Course Code: 5677

EC-Council - CEH - Certified Ethical Hacker v12

Class Dates:
5 Days
Class Time:
Instructor-Led Training, Virtual Instructor-Led Training


  • Course Overview
  • The C|EH® v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and hands-on application through our cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.”
  • Audience
  • Ethical hackers, System Administrators, Network Administrators and Engineering, Web Managers, Auditors, Security Professionals in general.

    Common Job Roles for C|EH
    • Mid-Level Information Security Auditor
    • Cybersecurity Auditor
    • Security Administrator
    • IT Security Administrator
    • Cyber Defense Analyst
    • Vulnerability Assessment Analyst
    • Warning Analyst
    • Information Security Analyst 1
    • Security Analyst L1
    • Infosec Security Administrator
    • Cybersecurity Analyst level 1, level 2, & level 3
    • Network Security Engineer
    • SOC Security Analyst
    • Security Analyst • Network Engineer • Senior Security Consultant • Information Security Manager • Senior SOC Analyst • Solution Architect • Cybersecurity Consultant


  • One year of experience managing Windows/Unix/Linux systems or equivalent knowledge and skills.
    Good understanding of TCP/IP. Software

    Professionals with basic knowledge of networking services.

Course Details

  • 1. Introduction to Ethical Hacking
  • Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures
  • 2. Foot Printing and Reconnaissance
  • Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
  • 3. Scanning Networks
  • Learn different network scanning techniques and countermeasures.
  • 4, Enumeration
  • Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures
  • 5. Vulnerability Analysis
  • Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems..
  • Different types of vulnerability assessment and vulnerability assessment tools.
  • 6. System Hacking
  • Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities .
  • 7. Malware Threats
  • Learn different types of malware (Trojan, virus, worms, etc.), APT and fileless malware, malware analysis procedure, and malware countermeasures.
  • 8. Sniffing
  • Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks
  • 9. Social Engineering
  • Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
  • 10. Denial-of-Service
  • Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections
  • 11. Session Hijacking
  • Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
  • 12. Evading IDS, Firewalls, and Honeypots
  • Get introduced to firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
  • 13. Hacking Web Servers
  • Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
  • 14. Hacking Web Applications
  • Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
  • 15. SQL Injection
  • Learn about SQL injection attacks, evasion techniques, and SQL injection countermeasures.
  • 16. Hacking Wireless Networks
  • Understand different types of wireless technologies, including encryption, threats, hacking methodologies, hacking tools, Wi-Fi sedcurity tools, and countermeasures.
  • 17. Hacking Mobile Platforms
  • Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
  • 18. oT Hacking
  • Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
  • 19. Cloud Computing
  • Learn different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques
  • and tools.
  • 20. Session Hijacking
  • Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
  • Hands-On Learning Labs
  • With over 220 hands-on labs conducted in our cyber range environment, you will have the opportunity to practice every learning objective on live machines and vulnerable targets in the course.
  • Pre-loaded with over 3,500 hacking tools and various operating systems
  • you will gain unprecedented exposure and hands-on experience with the most common security tools,
  • latest vulnerabilities, and widely used operating systems in the industry
  • What’s Covered:
  • 100% virtualization for a complete learning experience
  • After login, you will have full access to preconfigured targets, networks, and the attack tools necessary to exploit them:
  • Pre-configured vulnerable websites
  • Vulnerable, unpatched operating systems
  • Fully networked environments
  • 3,500+ hacking tools
  • Wide range of target platforms to hone your skills.
  • 519 attack techniques
  • Objective-oriented flags for critical thinking and applied knowledge assessment
  • Cloud-based cyber range