• COURSE OVERIVEW

    • The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally.
    • It is the most desired information security certification Training and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.
    • CEH  Training continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.
    • The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: To beat a hacker, you need to think like a hacker.
    • The World’s Number 1 Ethical Hacking Certification.
    • A Structured Professional Course for Aspiring Cyber Professionals.
    • Work Anywhere With C|EH- It’s Globally Recognized.
    • Comprehensive Program to Master the 5 Phases of Ethical Hacking.
    • Hands-On Learning.

      Course Outline

    • Module 01: Introduction to Ethical Hacking
    • Module 02: Foot printing and Reconnaissance
    • Module 03: Scanning Networks
    • Module 04: Enumeration
    • Module 05: Vulnerability Analysis
    • Module 06: System Hacking
    • Module 07: Malware Threats
    • Module 08: Sniffing
    • Module 09: Social Engineering
    • Module 10: Denial-of-Service
    • Module 11: Session Hijacking
    • Module 12: Evading IDS, Firewalls, and Honeypots
    • Module 13: Hacking Web Servers
    • Module 14: Hacking Wireless Networks
    • Module15: SQL Injection
    • Module 16: Hacking Wireless Networks
    • Module 17: Hacking Mobile Platforms
    • Module 18: IoT and OT Hacking
    • Module 19: Cloud Computing
    • Module 20: Cryptography

What you will learn

  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.
  • Perform foot printing and reconnaissance using the latest foot printing techniques and tools as a critical pre-attack phase required in ethical hacking.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.
  • Social engineering techniques and how to identify theft attacks to audit humanlevel vulnerabilities and suggest social engineering countermeasures.
  • DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
  • Session hijacking techniques to discover network-level session management, authentication/authorization cryptographic weaknesses, and countermeasures.
  • Web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
  • Web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
  • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
  • Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
  • Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools.
  • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Threats to IoT and OT platforms and learn how to defend IoT and OT devices securely.
  • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.


SecureWay advises and supports businesses with a global service package designed to meet their IT security needs. SecureWay is a company specialized in cybersecurity and information security to offer a full range of services in the security field such as :
• Cybersecurity.
• Secure Infrastructure.
• Red Teaming Services (RTS).
• Governance, Risk & Compliance (GRC).
• Awareness & Training.

Our team members are extremely trained and experienced with past exposure in the corporate world as distinguished professionals.

Read More

Contact Us