Certified Ethical Hacker (CEH)

Course Name

Certified Ethical Hacker (CEH)

Contact Hours: 40

Course Description

The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

There are no prerequisites for CEH but the student should have some knowledge or background in IT and IT Security.

Please note: Course of study may be completed earlier than indicated.


CEH training Objectives:

  • Students are able to apply countermeasure to secure organization’s system against threats and attacks
  • Students are able to test the access to organizational data using ethical hacking techniques
  • Students are able to implement real-world hacking techniques to test the security of organization’s system
  • Students are able to employ complex tools to identify and analyze your company’s risks and weaknesses
  • Students are able to uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures


Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.


Module 1: Intro

        1.1 Intro - Part 1
        1.2 Intro - Part 2
        1.3 Intro - Part 3
        1.4 Intro - Part 4
        1.5 Intro - Part 5
        1.6 Intro - Part 6
        1.7 Intro - Part 7
        1.8 Intro - Part 8
        1.9 Intro - Part 9
        1.10 Intro - Part 10
        1.11 Pretest - Intro
        1.12 Questions
        1.13 Pretest - Summary
        1.14 Intro to Ethical Hacking - Part 1
        1.15 Intro to Ethical Hacking - Part 2
        1.16 Intro to Ethical Hacking - Part 3
        1.17 Intro to Ethical Hacking - Part 4
        1.18 Intro to Ethical Hacking - Part 5
        1.19 Intro to Ethical Hacking - Part 6
        1.20 Intro to Ethical Hacking - Part 7
        1.21 Intro to Ethical Hacking - Part 8
        1.22 Intro to Ethical Hacking - Part 9

Module 2: Foot printing & Reconnaissance
        2.1 Foot printing & Reconnaissance - Part 1
        2.2 Foot printing & Reconnaissance - Part 2
        2.3 Foot printing & Reconnaissance - Part 3
        2.4 Foot printing & Reconnaissance - Part 4