Certification Preparation

CEH: Certified Ethical Hacker v12

Become an expert in cyber security with the Certified Ethical Hacker (CEH v12) training program from EC-Council. This globally recognized certification validates your knowledge and skills in detecting network vulnerabilities, preventing cyber-attacks, and safeguarding your organization's critical assets. With hands-on training, practical labs, assessments, and real-world simulations, you'll develop the skills and confidence to stay ahead of the ever-evolving threat of cybercrime. For career growth, become a certified ethical hacker today.

Exam

CEH v12

Certification by

EC-Council
RM 6,250.00

per person

Level

Intermediate

Duration

5 Days

Training Delivery Format

Face-to-face / Virtual Class

Associated Certification

Certified Ethical Hacker v12 (CEH v12)
RM 6,250.00

per person

Level

Intermediate

Duration

5 Days

Training Delivery Format

Face-to-face (F2F) / Virtual Class

Associated Certification

Certified Ethical Hacker v12 (CEH v12)

Class types

Public Class

Private Class

In-House Training

Bespoke

The EC-Council’s Certified Ethical Hacker (CEH v12) Training program will enhance your knowledge of essential security fundamentals. Certified Ethical Hacker (CEH V12) certification course is one of the most sought-after security qualifications in the world. This internationally recognized security course validates your ability to discover weaknesses in the organization’s network infrastructure and aids in the effective combat of cyber-attacks.

The C|EH v12 program is a specialized, one-of-a-kind training program to teach everything about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and a global hacking competition.

The CEH certification is for you if you are:

  • Mid-Level Information Security Auditor
  • Cybersecurity Analyst
  • Cybersecurity Auditor
  • Network Security Engineer
  • Security Administrator
  • SOC Security Analyst
  • Cyber Defense Analyst
  • Network Engineer
  • Vulnerability Assessment Analyst
  • Senior Security Consultant
  • Warning Analyst
  • Information Security Manager
  • Information Security Analyst 1
  • Senior SOC Analyst
  • Security Analyst L1
  • Solution Architect
  • Infosec Security Administrator
  • Cybersecurity Consultant

After completing this course, you will be able to:

  • Information security controls, laws, and standards
  • Various types of foot printing, foot printing tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
  • Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures
  • DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures
  • Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures
  • Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures
  • Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
  • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
  • Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures
  • Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools
  • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
  • Threats to IoT and OT platforms and defending IoT and OT devices
  • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

Basic understanding of network essentials and core concepts, including server and network components

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 8: Sniffing

Module 9: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injections

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking & OT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

C|EH

For career growth. Become a certified Ethical Hacker

 

The renowned Certified Ethical Hacker (CEH) program, offers the most sought-after certification in the field of ethical hacking and enhances your career prospects significantly.

 

The key facts (CEH):
  • The world’s No.1 Ethical Hacking Certification
  • A structured professional course for aspiring cyber professional
  • Work anywhere with CEH. It’s globally recognized
  • A comprehensive program to master the 5 phases of ethical hacking
  • Hands-on learning
  • Flexible learning option: Love, online, or hybrid

 

Exam Details

C|EH v12 (MCQ Exam) C|EH v12 (Practical Exam)
Number of Questions 125 Questions 20 Questions
Exam Duration 4 Hours 6 Hours
Exam Format Multiple Choice Questions iLabs Cyber Range
Exam Delivery ECCExam, VUE
Exam Prefix 312-50(ECCExam, VUE), 312-50 (VUE)
Passing Score 60%-80% 70%

How can I prepare for the exam?

You can join our face-to-face public or virtual or Bespoke class. Just choose the right class type for your learning needs and goal.

As an alternative you can access to eCourseware for complete the CEH course

 

If I have no experience in IT security, is this course suitable for me?

CEH is an excellent starting point for a career in Cyber Security, but it’s important to have some prior knowledge before diving into it.

It is highly recommended to have at least 2 years of experience in IT security before attempting the CEH certification.

 

What are the responsibilities of a Certified Ethical Hacker (CEH)?

Certified Ethical Hackers are hired by organizations either to help improve the organization’s security posture. The function of ethical hacking involves a methodical practice of identifying, evaluating, testing, and reporting vulnerabilities in an organization.

Ethical Hackers can evaluate nearly any application or infrastructure they are tasked with, identify potential vulnerabilities, and provide recommendations on how those vulnerabilities can be remedied.

 

Is it beneficial to pursue a Certified Ethical Hacker (CEH) certification?

Holding a CEH certification proves to your potential employer that you possess the baseline knowledge and skills to be an effective and productive security team member.

Globally, there is an insufficient supply of qualified people in this field thus creating amazing job opportunities for Certified Ethical Hackers in nearly every industry.

 

Is the CEH certification considered valuable or reputable?

For over 20 years, EC-Council has worked to build the best Ethical Hacking Certification. The topics covered in the examination go through rigorous job task analysis and careful curation of exam domains.

CEH is recognized by various governments around the world including the United States Department of Defense, GCHQ in the UK, and many others.

Version releases are paced every 12-18 months, depending on major trends in the market, new tools, vulnerabilities, operating systems, and much more.

This shows why the CEH is very valuable and reputable certification

HRD Corp Claimable Course

At this time, this course is available for private class and in-house training only. Please contact us for any inquiries. 

Contact form

Get the Project Charter Guide now!

Just enter your email address to access the FREE Project Charter guide and template.