Certified Ethical Hacker (CEH) Program

Course Description:

Duration : 150 Hours

This in-depth, intensive 150-hour Certified Ethical Hacker (CEH) program aims to equip students with a thorough understanding of the principles, tools, techniques, and technologies involved in ethical hacking. It is designed to provide a broad perspective on cybersecurity, ensuring students have a strong foundation in core hacking skills, while also introducing the latest advances in the field. The program will cover topics ranging from network security, penetration testing, vulnerability assessment, system hacking, to cybersecurity laws and ethics. Students will be introduced to various hacker types, hacking stages, and different types of attacks, with hands-on learning experiences that simulate real-world scenarios. This practical approach will allow them to apply theoretical knowledge to manage, prevent, and mitigate cyber threats. Upon completion of the program, students will be prepared to take the CEH certification exam.

Interested? Learn more.

Download Flyer 

Applications opening soon

Student Learning Outcomes:

By the end of the program, students will be able to:

1. Understand and explain the fundamental principles and concepts behind ethical hacking, including the legal and ethical responsibilities.

2. Identify, analyze, and interpret various types of vulnerabilities present in network systems, applications, and infrastructures.

3. Demonstrate proficiency in using various ethical hacking tools and techniques for system and network security, vulnerability scanning, penetration testing, and intrusion detection and prevention.

4. Develop and implement effective strategies for securing information systems, with an understanding of various security protocols, encryption techniques, and firewall configurations.

5. Understand and mitigate various types of cyber threats and attacks, including phishing, denial of service (DoS), session hijacking, and SQL injection.

6. Demonstrate an understanding of the principles and practices of incident response, digital forensics, and disaster recovery.

7. Apply knowledge of cybersecurity laws and regulations to ensure compliance in all ethical hacking activities.

8. Communicate cybersecurity concepts, strategies, and findings effectively to technical and non-technical stakeholders.

9. Develop a cybersecurity mindset, fostering an environment of security awareness and proactive threat management.

10. Successfully prepare for and pass the Certified Ethical Hacker (CEH) exam.

Successful Completion of All the Modules is Necessary to Earn the CEH Credential:

Module 1:  0601 Ethical Hacking Essentials

LEARN MORE

Duration: 10 hours

Description: This foundational certificate serves as an introduction to the world of ethical hacking. Graduates will gain an understanding of the core concepts, renowned figures in hacking history, the significance of laws and regulations in cybersecurity, and the ethical mindset required to operate as a responsible hacker. 

Content:

  • Overview of Ethical Hacking, Hacker Types, Famous Hackers
  • Security Laws and Regula'ons
  • Ethical Hacking Mindset and Code of Ethics

Module 2:  0602 Network Security Specialist

LEARN MORE

Duration: 20 hours

Description:
Designed for those who want to delve deeper into the architecture of network systems and their vulnerabilities, this credential focuses on the fundamentals of networking and the necessary tools to secure it. Graduates will be proficient in handling network security controls, protocols, and devices, as well as firewall and intrusion detection system management.

Content:

  • Networking Fundamentals
  • Network Security Controls, Protocols, and Devices
  • Firewall and IDS Configuration and Management

Module 3: 0603 Threat Analyst Badge

LEARN MORE

Duration: 20 hours

Description:
This certification is tailored for individuals aiming to become adept at analyzing and understanding potential threats and vulnerabilities. Holders of this certificate will be proficient in assessing system vulnerabilities and using penetration testing as a means to discover and rectify potential security threats. 

Content:

  • Understanding Vulnerabilities, Threats, and Attacks
  • Vulnerability Assessment and Penetration Testing (VAPT)

Module 4: 0604 Ethical Hacking Toolkit Badge

LEARN MORE

Duration: 30 hours

Description:
For those looking to acquire a toolkit of hacking techniques and countermeasures, this credential delves deep into system hacking methodologies, password cracking, and malware detection and prevention.Graduates will have a robust set of skills to detect, prevent, and counter various hacking techniques. 

Content:

  • System Hacking, Password Cracking, and Countermeasures
  • Viruses, Worms, and Other Malware: Understanding, Detection, and Prevention

Module 5: 0605 Web Security Specialist Badge

LEARN MORE

Duration: 20 hours

Description:
This certificate is geared towards those who aspire to secure web servers and applications from potential threats. Graduates will be well-versed in addressing vulnerabilities in web servers and applications and countering prevalent threats like SQL injection and Cross-Site Scripting (XSS). 

Content:

  • Web Server and Web Application Vulnerabilities
  • SQL Injection and Cross-Site Scripting (XSS)

Module 6: 0606 Mobile and Wireless Security Badge

LEARN MORE

Duration: 15 hours

Description:
Aimed at individuals focused on the growing domain of wireless and mobile security, this certification offers a comprehensive overview of wireless networking and its associated vulnerabilities. Graduates will be adept at protecting mobile platforms and understanding wireless network security measures. 

Content:

  •  Wireless Networking and Security
  • Mobile Platform Vulnerabilities and Protection Strategies

Module 7: 0607 Data Protection and Cryptography

LEARN MORE

Duration: 10 hours

Description:
For those with an inclination towards safeguarding data, this certificate covers crucial topics in cryptography, encryption, and data protection strategies. Graduates will have the skills to prevent data leaks, implement data loss prevention strategies, and understand the intricacies of data recovery. 

Content:

  • Cryptography and Encryption
  • Data Leakage, Data Loss Prevention (DLP), and Data Recovery

Module 8: 0608 Cybersecurity Legal and Compliance

LEARN MORE

Duration: 10 hours

Description:
Designed for those with an interest in the legal and regulatory side of cybersecurity, this credential provides a deep dive into cybersecurity laws, regulations, and compliance measures. Graduates will be well-prepared to handle incident management, understand forensics, and ensure that cybersecurity activities align with established laws and regulations.

Content:

  • Cybersecurity Laws, Regulations, and Compliance
  • Incident Management and Forensics

Module 9: O609 IoT and Cloud Security Specialist

LEARN MORE

Duration: 15 hours

Description:
As the world gravitates towards IoT and cloud-based solutions, this certificate offers specialized training in securing these platforms. Holders of this certification will be proficient in addressing the unique security challenges posed by IoT devices and cloud computing environments. 

Content:

  •  IoT Security
  • Cloud Computing and Security

Module 10: 0610 Ethical Hacking Capstone and Exam Prep

LEARN MORE

Duration: 30 hours

Description:
Serving as a capstone to the series, this certificate is tailored for those preparing for the CEH exam. Graduates will be well-equipped with hands-on practical skills through simulated scenarios, ensuring they are prepared to tackle real-world challenges and succeed in the CEH certification exam. 

Content:

  • Practical Simulation Scenarios
  • Test Prep and Review for the CEH Exam

Note: Although the program is designed to be completed sequentially, students with prior knowledge or experience may enter any module, provided they possess the relevant prerequisite knowledge.

Assessment Method: The program uses continuous assessment via quizzes and assignments at the end of each module and a final project presentation.
Upon completion of this course, students will be prepared to take and pass the CEH (Certified Ethical Hacker) examination. This examination is administered by the EC-Council (International Council of E-Commerce Consultants), a well-known international certification body for information security professionals. Once the examination is successfully passed, students will receive the "Certified Ethical Hacker" certification from the EC-Council. This is a globally recognized certification that verifies the individual's competency in ethical hacking and network security. It is widely respected within the industry and can open numerous job opportunities in the cybersecurity field.

Please note that while this program is designed to thoroughly prepare students for the examination, passing the CEH examination and obtaining the certification also depends on the student's individual efforts and performance in the exam.

Website Design