CEH: Certified Ethical Hacker v12

Course Info

Date: Mar-03-2025

Length: 1 Week

City: Kuala Lumpur

Fees: 3,970

Type: In Classroom

Available Dates

  • Jan-06-2025

    Kuala Lumpur

  • Feb-03-2025

    Kuala Lumpur

  • Mar-03-2025

    Kuala Lumpur

  • Apr-07-2025

    Kuala Lumpur

  • May-05-2025

    Kuala Lumpur

  • June-02-2025

    Kuala Lumpur

  • June-30-2025

    Kuala Lumpur

  • July-07-2025

    Kuala Lumpur

  • Aug-04-2025

    Kuala Lumpur

  • Sep-01-2025

    Kuala Lumpur

  • Sep-29-2025

    Kuala Lumpur

  • Oct-06-2025

    Kuala Lumpur

  • Nov-03-2025

    Kuala Lumpur

  • Dec-01-2025

    Kuala Lumpur

  • Dec-29-2025

    Kuala Lumpur

Dates in Other Venues

  • Jan-06-2025

    Istanbul

  • Jan-13-2025

    Singapore

  • Jan-13-2025

    Paris

  • Jan-20-2025

    London

  • Jan-20-2025

    Amsterdam

  • Jan-27-2025

    Barcelona

  • Jan-27-2025

    Dubai

  • Feb-03-2025

    Istanbul

  • Feb-10-2025

    Singapore

  • Feb-10-2025

    Paris

  • Feb-17-2025

    Amsterdam

  • Feb-17-2025

    London

  • Feb-24-2025

    Barcelona

  • Feb-24-2025

    Dubai

  • Mar-03-2025

    Istanbul

  • Mar-10-2025

    Paris

  • Mar-10-2025

    Singapore

  • Mar-17-2025

    London

  • Mar-17-2025

    Amsterdam

  • Mar-24-2025

    Dubai

  • Mar-24-2025

    Barcelona

  • Apr-07-2025

    Istanbul

  • Apr-14-2025

    Singapore

  • Apr-14-2025

    Paris

  • Apr-21-2025

    Amsterdam

  • Apr-21-2025

    London

  • Apr-28-2025

    Barcelona

  • Apr-28-2025

    Dubai

  • May-05-2025

    Istanbul

  • May-12-2025

    Singapore

  • May-12-2025

    Paris

  • May-19-2025

    London

  • May-19-2025

    Amsterdam

  • May-26-2025

    Dubai

  • May-26-2025

    Barcelona

  • June-02-2025

    Istanbul

  • June-09-2025

    Singapore

  • June-09-2025

    Paris

  • June-16-2025

    London

  • June-16-2025

    Amsterdam

  • June-23-2025

    Barcelona

  • June-30-2025

    Dubai

  • June-30-2025

    Istanbul

  • July-07-2025

    Istanbul

  • July-14-2025

    Singapore

  • July-14-2025

    Paris

  • July-21-2025

    Amsterdam

  • July-21-2025

    London

  • July-28-2025

    Dubai

  • July-28-2025

    Barcelona

  • Aug-04-2025

    Istanbul

  • Aug-11-2025

    Singapore

  • Aug-11-2025

    Paris

  • Aug-18-2025

    Amsterdam

  • Aug-18-2025

    London

  • Aug-25-2025

    Barcelona

  • Aug-25-2025

    Dubai

  • Sep-01-2025

    Istanbul

  • Sep-08-2025

    Paris

  • Sep-08-2025

    Singapore

  • Sep-15-2025

    Amsterdam

  • Sep-15-2025

    London

  • Sep-22-2025

    Barcelona

  • Sep-29-2025

    Dubai

  • Sep-29-2025

    Istanbul

  • Oct-06-2025

    Istanbul

  • Oct-13-2025

    Paris

  • Oct-13-2025

    Singapore

  • Oct-20-2025

    London

  • Oct-20-2025

    Amsterdam

  • Oct-27-2025

    Barcelona

  • Oct-27-2025

    Dubai

  • Nov-03-2025

    Istanbul

  • Nov-10-2025

    Singapore

  • Nov-10-2025

    Paris

  • Nov-17-2025

    London

  • Nov-17-2025

    Amsterdam

  • Nov-24-2025

    Dubai

  • Nov-24-2025

    Barcelona

  • Dec-01-2025

    Istanbul

  • Dec-08-2025

    Singapore

  • Dec-08-2025

    Paris

  • Dec-15-2025

    London

  • Dec-15-2025

    Amsterdam

  • Dec-22-2025

    Barcelona

  • Dec-29-2025

    Istanbul

  • Dec-29-2025

    Dubai

Course Details

Course Outline

5 days course

Introduction to Ethical Hacking


  • Definition of ethical hacking and its importance in cybersecurity
  • Roles and responsibilities of ethical hackers
  • Basics of ethical hacking and elements of information security
  • Overview of laws and regulations related to ethical hacking
  • Introduction to cloud computing and its security implications
  • Introduction to cryptography and ciphers and their protocols

Reconnaissance Techniques


  • Footprinting and reconnaissance tools and techniques
  • Steps of performing footprinting on the target network
  • Network scanning methods and tools
  • Steps of performing scanning on target network beyond IDS and Firewall
  • Enumeration tools and techniques and their implementation
  • Hans-on experience in using reconnaissance techniques

System Hacking Phases and Attack Techniques


  • Understanding the process of vulnerability research and analysis
  • Techniques and methods for identifying security loopholes in the target network
  • Exploring system hacking methodologies used to identify vulnerabilities
  • Describing various types of malware and the methodology of using them to gain control over systems and networks
  • Steps and techniques for malware analysis and countermeasures  
  • Discussing system auditing practices for malware attacks

Network and Perimeter Hacking


  • Exploring packet-sniffing techniques and their role in identifying vulnerabilities in networks
  • Definition of social engineering, its attacks and types
  • Discussing defence strategies against social engineering attacks
  • Recognizing Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques
  • Exploring session hijacking types, techniques and tools
  • Understanding the methodology of securing session management
  • Methods and techniques for evading intrusion detection systems (IDS), firewalls and honeypots

Hacking of Webs, Wireless, Platforms, IoT and OT


  • Understanding web server and application attacks and their countermeasures
  • Exploring SQL injection attack techniques and injection detection tools
  • Explaining wireless encryption and wireless hacking techniques
  • Tools and techniques to secure Wi-Fi and wireless networks
  • Describing mobile platform attack vectors and exploring techniques to ensure mobile security
  • Tools and techniques of IoT and OT hacking and countermeasures