CEH v12 - Certified Ethical Hacking
Course Overview
Master the skills needed for cybersecurity success with the CEH v12 - Certified Ethical Hacking certification. This course equips you to think and act like a black hat hacker, helping you fortify systems against threats. Accredited by EC-Council, it covers ethical hacking fundamentals and technical skills, including network packet analysis, penetration testing, and vulnerability assessments. You'll apply your knowledge through practical labs and live online classes, preparing you to strengthen network systems as a certified ethical hacking professional.
What you will learn
By the end of this CEH v12 - Certified Ethical Hacking Short Course, you will accomplish the following:
- A comprehensive knowledge of hacking concepts and common attack technologies
- The ability to perform vulnerability assessments, network analyses, penetration testing, and cryptography methods
- A thorough understanding of the role of cloud computing and IoT in cybersecurity
Course Modules
- Course 1 - Introduction to Ethical Hacking
Lesson 1 - Information Security Overview
Delivery mode: self-paced learning only
Lesson 2 - Information Security Threats and Attack Vectors
Lesson 3 - Penetration Testing Concepts
Lesson 4 - Hacking Concepts
Lesson 5 - Ethical Hacking Concepts
Lesson 6 - Information Security Controls
Lesson 7 - Information Security Laws and Standards - Course 2 - Footprinting and Reconnaissance
Lesson 1 - Footprinting Concepts
Lesson 2 - Footprinting through Search Engines
Lesson 3 - Footprinting through Web Services
Lesson 4 - Footprinting through Social Networking Sites
Lesson 5 - Website Footprinting
Lesson 6- Email Footprinting
Lesson 7- Competitive Intelligence
Lesson 8- Whois Footprinting
Lesson 9- DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11- Footprinting through Social Engineering
Lesson 12- Footprinting Tools
Lesson 13- Countermeasures
Lesson 14- Footprinting Pen Testing
Delivery mode: self-paced learning only
- Course 3 - Scanning Networks
Lesson 1 - Network Scanning Concepts
Lesson 2 - Scanning Tools
Lesson 3- Scanning Techniques
Lesson 4- Scanning Beyond IDS and Firewall
Lesson 5- Banner Grabbing
Lesson 6- Draw Network Diagrams
Lesson 7- Scanning Pen Testing
Delivery mode: self-paced learning only
- Course 4 - Enumeration
Lesson 1 - Enumeration Concepts
Lesson 2 - NetBIOS Enumeration
Lesson 3 - SNMP Enumeration
Lesson 4 - LDAP Enumeration
Lesson 5 - NTP Enumeration
Lesson 6 - SMTP Enumeration and DNS Enumeration
Lesson 7 - Other Enumeration Techniques
Lesson 8 - Enumeration Countermeasures
Lesson 9 - Enumeration Pen Testing
Delivery mode: self-paced learning only - Course 5 - Vulnerability Analysis
Lesson 1- Vulnerability Assessment Concepts
Lesson 2- Vulnerability Assessment Solutions
Lesson 3- Vulnerability Scoring Systems
Lesson 4- Vulnerability Assessment Tools
Lesson 5- Vulnerability Assessment Reports
Delivery mode: self-paced learning only - Course 6 - System Hacking
Lesson 1- System Hacking Concepts
Lesson 2- Cracking Passwords
Lesson 3- Escalating Privileges
Lesson 4- Executing Applications
Lesson 5- Hiding Files
Lesson 6- Covering Tracks
Lesson 7- Penetration Testing
Delivery mode: self-paced learning only - Course 7 - Malware Threats
Lesson 1- Malware Concepts
Lesson 2- Trojan Concepts
Lesson 3- Virus and Worm Concepts
Lesson 4- Malware Analysis
Lesson 5- Countermeasures
Lesson 6- Anti-Malware Software
Lesson 7- Malware Penetration Testing
Delivery mode: self-paced learning only - Course 8 - Sniffing
Lesson 1- Sniffing Concepts
Lesson 2- Sniffing Technique: MAC Attacks
Lesson 3- Sniffing Technique: DHCP Attacks
Lesson 4- Sniffing Technique: ARP Poisoning
Lesson 5- Sniffing Technique: Spoofing Attacks
Lesson 6- Sniffing Technique: DNS Poisoning
Lesson 7- Sniffing Tools
Lesson 8- Countermeasures
Lesson 9- Sniffing Detection Techniques
Lesson 10- Sniffing Pen Testing
Delivery mode: self-paced learning only - Course 9 - Social Engineering
Lesson 1 - Social Engineering Concepts
Lesson 2 - Social Engineering Techniques
Lesson 3 - Impersonation on Social Networking Sites
Lesson 4 - Identity Theft
Lesson 5 - Countermeasures
Lesson 6 - Social Engineering Penetration Testing
Lesson 7- Insider Threats
Delivery mode: self-paced learning only - Course 10 - Denial-of-Service
Lesson 1 - DoS/DDoS Concepts
Lesson 2 - DoS/DDoS Attack Techniques
Lesson 3 - Botnets
Lesson 4 - DDoS Case Study
Lesson 5 - DoS/DDoS Attack Tools
Lesson 6 - Countermeasures
Lesson 7 - DoS/DDoS Protection Tools
Lesson 8 - DoS/DDoS Attack Penetration Testing
Delivery mode: self-paced learning only - Course 11 - Session Hijacking
Lesson 1 - Session Hijacking Concepts
Lesson 2 - Application Level Session Hijacking
Lesson 3 - Network Level Session Hijacking
Lesson 4 - Session Hijacking Tools
Lesson 5 - Countermeasures
Lesson 6 - Penetration Testing
Delivery mode: self-paced learning only - Course 12 - Evading IDS, Firewalls, and Honeypots
Lesson 1 - IDS, Firewall and Honeypot Concepts
Lesson 2 - IDS, Firewall and Honeypot Solutions
Lesson 3 - Evading IDS
Lesson 4 - Evading Firewalls
Lesson 5 - IDS/Firewall Evading Tools
Lesson 6 - Detecting Honeypots
Lesson 7 - IDS/Firewall Evasion Countermeasures
Lesson 8 - Penetration Testing
Delivery mode: self-paced learning only - Course 13 - Hacking Web Servers
Lesson 1 - Web Server Concepts
Lesson 2 - Web Server Attacks
Lesson 3 - Web Server Attack Methodology
Lesson 4 - Web Server Attack Tools
Lesson 5 - Countermeasures
Lesson 6 - Patch Management
Lesson 7 - Web Server Security Tools
Lesson 8 - Web Server Pen Testing
Delivery mode: self-paced learning only - Course 14 - Hacking Web Applications
Lesson 1 - Web App Concepts
Lesson 2 - Web App Threats
Lesson 3 - Hacking Methodology
Lesson 4 - Web Application Hacking Tools
Lesson 5 - Countermeasures
Lesson 6 - Web App Security Testing Tools
Lesson 7 - Web App Pen Testing
Delivery mode: self-paced learning only - Course 15 - SQL Injection
Lesson 1 - SQL Injection Concepts
Lesson 2 - Types of SQL Injection
Lesson 3 - SQL Injection Methodology
Lesson 4 - SQL Injection Tools
Lesson 5 - Evasion Techniques
Lesson 6 - Countermeasures
Delivery mode: self-paced learning only - Course 16 - Hacking Wireless Networks
Lesson 1 - Wireless Concepts
Lesson 2 - Wireless Encryption
Lesson 3 - Wireless Threats
Lesson 4 - Wireless Hacking Methodology
Lesson 5 - Wireless Hacking Tools
Lesson 6 - Bluetooth Hacking
Lesson 7 - Countermeasures
Lesson 8 - Wireless Security Tools
Lesson 9 - Wi-Fi Pen Testing
Delivery mode: self-paced learning only - Course 17 - Hacking Mobile Platforms
Lesson 1- Mobile Platform Attack Vectors
Lesson 2- Hacking Android OS
Lesson 3- Hacking iOS
Lesson 4- Mobile Spyware
Lesson 5- Mobile Device Management
Lesson 6- Mobile Security Guidelines and Tools
Lesson 7- Mobile Pen Testing
Delivery mode: self-paced learning only - Course 18 - IoT Hacking
Lesson 1- IoT Concepts
Lesson 2- IoT Attacks
Lesson 3- IoT Hacking Methodology
Lesson 4- IoT Hacking Tools
Lesson 5- Countermeasures
Lesson 6- IoT Pen Testing
Delivery mode: self-paced learning only - Course 19 - Cloud Computing
Lesson 1 - Cloud Computing Concepts
Lesson 2 - Cloud Computing Threats
Lesson 3 - Cloud Computing Attacks
Lesson 4 - Cloud Security
Lesson 5 - Cloud Security Tools
Lesson 6 - Cloud Penetration Testing
Delivery mode: self-paced learning only - Course 20 - Cryptography
Lesson 1- Cryptography Concepts
Lesson 2- Encryption Algorithms
Lesson 3- Cryptography Tools
Lesson 4- Public Key Infrastructure (PKI)
Lesson 5- Email Encryption
Lesson 6- Disk Encryption
Lesson 7- Cryptanalysis
Lesson 8- Countermeasures
Delivery mode: self-paced learning only
Payment Options
Upskilled Payment Plans
For Upskilled courses delivered by Simplilearn - we can arrange for you an interest-free, flexible and easy to manage monthly payment plan.
All amounts are in AUD. Speak to our friendly Education Consultants at 1300 009 024 to learn about flexible payment plans.
*Terms & Conditions Apply.
Show off your achievements
Earn your CEH v12 - Certified Ethical Hacker Certification
Digital certificates are the new way for Upskilled and Simplilearn graduates to offer proof of their hard earned knowledge or skill set. Additionally, upon completion of the entire short course, you will earn a certificate demonstrating your competence and actionable expertise as an experienced Certified Ethical Hacking professional.
Differentiate Yourself
Set yourself apart from the competition with the Data Analyst online course certificate. This is your ticket to get your foot through the door and proof that you have verified ethical hacking skills in real world environments, making you job ready as a full-fledged expert.
Share your achievement
You worked for it, you earned it! Share your achievement loud and proud! Talk about your CEH v12 - Certified Ethical Hacking qualification on LinkedIn, Twitter, Facebook. Add it to your CV to stand out and showcase to your employers.
Data Analyst Course course advisor
Dean Pompilio
Technical Trainer, Owner- Steppingstonesolutions Inc
Mr. Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth
FAQs
An Online Bootcamp is an intensive and accelerated learning program made up of a collection of self-paced eLearning components and live online classes that students are required to attend.
The Online Bootcamp program curriculum contain a combination of specifically chosen courses and career-critical skills that are aligned to a job role.
A Short Course on the other hand are shorter courses that is designed to target developing a specific skillset or topic. They generally are much quicker to complete than Bootcamp Programs.
Also termed as "white hat hacking", ethical hacking involves the authorised attempt of breaking into one's computer and network systems - applying the same attack technologies and techniques as malicious hackers in order to pinpoint any weaknesses or vulnerabilities. These issues are the pre-emptively addressed before attackers can exploit them in the future.
Through the work of ethical hackers, organisations are able to fortify their security systems - effectively minimising risk, downtime, and financial losses. As such, professionals in this field are in currently high demand with an average of a $100k AUD base salary (according to Payscale) for those certified.
The International Council of E-Commerce Consultants (EC-Council) are a globally-leading IT organisation that certifies professionals in various security skills areas. Their certifications not only offer a thorough grasp of fundamental security concepts, but ensure your skills training is up to standard on an international scale.
Acquiring their CEH certifications positions you as a verified expert of the ethical hacking field, helping draw the attention of potential employers along with boosting salary potential.
Along with acquiring a Simplilearn certificate of course completion, this program also equips students with the skills to pursue the CEH (v11) certification (accredited by EC-Council). The exam for this certification is comprised of 125 multiple choice questions with a provided 4-hour timeframe. There is also the CEH Practical exam, an extension of the CEH certification, comprising 20 practical challenges involving live networks, virtual machines, and applications. Students will need to pass these exams in order to obtain their CEH certification.
The course fee is also inclusive of the CEH examination fee. Should you fail in your first attempt, you can retake it at any time - thought failure in your successive attempts will result in a 14-day waiting period in-between. Additionally, you are only able to retake the CEH exam no more than five times in a 12-month period.
Training in ethical hacking is recommended for any aspiring cybersecurity professional, as it not only offers you a thorough background of fundamental security concepts, but also helps you think, act, and leverage technologies like a malicious hacker. Being able to step into the shoes of the common attacker will better equip you with the skills to identify risks, implement protocols, and strengthen the security barrier of one's computer systems.
A Certified Ethical Hacking (CEH) certification, in particular, is a well-renowned measure of skill in the cybersecurity field. You'll get to boost your salary potential, align your skills with (globally-recognised) industry standards, and expand your career options while broadening your knowledge of common digital threats, risks, and vulnerabilities. This CEH v11 - Certified Ethical Hacking Short Course covers all you need to know to acquire this qualification, helping set you apart from the job market competition.
Through our CEH v11 - Certified Ethical Hacking Short Course (in partnership with Simplilearn), you'll explore all the fundamental areas of cybersecurity and network analysis. With 20 comprehensive modules delving into over 300 attack technologies (with 6-month free access to CEHv11 iLabs) this program can help you build the practical skills and technical knowledge to certify yourself as an ethical hacker. Through accreditation by EC-Council, graduates of the course can then pursue the CEH examination, acquiring themselves the verified title of Certified Ethical Hacker. This certification is only valid for three years, however, and requires 120 ECE credits to maintain.
Best of all, with our course content delivered online, you'll have the freedom of training at a time, place, and pace that best suits you.
With the industry relevant knowledge and skills you gain from our CEH v11 - Certified Ethical Hacking short course, you are eligible to apply for in-demand jobs including:
- Ethical Hacker/Penetration Tester
- Network Security Engineer
- Computer Forensics Engineer
- Data Security Analyst
- Information Security Officer
Your exam voucher fee is included in the price of this Certified Ethical Hacking course. You must ensure you procure the CEH exam voucher within 3 months from the date of course purchase. In the event that the CEH exam price increases and you have not yet booked the exam you are required to pay the for any difference in price.
Upskill to stay ahead of the curve.
Speak with an Upskilled Education Consultant to gain insightful guidance on identifying the ideal course for your career path and future aspirations.