Splunk Training:

Certified Ethical Hacker (CEH) Training

Learn ethical hacking techniques used by security professionals to identify and protect systems from cyber threats

Course Overview

This Certified Ethical Hacker (CEH) Training program provides comprehensive instruction in ethical hacking methodologies, tools, and techniques. Learn how security professionals identify vulnerabilities and protect systems from cyber threats.

Aligned with the latest CEH v13 curriculum, this bootcamp-style training covers everything from reconnaissance and scanning to exploitation and post-exploitation techniques. You will gain practical skills through hands-on labs and real-world scenarios.

Learning Outcomes

Conduct ethical hacking within legal boundaries

Perform reconnaissance and footprinting techniques

Use scanning and enumeration tools effectively

Identify system vulnerabilities

Exploit vulnerabilities using various techniques

Understand malware threats and countermeasures

Master social engineering attack methods

Perform web application penetration testing

Secure wireless networks from attacks

Prepare for CEH certification exam

Course Details

Duration:

9 weeks

Schedule:

Tuesdays & Thursdays

6:00 PM - 9:00 PM

Dates:

May 12 - July 9, 2026

Format:

Online / Virtual

Price:

$2,499

Prerequisites:

Basic networking knowledge

What's Included

  • Live instructor-led sessions
  • Hands-on hacking labs
  • CEH exam preparation
  • Certificate of completion
  • Career guidance support
Register Now

Course Curriculum

Comprehensive curriculum aligned with CEH v13 certification

1

Module 1

Introduction to Ethical Hacking

  • Ethical Hacking Concepts
  • Legal and Ethical Guidelines
  • Hacking Methodologies
  • Information Security Controls
  • Cyber Kill Chain
2

Module 2

Reconnaissance Techniques

  • Footprinting and Reconnaissance
  • OSINT Tools and Techniques
  • Network Scanning with Nmap
  • Enumeration Methods
  • Google Hacking
3

Module 3

System Hacking

  • Password Cracking Techniques
  • Privilege Escalation
  • Trojans and Backdoors
  • Rootkits
  • Steganography
4

Module 4

Malware Threats

  • Types of Malware
  • Virus Analysis
  • Worms and Trojans
  • Ransomware
  • Malware Countermeasures
5

Module 5

Sniffing and Social Engineering

  • Network Sniffing
  • Packet Analysis
  • Social Engineering Attacks
  • Phishing Techniques
  • Identity Theft
6

Module 6

Web Application and Wireless Hacking

  • OWASP Top 10
  • SQL Injection
  • XSS and CSRF Attacks
  • Wireless Encryption
  • Wi-Fi Hacking
7

Module 7

Cryptography and Cloud Security

  • Cryptography Concepts
  • Encryption Algorithms
  • PKI and Certificates
  • Cloud Computing Threats
  • Cloud Security
8

Module 8

Penetration Testing and Reporting

  • Penetration Testing Methodologies
  • Exploitation Frameworks
  • Post-Exploitation
  • Report Writing
  • CEH Exam Preparation

Career Opportunities

Launch your career in ethical hacking and offensive security

Ethical Hacker

Penetration Tester

Security Analyst

Vulnerability Assessor

Security Consultant

Red Team Specialist

SOC Analyst

Cybersecurity Engineer

Information Security Officer

Ready to enhance your team's cybersecurity skills?

Contact us at +1 571-379-8933

REGISTER FOR TRAINING