Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)

About Course
Hands-On Penetration Testing
Become a certified cybersecurity professional with the Certified Ethical Hacker (CEH) course—one of the most globally recognised credentials in ethical hacking and penetration testing. This program provides hands-on training in identifying vulnerabilities, securing networks, and thinking like a hacker to protect systems effectively.
Module 1: Introduction to Ethical Hacking
- Overview of information security
- Threats, attack vectors, and threat actors
- Ethical hacking phases
- Legal and regulatory considerations
Module 2: Footprinting and Reconnaissance
- Footprinting techniques (active and passive)
- Tools for reconnaissance
- WHOIS, DNS enumeration, email footprinting
- Countermeasures
Module 3: Scanning Networks
- Network scanning types and techniques
- Host discovery, port scanning, and service enumeration
- Vulnerability scanning
- Tools: Nmap, Nessus, OpenVAS
Module 4: Enumeration
- NetBIOS, SNMP, LDAP, NFS enumeration
- Windows and Linux enumeration
- Enumeration tools and countermeasures
Module 5: Vulnerability Analysis
- Types of vulnerabilities
- Tools for vulnerability assessment
- Interpreting scan results
- Remediation techniques
Module 6: System Hacking
- Gaining access: password cracking, exploits
- Privilege escalation techniques
- Maintaining access (backdoors, trojans)
- Covering tracks (log clearing, rootkits)
Module 7: Malware Threats
- Types of malware: viruses, worms, trojans, ransomware
- Malware analysis basics
- Anti-malware evasion
Module 8: Sniffing
- Packet sniffing basics
- ARP poisoning and MAC flooding
- Tools: Wireshark, tcpdump
- Prevention techniques
Module 9: Social Engineering
- Types of social engineering attacks
- Phishing, baiting, and pretexting
- Tools and countermeasures
Module 10: Denial of Service
- DoS and DDoS attack mechanisms
- Botnets, amplification attacks
- Detection and mitigation
Module 11: Session Hijacking
- TCP/IP hijacking, session fixation
- Tools for hijacking sessions
- Prevention and mitigation
Module 12: Evading IDS, Firewalls, and Honeypots
- Techniques for bypassing detection systems
- Tools and techniques
- Countermeasures
Module 13: Hacking Web Servers
- Web server architecture and vulnerabilities
- Attacks: directory traversal, misconfiguration
- Tools and security practices
Module 14: Hacking Web Applications
- OWASP Top 10
- Input validation, session management attacks
- SQL injection, XSS, CSRF
- Web application testing tools
Module 15: SQL Injection
- Manual and automated SQLi
- Exploitation techniques
- Mitigation and secure coding practices
Module 16: Hacking Wireless Networks
- Wireless encryption (WEP, WPA, WPA2)
- Attacks: sniffing, rogue AP, Evil Twin
- Wireless hacking tools
Module 17: Hacking Mobile Platforms
- Mobile OS vulnerabilities (iOS, Android)
- App analysis and threats
- Mobile security guidelines
Module 18: IoT and OT Hacking
- IoT attack surface and vectors
- Device fingerprinting
- Threat modelling and secure design
Module 19: Cloud Computing
- Cloud service models and threats
- Attacking cloud infrastructures
- Security tools for cloud
Module 20: Cryptography
- Encryption algorithms (symmetric, asymmetric)
- Hashing, digital signatures
- Cryptanalysis and attacks