Certified Ethical Hacker (CEH) Certification Overview

Course syllabus

Who it’s for

What’s included

Exams

FAQs

Certified Ethical Hacker Course Outline

Module 1: Introduction to Ethical Hacking

  • Elements of Information Security
  • Classification of Attacks
  • Hacker Classes
  • Ethical Hacking
  • AI-Driven Ethical Hacking
  • ChatGPT-Powered AI Tools for Ethical Hackers
  • CEH Ethical Hacking Framework
  • Cyber Kill Chain Methodology
  • MITRE ATT&CK Framework
  • Information Assurance (IA)
  • Risk Management
  • Threat Intelligence Lifecycle
  • Incident Management
  • PCI DSS
  • HIPPA
  • SOX
  • GDPR
  • DPA

Module 2: Foot Printing and Reconnaissance

  • Reconnaissance
  • Footprinting Using Advanced Google Hacking Techniques
  • Footprinting through People Search Services
  • Dark Web Footprinting
  • Competitive Intelligence Gathering
  • Footprinting through Social Networking Sites
  • Whois Lookup
  • DNS Footprinting
  • Traceroute Analysis
  • Email Footprinting
  • Footprinting through Social Engineering
  • AI-Powered OSINT Tools

Hands-on Labs:

  • Perform footprinting on the target network using search engines, internet research services, and social networking sites
  • Perform whois, DNS, network, and email footprinting on the target network
  • Perform Footprinting using AI

Module 3: Scanning Networks

  • Network Scanning
  • Scanning Tools
  • Host Discovery Techniques
  • Port Scanning Techniques
  • Host Discovery and Port Scanning with AI
  • Service Version Discovery
  • OS Discovery/Banner Grabbing
  • Scanning Beyond IDS and Firewall
  • Scanning Detection and Prevention

Hands-on Labs:

  • Perform host, port, service, and OS discovery on the target network
  • Perform scanning on the target network beyond IDS and Firewall
  • Perform scanning using AI

Module 4: Enumeration

  • Enumeration, NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • NFS Enumeration
  • SMTP Enumeration
  • DNS Cache Snooping
  • DNSSEC Zone Walking
  • IPsec Enumeration
  • VoIP Enumeration
  • RPC Enumeration
  • Unix/Linux User Enumeration
  • SMB Enumeration
  • Enumeration using AI
  • Enumeration Countermeasures

Hands-on Labs:

  • Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP Enumeration
  • Perform Enumeration using AI

Module 5: Vulnerability Analysis

  • Vulnerability Classification
  • Vulnerability Scoring Systems and Databases
  • Vulnerability-Management Life Cycle
  • Vulnerability Research
  • Vulnerability Scanning and Analysis 
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • AI-Powered Vulnerability Assessment Tools

Module 6: System Hacking

  • Password Cracking
  • Password Attacks
  • Password-Cracking Tools
  • Vulnerability Exploitation
  • Metasploit Framework
  • AI-Powered Vulnerability Exploitation Tools
  • Buffer Overflow
  • Buffer Overflow Detection Tools
  • Active Directory (AD) Enumeration
  • Privilege Escalation
  • Privilege Escalation Tools
  • Executing Applications
  • Keylogger
  • Spyware
  • Rootkits
  • Steganography
  • Steganalysis
  • Steganography Detection Tools
  • Maintaining Persistence
  • Linux and Windows Post Exploitation
  • Covering Tracks
  • Clearing Logs
  • Track-Covering Tools

Hands-on Labs:

  • Perform an Active Online Attack to Crack the System’s Password
  • Perform Buffer Overflow Attack to Gain Access to a Remote System
  • Escalate Privileges using Privilege Escalation Tools
  • Escalate Privileges in Linux Machine
  • Hide Data using Steganography
  • Clear Windows and Linux Machine Logs using Various Utilities
  • Hiding Artifacts in Windows and Linux Machines
  • Perform System Hacking using AI

Module 7: Malware Threats

  • Malware
  • Advanced Persistent Threat Lifecycle
  • Trojan
  • Virus
  • Ransomware
  • Computer Worms
  • Fileless Malware
  • AI-based Malware
  • Malware Analysis
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Virus Detection Methods
  • Malware Countermeasures
  • Anti-Trojan Software
  • AI-Powered Malware Detection and Analysis Tools

Hands-on Labs:

  • Gain Control over a Victim Machine using Trojan
  • Infect the Target System using a Virus
  • Perform Static and Dynamic Malware Analysis

Module 8: Sniffing

  • Network Sniffing
  • MAC Flooding
  • DHCP Starvation Attack
  • ARP Spoofing
  • ARP Spoofing/Poisoning Tools
  • MAC Spoofing
  • VLAN Hopping
  • STP Attack
  • DNS Poisoning Techniques
  • DNS Poisoning Tools
  • Sniffing Tools, Sniffer Detection Techniques
  • Promiscuous Detection Tools

Hands-on Labs:

  • Perform MAC Flooding, ARP Poisoning, MITM and DHCP Starvation Attack
  • Spoof a MAC Address of a Linux Machine
  • Perform Network Sniffing using Various Sniffing Tools
  • Detect ARP Poisoning in a Switch-Based Network

Module 9: Social Engineering

  • Social Engineering
  • Types of Social Engineering
  • Human-based Social Engineering Techniques
  • Impersonation
  • Computer-based Social Engineering Techniques
  • Phishing
  • Phishing Tools
  • Perform Impersonation using AI
  • Identity Theft
  • Mobile-based Social Engineering Techniques
  • Social Engineering Countermeasures
  • Anti-Phishing Toolbar

Hands-on Labs:

  • Perform Social Engineering using Various Techniques
  • Detect a Phishing Attack
  • Social Engineering using AI

Module 10: Denial-of-Service

  • DoS Attack
  • DDoS Attack
  • Botnets
  • DoS/DDoS Attack Techniques
  • DoS/DDoS Attack Toolkits
  • DoS/DDoS Attack Detection Techniques
  • DoS/DDoS Protection Tools
  • DoS/DDoS Protection Services

Hands-on Labs:

  • Perform a DoS and DDoS attack on a Target Host
  • Detect and Protect Against DoS and DDoS Attacks

Module 11: Session High jacking

  • Session Hijacking
  • Application-Level Session Hijacking
  • Compromising Session IDs
  • Session Hijacking
  • Network-Level Session Hijacking
  • TCP/IP Hijacking
  • RST Hijacking
  • Blind Hijacking
  • Session Hijacking Tools
  • Session Hijacking Detection Methods
  • Session Hijacking Detection Tools
  • Approaches to Prevent Session Hijacking

Hands-on Labs:

  • Perform Session Hijacking using various Tools
  • Detect Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

  • Intrusion Detection System (IDS)
  • Intrusion Prevention System (IPS)
  • Firewall
  • Types of Firewalls
  • Intrusion Detection Tools
  • Intrusion Prevention Tools
  • IDS/Firewall Evasion Techniques
  • NAC and Endpoint Security Evasion Techniques
  • IDS/Firewall Evading Tools
  • Honeypot
  • Types of Honeypots
  • Honeypot Tools
  • IDS/Firewall Evasion Countermeasures

Hands-on Labs:

  • Perform Intrusion Detection using Various Tools
  • Deploy Honeypot to Detect Malicious Network Traffic
  • Bypass Firewall Rules using Tunneling
  • Bypass Antivirus

Module 13: Hacking Web Servers

  • Web Server Architecture
  • Web Server Vulnerabilities
  • Web Server Attacks
  • DNS Server Hijacking
  • Web Cache Poisoning Attack
  • Web Server Footprinting/Banner Grabbing
  • Directory Brute Forcing
  • Vulnerability Scanning
  • Web Server Password Hacking
  • Web Server Attack Tools
  • Web Server Attack Countermeasures
  • Detecting Web Server Hacking Attempts
  • Web Server Security Tools

Hands-on Labs:

  • Perform Web Server Reconnaissance using Various Tools
  • Enumerate Web Server Information
  • Perform a Web Server Attack
  • Perform a Web Server Hacking using AI

Module 14: Hacking Web Applications

  • Web Application
  • OWASP Top 10 Application Security Risks – 2021
  • Web Application Attacks
  • Footprint Web Infrastructure
  • Analyze Web Applications
  • Bypass Client-side Controls
  • Attack Access Controls
  • Attack Web Services
  • Web API
  • Webhooks
  • Web API Hacking Methodology
  • API Security Risks and Solutions
  • Web Application Security Testing
  • Web Application Fuzz Testing
  • Encoding Schemes
  • Web Application Attack Countermeasures
  • Web Application Security Testing Tools

Hands-on Labs:

  • Perform Web Application Reconnaissance using Various Tools
  • Perform Web Spidering
  • Perform Web Application Vulnerability Scanning
  • Perform Web Application Attacks
  • Detect Web Application Vulnerabilities using Various Web Application Security Tools
  • Perform Web Application Hacking using AI

Module 15: SQL Injection

  • SQL Injection
  • Types of SQL Injection
  • Error Based SQL Injection
  • Union SQL Injection
  • Blind/Inferential SQL Injection
  • SQL Injection Methodology
  • Information Gathering and SQL Injection Vulnerability Detection
  • Launch SQL Injection Attacks
  • Advanced SQL Injection
  • SQL Injection Tools
  • SQL Injection with AI
  • Evasion Techniques
  • SQL Injection Countermeasures
  • SQL Injection Detection Tools

Hands-on Labs:

  • Perform an SQL Injection Attack Against MSSQL to Extract Databases
  • Detect SQL Injection Vulnerabilities using Various SQL Injection Detection Tools
  • Perform SQL Injection using AI

Module 16: Hacking Wireless Networks

  • Wireless Networks
  • Wireless Standards
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Discovery
  • Wireless Traffic Analysis
  • Launch of Wireless Attacks
  • Wi-Fi Encryption Cracking
  • Wireless Attack Countermeasures
  • Wi-Fi Security Auditing Tools

Hands-on Labs:

  • Footprint a Wireless Network
  • Perform Wireless Traffic Analysis
  • Crack a WPA2 Network
  • Create a Rogue Access Point

Module 17: Hacking Mobile Platforms

  • OWASP Top 10 Mobile Risks – 2024
  • Anatomy of a Mobile Attack
  • App Sandboxing Issues
  • SMS Phishing Attack (SMiShing)
  • Call Spoofing
  • OTP Hijacking/Two-Factor Authentication Hijacking
  • Camera/Microphone Capture Attacks
  • Android Rooting
  • Hacking Android Devices
  • Android Hacking Tools
  • Android Security Tools
  • Jailbreaking iOS
  • Hacking iOS Devices
  • iOS Device Security Tools
  • Mobile Device Management (MDM)
  • OWASP Top 10 Mobile Risks and Solutions
  • Mobile Security Guidelines
  • Mobile Security Tools

Hands-on Labs:

  • Hack an Android Device by Creating Binary Payloads
  • Exploit the Android Platform through ADB
  • Hack an Android Device by Creating APK File
  • Secure Android Devices using Various Android Security Tools

Module 18: IoT and OT Hacking

  • IoT Architecture
  • IoT Technologies and Protocols
  • OWASP Top 10 IoT Threats
  • IoT Vulnerabilities
  • IoT Threats
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • IoT Security Tools
  • IT/OT Convergence (IIOT)
  • OT Technologies and Protocols
  • OT Vulnerabilities
  • OT Threats
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • OT Security Tools

Hands-on Labs:

  • Gather Information using Online Footprinting Tools
  • Capture and Analyse IoT Device Traffic
  • Perform IoT Attacks

Module 19: Cloud Computing

  • Cloud Computing
  • Fog Computing
  • Edge Computing
  • Container
  • Docker
  • Kubernetes
  • Serverless Computing
  • OWASP Top 10 Cloud Security Risks
  • Cloud Computing Threats
  • Container Vulnerabilities
  • Kubernetes Vulnerabilities
  • Cloud Attacks
  • Cloud Hacking Methodology
  • AWS Hacking
  • Microsoft Azure Hacking
  • Google Cloud Hacking
  • Container Hacking
  • Cloud Network Security
  • Cloud Security Controls
  • Cloud Security Tools

Hands-on Labs:

  • Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
  • Exploit Open S3 Buckets
  • Escalate IAM User Privileges by Exploiting Misconfigured User Policy
  • Perform Vulnerability Assessment on Docker Images

Module 20: Cryptography

  • Cryptography, Ciphers
  • Symmetric Encryption Algorithms
  • Asymmetric Encryption Algorithms
  • Message Digest Functions
  • Quantum Cryptography
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Signed Certificate
  • Digital Signature
  • Email Encryption
  • Disk Encryption
  • Blockchain
  • Cryptanalysis Methods
  • Cryptography Attacks
  • Attacks on Blockchain
  • Quantum Computing Attacks
  • Cryptanalysis Tools

Hands-on Labs:

  • Encrypt the Information using Various Cryptography Tools
  • Create and Use Self-signed Certificates
  • Perform Email and Disk Encryption
  • Perform Cryptanalysis using Various Cryptanalysis Tools
  • Perform Cryptography using AI
Show more blue-arrow

Who should attend this CEH Certified Ethical Hacker Course?

This CEH Course is ideal for individuals aiming to deepen their understanding and practical skills in the art of ethical hacking. It is particularly beneficial for the following professionals:

  • Cyber Red Team Operator
  • System Administrators
  • Cybersecurity Analysts
  • IT Managers and Directors
  • Information Security Engineer
  • Network Architects
  • CND Cyber Analyst

Prerequisites for the CEH Certified Ethical Hacker Course

There are no formal prerequisites to attend this EC-Council Certification.

CEH Certified Ethical Hacker Course Overview

The CEH Certified Ethical Hacker Course introduces learners to Ethical Hacking, exploring hacker approaches, vulnerabilities, penetration testing, and defence strategies essential for protecting modern systems. 

Formal CEH training provides practical skills, recognised certification, and credibility, helping learners master tools, techniques, and methodologies while boosting employability in cyber security roles.

The Knowledge Academy 5-Day CEH Training ensures a globally recognised, professional learning experience backed by EC-Council standards.

CEH Certified Ethical Hacker Course Objectives

  • To learn the tools, techniques and approaches cybercriminals use
  • To conduct comprehensive network scanning and enumeration
  • To analyse vulnerabilities and perform effective Ethical Hacking
  • To identify and mitigate malware and other malicious software
  • To understand and apply Ethical Hacking to mobile and IoT devices
  • To develop skills in evading IDS, firewalls, and honeypots

After attending this EC-Council Certification, delegates will be equipped with the knowledge to identify vulnerabilities across a variety of operating systems and effectively exploit these vulnerabilities to test system defences.

Show more blue-arrow

What’s included in this CEH Certified Ethical Hacker Course?

  • Certified Ethical Hacker Certification Examination [312-50 (ECC EXAM), 312-50 (VUE)]
  • 1-year lab access and access to eBooks as part of the course package
  • World-Class Training Sessions from Experienced Instructors
  • Certified Ethical Hacker Certificate
  • Digital Delegate Pack
Show more blue-arrow

Certified Ethical Hacker Certification Exam Information

The Certified Ethical Hacker (C|EH) exam evaluates a candidate proficiency in Ethical Hacking techniques and cybersecurity principles. The exam format is as follows:

  • Type of Questions: Multiple Choice
  • Total Questions: 125
  • Duration: 4 Hours
Show more blue-arrow

Our Columbia venue

Includes..

Free Wi-Fi

To make sure you’re always connected we offer completely free and easy to access wi-fi.

Air conditioned

To keep you comfortable during your course we offer a fully air conditioned environment.

Full IT support

IT support is on hand to sort out any unforseen issues that may arise.

Video equipment

This location has full video conferencing equipment.

Columbia is a community based in Maryland, USA. It is in Howard County and has a population of around 100,000 people. It is repeatedly voted as one of the ‘best places to live in America’ by CCN Money. There are a range of public schools in Columbia, the majority of which are operated by Howard County Public School System. The high schools include Hammond High School and River Hill High School. There are no traditional universities or colleges in Columbia but there is a community college; Howard Community College and several further education establishments have facilities in the area such as University of Phoenix and American Career Institute. Howard Community College was established in 1966 and enrols around 28,000 students a year. It offers programs over a range of seven academic subjects; arts and humanities, business and computers, workforce development, languages, health sciences, mathematics, science and engineering and teacher education. The unemployment rate in Columbia is at 4.7%. This has improved slightly since last year’s rate of 5.5%.

Show moredown

Ways to take Certified Ethical Hacker (CEH) Certification in Columbia

Online Instructor-Led Learning

Onsite Learning

Experience live, interactive learning from home with The Knowledge Academy's Online Instructor-led Certified Ethical Hacker (CEH) Certification. Engage directly with expert instructors, mirroring the classroom schedule for a comprehensive learning journey. Enjoy the convenience of virtual learning without compromising on the quality of interaction.

classes

Live classes

Join a scheduled class with a live instructor and other delegates.

interactive

Interactive

Engage in activities, and communicate with your trainer and peers.

degree

Global Pool of the Best Trainers

We handpick from a global pool of expert trainers for our Online Instructor-led courses.

expertise

Expertise

With 10+ years of quality, instructor-led training, we equip professionals with lasting skills for success.

global

Scalable Training Delivery

Access Certified Ethical Hacker (CEH) Certification in Columbia delivered by one of the largest training providers, with scalable instructor-led classes, accessible worldwide.

Master Certified Ethical Hacker (CEH) Certification with a flexible yet structured approach that combines live, expert-led sessions and self-paced study. With weekly one-to-one tutor support and consistently high pass rates, you’ll receive tailored guidance and achieve real results.

trainer

Structured Yet Flexible Learning

Take part in scheduled, instructor-led sessions with real-time feedback, while enjoying the freedom to study independently. Interactive resources and progress tracking tools help you stay motivated and on target.

venue

Engaging & Interactive Training

Join dynamic live sessions featuring discussions, practical activities, and peer collaboration. Learn from Certified Ethical Hacker (CEH) Certification industry experts and reinforce your knowledge with self-paced modules—plus, connect with professionals in your field.

classes

Expert-Led Course

Gain valuable insight from experienced trainers during live sessions, and revisit course materials anytime to deepen your understanding. This method offers the ideal balance between expert guidance and independent learning.

money

Global Training Accessibility

Access top-quality training across time zones—anytime, anywhere. Whether at home or on the go, our expert-led sessions and flexible study materials support your goals, and help you on the journey towards the certification.

Learn Certified Ethical Hacker (CEH) Certification through The Knowledge Academy’s Online Self-Paced Learning. This flexible and structured format supports your training goals and enables every professional to build skills with confidence.

flexiblelearning

Flexible Learning

Access Certified Ethical Hacker (CEH) Certification resources 24/7 to maintain steady progress, complete regular assessments or tasks, and upskill effectively alongside work commitments.

expert-developed

Expert-Developed Content

Our Online Course content is designed by experienced trainers to ensure accuracy, relevance, and practical value.

global-access

Global Training Provider

Access Certified Ethical Hacker (CEH) Certification in Columbia from a trusted global training provider delivering consistent learning to professionals worldwide.

cost-effective

Cost-Effective Training

Benefit from the cost-effective Certified Ethical Hacker (CEH) Certification that delivers high-quality course content without compromising learning outcomes.

interactive-lms

Interactive LMS

Track performance, download resources, and receive AI-enabled support through The Knowledge Academy’s dedicated Learning Management System.

Package deals for Certified Ethical Hacker (CEH) Certification

Our training experts have compiled a range of course packages on a variety of categories in Certified Ethical Hacker (CEH) Certification, to boost your career. The packages consist of the best possible qualifications with Certified Ethical Hacker (CEH) Certification, and allows you to purchase multiple courses at a discounted rate.

Certified Ethical Hacker (CEH) Certification Course in Columbia FAQs

What is the Certified Ethical Hacker (CEH) Certification?

The Certified Ethical Hacker (CEH) Certification validates your ability to identify, assess, and address security vulnerabilities using the same techniques as malicious hackers, but in a lawful and authorised manner. It focuses on penetration testing, system vulnerabilities, and strengthening organisational cyber defences.

Who should attend the CEH Certification course?

This course is ideal for IT security professionals, Network Administrators, System Administrators, Security Analysts, Penetration Testers, Cybersecurity Engineers, and individuals pursuing a career in ethical hacking or information security.

Are there any prerequisites for enrolling in CEH training?

While there are no strict requirements for attending the training, a basic understanding of networking, operating systems, and information security concepts is recommended. Prior experience in IT or cybersecurity roles can help learners better understand technical topics.

What will I learn during the CEH Certification training?

You will learn ethical hacking methodologies, reconnaissance techniques, network scanning, vulnerability analysis, system hacking, malware threats, web application security, wireless security, and countermeasures used to prevent cyberattacks.

What career opportunities are available after completing the CEH Certification?

After certification, you can pursue roles such as Ethical Hacker, Penetration Tester, Security Analyst, Cybersecurity Consultant, Security Engineer, or Information Security Specialist across various industries.

How does CEH Certification benefit organizations?

Organizations benefit by having professionals who can proactively detect weaknesses, prevent data breaches, strengthen security controls, and support compliance with information security standards and regulatory requirements.

What is the cost/training fees for Certified Ethical Hacker (CEH) Certification in Columbia?

The training fees for Certified Ethical Hacker (CEH) Certification in Columbia starts from $6995

Which is the best training institute/provider of Certified Ethical Hacker (CEH) Certification in Columbia?

The Knowledge Academy is one of the Leading global training provider for Certified Ethical Hacker (CEH) Certification.

What are the best EC – Council Certification Training courses in Columbia?

Please see our EC – Council Certification Training courses available in Columbia

Show more blue-arrow

Customers Reviews

Request For Pricing

WHO WILL FUNDING THE COURSE?
+44

Corporate Training

Unlock tailored pricing and customised training solutions for your team’s needs.

Request your quote today!

Why choose The Knowledge Academy

price

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

learning

Many delivery methods

Flexible delivery methods are available depending on your learning style.

resources

High quality resources

Resources are included for a comprehensive learning experience.

Our Clients

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water
santander barclays bmw google thames-water deloitte bupa tesla
cross

Exclusive Deals Big Savings This March!

Grab up to 40% OFF and level up your skills this spring! march-madness

WHO WILL BE FUNDING THE COURSE?

close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.