Cyber Security Expert

 Certified Ethical Hacker (CEH)

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH® understands attack strategies, and the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.
What is CEH® v12? The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide. In its 12th version, the Certified Ethical Hacker provides comprehensive training, hands-on learning labs, dractice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework:
1. Learn 2. Certify 3. Engage 4. Compete


5 Days

Course Duration


Course Fee

No International Certification Available

Certification Cost

Course Outline

• Elements of Information Security
• Cyber Kill Chain Methodology
• MITRE ATTACK Framework
• Hacker Classes I Ethical Hacking I Information Assurance (IA)
• Risk Management I Incident Management

• Footprinting
• Advanced Google Hacking Techniques
• Deep and Dark Web Footprinting
• Competitive Intelligence Gathering
• Website Footprinting | Website Mirroring | Email Footprinting
• Who is Lookup | DNS Footprinting | Traceroute Analysis |Footprinting Tools

• Network Scanning | Host Discovery Techniques | Port Scanning Techniques
• Service Version Discovery | OS Discovery
• Banner Grabbing | OS Fingerprinting | Packet Fragmentation | Source Routing
• IP Address Spoofing | Scanning Tools Enumeration


• Enumeration | NetBIOS Enumeration | SNMP Enumeration | LDAP Enumeration
• NTP Enumeration | NFS Enumeration | SMTP Enumeration
• DNS Cache Snooping | DNSSES Zone Walking | IPsec Enumeration
• VoIP Enumeration | RPC Enumeration | Unix/Linux User Enumeration
• Enumeration Tools 

• Vulnerability: Research | Assessment | Management Life Cycle | Classification
• Vulnerability Assessment Tools | Assessment Reports System Hacking

• Password Cracking, Tools /Attacks | Wire Sniffing | Vulnerability Exploitation
• Buffer Overflow | Privilege Escalation | Privilege Escalation Tools Keylogger | Anti-Keyloggers | Spyware | Anti-Spyware | Rootkits |Anti-Rootkits
• Steganography | Steganography Tools | Detection Tools |Steganalysis
• Maintaining Persistence
• Post Exploitation | Clearing Logs
• Covering Tracks | Track-Covering Tools

• Malware | Components of Malware | APT | Trojan | Types ofTrojans
• Exploit Kits | Virus | Virus Lifecycle | Types of Viruses
• Fileless Malware | Malware Analysis | Static Malware Analysis
• Dynamic Malware Analysis | Virus Detection Methods |Trojan/Virus Analysis
• Anti-Trojan Software | Antivirus Software |Fileless Malware Detection Tools