Instructor-Led
Training

CEH Training
The Certified Ethical Hacker (CEH) certification, offered by EC-Council, is one of the most sought-after credentials for cybersecurity professionals specializing in ethical hacking and penetration testing. This certification validates the ability to identify, analyze, and mitigate security vulnerabilities in systems and networks.
Course Overview
Footprinting and Reconnaissance
Gathering intelligence about targets.
Scanning Networks
Identifying live hosts, open ports, and vulnerabilities.
Enumeration and Exploitation
Extracting system information and exploiting vulnerabilities.
System Hacking
Gaining access to compromised systems and maintaining persistence.
Malware and Ransomware Threats
Understanding viruses, worms, and trojans.
Sniffing and Evasion Techniques
Capturing data packets and evading detection.
Denial of Service (DoS) Attacks
Understanding DoS and DDoS attack methodologies.
Social Engineering
Exploiting human vulnerabilities to gain unauthorized access.
Web Application Security
Testing web applications for vulnerabilities like SQL Injection and XSS.
Wireless Network Security
Hacking Wi-Fi networks and securing wireless communications.
Cryptography and Steganography
Understanding encryption and data hiding techniques.
Cybersecurity Professionals
Seeking to develop ethical hacking skills.
Penetration Testers and Security Analysts
Focused on improving penetration testing and security analysis abilities.
Network Administrators and IT Professionals
Responsible for securing IT environments and networks.
Security Consultants and Forensic Analysts
Looking to enhance their ethical hacking expertise for security consulting or forensics.
Individuals Seeking Certification
Aiming to obtain a globally recognized ethical hacking certification.
Online Instructor-Led Training
Learn hacking techniques from security experts.
Intensive Training Course
Covers penetration testing, vulnerability scanning, and security threats.
90-Day Access to Course Content
Continue learning with recorded lessons and labs.
Prerequisites
Basic Understanding of Networking and Security
A basic understanding of networking and security concepts is recommended.
Experience in IT Security or Networking
Some experience in IT security or networking is helpful but not mandatory.
Introduction to Ethical Hacking
Ethics, legal considerations, and methodologies.
Footprinting and Reconnaissance
Information gathering and OSINT techniques.
Scanning Networks
Identifying live hosts, scanning ports, and mapping networks.
Enumeration
Extracting user and system data from target environments.
Vulnerability Analysis
Identifying security flaws and weaknesses in systems.
System Hacking
Gaining access, maintaining persistence, and covering tracks.
Malware Threats
Understanding viruses, worms, trojans, and rootkits.
Sniffing and Social Engineering
Capturing data and manipulating human vulnerabilities.
Denial of Service (DoS) and Session Hijacking
Disrupting services and hijacking active sessions.
Hacking Web Applications, Wireless Networks, and Mobile Platforms
Testing security in various environments.
Cloud Security and IoT Hacking
Securing cloud infrastructures and IoT devices.
Cryptography and Steganography
Encrypting and hiding data securely.
Exam | Details |
---|---|
Knowledge Exam | The Knowledge Exam will test your skills in: |
Skills Tested | Information security threats and attack vectors, Attack detention, Attack prevention, Procedures, Methodologies |
Format | Multiple choice |
Duration | 4 hours |
Questions | 125 |
Delivery | Online via the ECC exam portal |
Passing Score | 60% to 85% |
Exam | Details |
---|---|
Practical Exam | The practical exam is optional but will reward you with a higher practical skillset in: |
Skills Tested | Port scanning tools (eg, Nmap, Hping), Vulnerability detection, Attacks on a system (eg, DoS, DDoS, session hijacking attacks, SQL injection, and wireless threats), SQL injection methodology and evasion techniques, Web application security tools (eg, Acunetix WVS), SQL injection detection tools (eg, IBM Security AppScan), Communication protocols |
Duration | 6 hours |
Questions | 20 challenges |
Delivery | iLabs Cyber Range |
Passing Score | 60% to 85% |