-23% Off
Cyber security

Course Curriculum

Learning Objective – Learn the issues, including plaguing the information security world, ethical hacking, information security controls, laws, and standards.


  • Information Security Overview 

  • Information Security Threats and Attack Vectors 

  • Penetration Testing Concept 

  • Hacking Concepts 

  • Ethical Hacking Concepts 

  • Information Security Controls 

  • Information Security Laws and Standards 

Learning Objective – To perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.


  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • DNS Footprinting

  • Network Footprinting

  • Footprinting Tools

Learning Objective – Perform network scanning techniques and scanning countermeasures.


  • Network Scanning Concepts

  • Scanning Techniques

  • Scanning Beyond IDS and Firewall

  • Banner Grabbing

  • Draw Network Diagrams

Learning Objective – Learning about enumeration techniques and enumeration countermeasures.


  • Enumeration Concepts

  • NetBIOS Enumeration

  • SNMP Enumeration

  • Enumeration Countermeasures

Learning Objective – Vulnerability analysis is used to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.


  • Vulnerability Assessment Concepts

  • Vulnerability Assessment Solutions

  • Vulnerability Scoring Systems

  • Vulnerability Assessment Tools

Learning Objective – Learn about System Hacking methodology and cover tracks to discover system and network vulnerabilities.


  • System Hacking Concepts

  • Cracking Passwords

  • Executing Applications

  • Penetration Testing

Learning Objective – To study the various types of malware (Virus, Worms, Trojan, etc.), malware analysis, system auditing for malware attacks, and countermeasures.


  • Malware Concepts

  • Trojan Concepts

  • Malware Analysis

  • Countermeasures

Learning Objective – To study the various types of malware (Virus, Worms, Trojan, etc.), malware analysis, system auditing for malware attacks, and countermeasures.


  • Malware Concepts

  • Trojan Concepts

  • Malware Analysis

  • Countermeasures

Learning Objective – Find out about packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.


  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: Spoofing Attacks

Learning Objective – Learning about Social Engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and suggest social engineering countermeasures.


  • Social Engineering Concepts

  • Social Engineering Techniques

  • Identity Theft

Learning Objective – Acquire knowledge about DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.


  • DoS/DDoS Concepts

  • DoS/DDoS Attack Technique

  • DoS/DDoS Attack Tools

  • Countermeasures

Learning Objective – To learn about session hijacking techniques implemented by hackers and to discover network-level session management, authentication, authorization, cryptographic weakness, and countermeasures.


  • Session Hijacking Concepts

  • Application Level Session Hijacking

  • Session Hijacking Tools

  • Countermeasures

Learning Objective – Find out more about the IDS, Firewall, and Honeypot evasion techniques, evasion tools, and techniques to audit a network perimeter for weakness and countermeasures.


  • IDS, Firewall and Honeypot Concepts

  • Evading IDS

  • Evading Firewalls

  • Detecting Honeypots

Learning Objective – Learning how to avoid web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.


  • Web Server Concepts

  • Web Server Attacks

  • Patch Management

Learning Objective – Grasp the concepts related to web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.


  • Web App Concepts

  • Web App Threats

  • Hacking Methodology

Learning Objective – Studying SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures to avoid them.


  • SQL Injection Concepts

  • Types of SQL Injection

  • Evasion Techniques

Learning Objective –Study in detail about wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.


  • Wireless Concepts

  • Wireless Encryption

  • Wireless Threats

Learning Objective – Finding out about mobile platform attack vectors, android vulnerability exploitations, and mobile security guidelines and tools.


  • Mobile Platform Attack Vectors

  • Hacking iOS

  • Mobile Spyware

Learning Objective – Learning about countering threats to IoT and OT platforms and learning how to defend IoT and OT devices securely.


  • IoT Concepts

  • IoT Attack

  • IoT Hacking Methodology

Learning Objective – Studying various concepts involved with penetration testing security audit, vulnerability assessment, and penetration testing roadmap.

Learning Objective – Acquiring knowledge about Cloud Computing concepts (Container technology, serverless computing), various threats and attacks, and security techniques and tools.


  • Cloud Computing Concepts

  • Cloud Computing Attacks

  • Cloud Computing Threats

Learning Objective – Finding out more about cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptography tools.


  • Cryptography Concepts

  • Encryption Algorithms

  • Cryptography Tools

Course Description

The Certified Ethical Hacker CEH certification is the most trusted ethical hacking course and accomplishment recommended by employers globally. It is the most coveted qualification for information security and is one of the fastest-growing cyber certificates that critical infrastructure and vital service providers require. It has been recognized as a standard within the information security community since the introduction of the CEH in 2003. Today, the new hacking techniques and the most sophisticated hacking technologies and exploits used by hackers and information security professionals continue to be implemented by CEH v11. 

One of the most sought after certified ethical hacking course online in the IT Security/Cybersecurity domain is the Certified Ethical Hacker Certification course from EC-Council. With data breaches and hacks on the rise globally, companies are implementing comprehensive strategies through ethical hacking services to develop professionals proficient in the field of cybersecurity.

  • The step-by-step method and techniques used by hackers to breach networks.

  • Trojans, backdoors, and attack-stopping countermeasures.

  • IDS, Firewalls, Hacking Wireless, and more.

  • Advanced hacking concepts, hacking of smartphones, writing virus codes, corporate espionage, and reverse engineering.

  • Powershell, Oracle databases, Apache Web servers, SQL hacking, and more.

  • Networking, security of mobile devices, and threat and vulnerability assessment.

  • Data assurance and information security management.

The CEH certification will allow professionals in its latest version to learn about the latest hacking methods, strategies, and practices used to infiltrate enterprise networks by hackers and cybersecurity professionals. Participants taking part in this Certified Ethical Hacker training will receive a copy of the course material and a certificate from the EC-Council Accredited Training Center upon course completion.

  • Network Security Officers 

  • Site Administrators 

  • IT/IS Auditors 

  • IT Security Officers 

  • Technical Support Engineers 

  • IT/IS Analysts and Specialists 

  • System Analysts 

  • Network Specialists 

  • IT Operations Managers 

  • Senior System Engineers

Ram – 4 GB

Processor – Intel Core i3

HDD – 20 GB

Internet Connection – 1Mbps or higher

Practicals are conducted on EC Council designed iLabs. The sessions will be conducted via the Live Virtual Classroom (LVC). These are interactive sessions that enable you to ask questions and participate in discussions in class. Moreover, you are also provided recordings of each session for your future reference. Classes are attended by a global audience to further enrich your learning experience.


Frequently Asked Questions (FAQs):

You get lifetime access to our expert technical support team, who are available 24x7 to resolve any of your queries.
With CertOcean’s CEH Certification, you are given access instantly post-enrollment and this access will be available for a lifetime even after completion of your course.

Course Rating