EC-Council Certified Ethical Hacker (C|EH)
Course Overview
Discover the forefront of cyber security with our Certified Ethical Hacker (C|EH) v12 course. Gain hands-on training and learn essential skills like network scanning, cryptography, and malware analysis. Master over 20 modules and over 220 hands-on labs to excel in cyber security.
Embark on a dynamic journey into ethical hacking with our Certified Ethical Hacker (C|EH) v12 course. Covering a breadth of topics from network scanning to cryptography, participants delve into advanced techniques to fortify cyber security defenses. Tailored for security professionals and enthusiasts, this immersive program equips individuals with hands-on skills essential for safeguarding digital assets effectively.
Who is this course for?
- Information Security Analysts/Administrators
- Information Assurance (IA) Security Officers
- Information Security Managers/Specialists
- Information Systems Security Engineers/Managers
- Information Security Professionals/Officers
- Information Security Auditors
- Risk/Threat/Vulnerability Analysts
- System Administrators
- Network Administrators and Engineers
- Individuals committed to upholding network infrastructure integrity
Course Options
- Virtual Classroom: Participate in live, instructor-led sessions from the comfort of your home or office.
- On-site Classroom: Join us in person at one of our training centres for an immersive learning experience.
Course Duration
- 5 Days: Intensive training covering all aspects of ethical hacking.
What you need to know
The Certified Ethical Hacker (C|EH) v12 certification is the go-to for cybersecurity professionals delving into ethical hacking and penetration testing. Through hands-on training and comprehensive modules, participants gain expertise in identifying and mitigating vulnerabilities effectively, fortifying organizational defenses against cyber threats.
What You'll Learn
- Footprinting, reconnaissance, and network scanning techniques
- Enumeration and vulnerability analysis methods
- System hacking and malware threat detection
- Social engineering and denial-of-service attack prevention
- Session hijacking and evasion techniques against intrusion detection systems and firewalls
- Web server and application hacking strategies, including SQL injection
- Wireless network and mobile platform security protocols
- IoT, OT, cloud computing, and cryptography fundamentals
Course Structure
This course will provide in-depth coverage of the following topics:
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Cloud Computing
Cryptography
Entry requirements
Candidates for the Certified Ethical Hacker (C|EH) v12 course should have networking experience, with a basic understanding of TCP/UDP/IP protocols. Some familiarity with Linux, particularly the command line, is advantageous, as is proficiency in Windows Server. Additionally, candidates should have experience working with virtual machines.
Pricing Options
Customised Pricing.
Get in touch to know more!
Prices mentioned includes GST. Pricing includes course training and exam voucher. Terms and Conditions Apply. Talk to an Upskilled Consultant to know more.
Upskilled Tech Academy
Industry Recognised Tech Training
Specialised technical courses are designed to equip your team with industry-relevant skills. Guided by top-tier trainers, our hands-on programs are meticulously crafted to align seamlessly with industry standards.