacking Web Servers
-
Web server architecture
-
Server misconfigurations
-
Vulnerability exploitation techniques
Module 14: Hacking Web Applications
-
OWASP Top 10
-
SQL injection
-
XSS, CSRF
-
Web application vulnerability scanners
Module 15: SQL Injection
-
Types of SQL injection
-
Detection & exploitation
-
Defenses and best practices
Module 16: Hacking Wireless Networks
-
Wireless standards & encryption
-
WLAN hacking tools
-
Wi-Fi attacks & defenses
Module 17: Hacking Mobile Platforms
-
Android & iOS security models
-
Mobile malware
-
Vulnerability exposure and exploitation
Module 18: IoT & OT Hacking
-
IoT device vulnerabilities
-
OT and ICS attacks
-
Protection mechanisms
Module 19: Cloud Computing Security
-
Cloud architecture
-
Cloud security threats
-
Cloud-based attacks
-
Defensive strategies
Module 20: Cryptography
-
Encryption algorithms
-
Public key infrastructure
-
Cryptanalysis
-
Secure communication protocols
Training Format
Online Training
-
Instructor-led sessions
-
Cloud-hosted labs
-
Recorded classes
-
24/7 learning portal
Hybrid Training
-
Combination of live virtual classes & onsite hands-on labs
-
Ideal for corporate teams
Onsite Physical Training
-
Lab-based practical environment
-
Fully equipped cybersecurity setup
Target Audience
-
IT professionals
-
Network administrators
-
System engineers
-
Cybersecurity analysts
-
Anyone preparing for CEH certification exam
Certification Exam
-
Exam Format: MCQ
-
Duration: 4 hours
-
Number of Questions: 125
-
Passing Score: 60-85% (varies by form)





