EC Council Certified Ethical Hacker CEH

RegisterInquiry
EC Council Certified Ethical Hacker CEH
Loading...

B3125

Kuala Lumpur (Malaysia)

08 Dec 2025 -12 Dec 2025

5850

Overview

Introduction:

This program is designed to prepare participants for the certification exam only.

The EC-Council Certified Ethical Hacker (CEH) certification is a recognized credential in the cybersecurity field. It focuses on identifying security vulnerabilities, penetration testing techniques, and ethical hacking methodologies to strengthen an organization’s security posture. This training program provides in-depth knowledge of cyber attack strategies, security assessment frameworks, and countermeasures.

Program Objectives:

By the end of this program, participants will be able to:

  • Identify ethical hacking concepts and methodologies.

  • Utilize security vulnerabilities and penetration testing techniques.

  • Analyze hacking tools and attack vectors used by cybercriminals.

  • Identify network security defenses and countermeasures.

  • Prepare for the CEH certification exam.

Targeted Audience:

  • Cybersecurity professionals and ethical hackers.

  • Threat hunters and forensic experts.

  • Penetration testers and security analysts.

  • Network security administrators and IT auditors.

  • Risk and compliance officers.

  • Professionals preparing for the CEH certification.

Program Outline:

Unit 1:

Fundamentals of Ethical Hacking:

  • Ethical hacking methodologies and adversary simulation techniques.

  • Cyber threat intelligence frameworks and attacker profiling.

  • Legal and regulatory considerations in ethical hacking.

  • Security assessment methodologies and penetration testing lifecycle.

  • Indicators of Compromise (IoCs) and attack chain analysis.

Unit 2:

Hacking Techniques and Exploitation Methods:

  • Reconnaissance techniques, OSINT, and active scanning.

  • Vulnerability assessment tools and exploitation frameworks including Metasploit and Cobalt Strike.

  • Exploiting misconfigurations and privilege escalation methods.

  • Post-exploitation techniques and persistence mechanisms.

  • Covering tracks, anti-forensic techniques, and evasion strategies.

Unit 3:

Network Security and Attack Vectors:

  • Advanced network traffic analysis and packet inspection methods.

  • Intrusion tactics including MITM, sniffing, and lateral movement.

  • Web application and API security vulnerabilities (OWASP Top 10).

  • Wireless network attacks and defense mechanisms.

  • Forensic data acquisition and chain of custody principles.

Unit 4:

Malware, Cryptography, and Security Controls:

  • Static and dynamic malware analysis techniques.

  • Ransomware attack lifecycle and defense strategies.

  • Cryptographic attacks and password cracking techniques.

  • Firewall evasion, IDS/IPS bypassing, and honeypot detection methods.

  • Security event correlation, SIEM use, and proactive threat detection techniques.

Unit 5:

CEH Certification Exam Preparation:

  • Review of CEH exam structure and key domains.

  • Reviewing key topics and areas of emphasis in the exam syllabus.

  • Sample exam questions and their potential answers.

  • Resources and study materials for exam preparation.

Note: This program is designed to prepare participants for the certification exam only.