Course Objective

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The purpose of the CEH credential is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

About the Exam

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)

About the Program

Our security experts have designed over 140 labs that mimic real-time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5-day hands-on class by our Certified EC-Council Instructor.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Target Audience

Ethical hackers, System Administrators, Network Administrators and Engineers, Web managers, Auditors, Security Professionals in general.

What will you learn?

  1. Key issues plaguing the information security world, incident management process, and penetration testing.
  2. Various types of footprinting, footprinting tools, and countermeasures.
  3. Network scanning techniques and scanning countermeasures.
  4. Enumeration techniques and enumeration countermeasures.
  5. System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  6. Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  7. Working of viruses, virus analysis, computer worms, malware analysis procedures, and countermeasures.
  8. Packet sniffing techniques and how to defend against sniffing.
  9. Social Engineering techniques, identify theft, and social engineering countermeasures.
  10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  11. Session hijacking techniques and countermeasures.
  12. Different types of webserver attacks, attack methodology, and countermeasures.
  13. Different types of web application attacks, web application hacking methodology, and countermeasures.
  14. SQL injection attacks and injection detection tools. 15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  15. The mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  16. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  17. Various cloud computing concepts, threats, attacks, and security techniques and tools.
  18. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  19. Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  20. Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  21. Different threats to IoT platforms and learn how to defend IoT devices securely.


  • Overview of Current Security Trends
  • Understanding Elements of Information Security
  • Understanding Information Security Threats and Attack Vectors
  • Overview of hacking concepts, types, and phases
  • Understanding ethical hacking concepts and scope
  • Overview of information security management and defense-in-depth
  • Overview of policies, procedures, and awareness
  • Overview of physical security and controls
  • Understanding incidence management process
  • Overview of vulnerability assessment and penetration testing
  • Overview of information security acts and laws


  • Understanding footprinting concepts
  • Footprinting through search engines
  • Footprint using advance google hacking techniques
  • Footprint through social networking sites
  • Understanding different techniques for website footprinting
  • Understanding different techniques for email footprinting
  • Understanding different techniques of competitive intelligence
  • Understanding different techniques for WHO IS footprinting
  • Understanding different techniques for network footprinting
  • Understanding different techniques of footprinting through social engineering
  • Footprinting tools
  • Footprinting countermeasures
  • Overview of footprinting Pen Testing


  • Overview of networking scanning
  • Understanding different techniques to check for Live Systems
  • Understanding different techniques to check for Open Ports
  • Understanding various scanning techniques
  • Understanding various IDS Evasion Techniques
  • Understanding banner grabbing
  • Overview of Vulnerability scanning
  • Drawing network diagrams
  • Using Proxies and Anonymizer for attack
  • Understanding IP Spoofing and various detection techniques
  • Overview of scanning and Pen Testing


  • Understanding Enumeration Concepts
  • Understanding different techniques for NetBIOS Enumeration
  • Understanding different techniques for SNMP enumeration
  • Understanding different techniques for LDAP enumeration
  • Understanding different techniques for NTP enumeration
  • Understanding different techniques for SMTP and DNS enumeration countermeasures
  • Overview of enumeration pen testing


  • The vulnerability of the management life cycle
  • Understanding various approaches to vulnerability analysis
  • Tools used to perform the vulnerability assessments
  • Vulnerability analysis tools and techniques


  • Overview of CEH Hacking Methodology
  • Understanding different techniques to gain access to the system
  • Understanding privilege escalation techniques
  • Understanding different techniques to create and maintain remote access to the system
  • Overview of different types of Rootkits
  • Overview of Steganography and Steganalysis
  • Understanding techniques to hide the evidence of compromise
  • Overview of system hacking penetration testing


  • Introduction to malware and malware propagation techniques
  • Overview of Trojans, their types, and how to infect systems
  • Overview of viruses, their types, and how they infect files
  • Introduction to the computer worm
  • Understanding the Malware Analysis Process
  • Understanding different techniques to detect malware
  • Malware countermeasures
  • Overview of Malware penetration testing


  • Overview of sniffing concepts
  • Understanding MAC attacks
  • Understanding DHCP attacks
  • Understanding ARP Poisoning
  • Understanding MAC Spoofing attacks
  • Understanding DNS poisoning
  • Sniffing tools
  • Sniffing countermeasures
  • Understanding various techniques to detect sniffing
  • Overview of sniffing Pen Testing


  • Overview of social engineering
  • Understanding various social engineering techniques
  • Understanding insider threats
  • Understanding impersonation on social networking sites
  • Understanding identity theft
  • Social engineering countermeasures
  • Identify theft countermeasures
  • Overview of Social Engineering Pen Testing


  • Overview of Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
  • Overview of different DoS/DDoS) attack techniques
  • Understanding the botnet network
  • Understanding various DoS and DDoS Attack Tools
  • DoS/DDoS Countermeasures
  • Overview of DoS Attack Penetration Testing


  • Understanding session hijacking concepts
  • Understanding application-level session hijacking
  • Understanding network-level session hijacking
  • Session hijacking tools
  • Session hijacking countermeasures
  • Overview of session hijacking penetration testing


  • Understanding IDS, Firewall, and honeypot concepts
  • IDS, Firewall and honeypot solutions
  • Understanding different techniques to bypass IDS
  • Understanding different techniques to bypass firewalls
  • IDS/Firewall evading tools
  • Understanding different techniques to detect honeypots
  • IDS/Firewall evasion countermeasures
  • Overview of IDS and firewall Penetration Testing


  • Understanding webserver concepts
  • Understanding webserver attacks
  • The understanding webserver attack methodology
  • Webserver attack tools
  • Countermeasures against webserver attacks
  • Overview of Patch Management
  • Webserver security tools
  • Overview of Web server penetration testing


  • Understanding web application concepts
  • Understanding web application threats
  • Understanding web application hacking methodology
  • Web application hacking tools
  • Understanding web application countermeasures
  • Web application security tools
  • Overview of web application penetration testing


  • Understanding SQL injection concepts
  • Understanding various types of SQL injection attacks
  • Understanding SQL injection methodology
  • SQL injection tools
  • Understanding different IDS evasion techniques
  • SQL injection countermeasures
  • SQL injection detection tools


  • Understanding wireless concepts
  • Understanding wireless encryption algorithms
  • Understanding wireless threats
  • Understanding wireless hacking methodology
  • Wireless hacking tools
  • Understanding Bluetooth hacking techniques
  • Understanding wireless hacking countermeasures
  • Wireless security tools
  • Overview of wireless penetration testing


  • Understanding mobile attack platform vectors
  • Understanding various android threat and attacks
  • Understanding various iOS threats and attacks
  • Understanding various Windows Phone OS threats and attacks
  • Understanding various blackberry threats and attacks
  • Understanding mobile device management (MDM)
  • Mobile Security Guidelines and security tools
  • Overview of Mobile Penetration Testing


  • Understanding IoT concepts
  • Cryptography tools
  • Understanding various IoT threats and attacks
  • Understanding IoT Hacking
  • Understanding IoT attacks
  • IoT security Tools


  • Understanding Cloud Computing Concepts
  • Understanding Cloud Computing Threats
  • Understanding Cloud Computing Attacks
  • Understanding Cloud Computing Security
  • Cloud computing Security tools
  • Overview of Cloud Penetration testing


  • Understanding Cryptography concepts
  • Overview of encryption algorithms
  • Cryptography tools
  • Understanding Public Key Infrastructure (PKI)
  • Understanding email encryption
  • Understanding disk encryption
  • Understanding Cryptography attacks
  • Cryptanalysis Tools

Student feedback

  • Stars 5
  • %84
  • Stars 4
  • %9
  • Stars 3
  • %3
  • Stars 2
  • %1
  • Stars 1
  • %2


Course Rating

Related Courses

The CISA training is specifically designed to provide CISA candidates with the effective skills necessary to develop, manage, and supervise programs to defend against unauthorized admittance to information.

Certified Information Systems Auditor (CISA)

This NEW CCNA: Routing and Switching course is all you need to prepare & pass Cisco's new CCNA 200-301 certification exam.

Cisco Certified Network Associate (CCNA): Routing and Switching
Discount Price
Regular Price: ৳15000.00
Enroll Now

    Course Features

  • Lectures 13
  • Quizzes 5
  • Duration 40
  • Skill level Intermediate
  • Language Bengali/ English
  • Assessments 5