Certified Ethical Hacker C|EH MASTER

PROVE YOUR ETHICAL HACKING SKILLS
(CEH + CEH Practical)


Duration : 5 Days (40hrs) / 9.00am-6.00pm

Course Summary

Certified Ethical Hacker C|EH Master is the next evolution of the world-renowned Certified Ethical Hacker program and a logical ‘next step’ for those holding this prestigious certification. C|EH is meant to be the foundation for anyone seeking to be an ethical hacker. The C|EH Practical Exam was developed to give ethical hackers the chance to prove their ethical hacking skills and abilities. Earning the C|EH Master designation is your way of saying, “I learned it, I know it, I proved it.”

To earn the C|EH Master designation, you must successfully demonstrate your knowledge of Ethical Hacking through two distinctly different proving grounds. First, you must attempt and successfully pass the ANSI Accredited Certified Ethical Hacker (C|EH) multiple choice exam. Once you complete this first step, you can move on to the second part of earning the Certified Ethical Hacker Master designation, the C|EH Practical Exam.

This course prepares you for EC-Council Certified Ethical Hacker C|EH exam (Exam code: 312-50 @ Pearson VUE Test Centres) and the C|EH Practical Exam.

What you will learn

At the end of the course,participants will be equipped with latest commercial-grade hacking tools, techniques and methodologies.

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls and Honeypots
  • Hacking Web Servers & Web Applications
  • SQL Injection
  • Hacking Wireless Networks & Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing and Crytography

Why take the C|EH MASTER (C|EH + C|EH Practical) at iENABLER




The Certified Ethical Hacker v12 program (CEH Course Singapore) is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

The goal of this course (Certified Ethical Hacker CEH v12) is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

 

C|EH® MASTER

Upon completing the C|EH® (Master) program, consisting of the C|EH® and C|EH® (Practical), the C|EH® (Master) designation is awarded. C|EH® Masters have shown proficiency at a master level in the knowledge, skills, and abilities of ethical hacking with a total of 6 hours of testing to prove their competency. The top 10 performers in both C|EH® and C|EH® Practical exams are featured on the C|EH® Master Global Ethical Hacking Leader Board.

                Knowledge Exam                  +                 Skills Exam

 

What Is C|EH Practical Exam?

This is the next step to becoming a C|EH® Master after you have achieved your C|EH® certification. Within the C|EH® Practical, you have limited time to complete 20 challenges to test your skills and proficiency in a performance-based cyber range. This exam is NOT a simulation and incorporates a live corporate network of VMs and applications with solutions to uncover vulnerabilities.


Course Information

Course Objective

Certified Ethical Hacker (CEH) Version 12

CEH v12 provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.

CEH v12 was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

In its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

Non-Disclosure Agreement (NDA)
All participants must sign a NDA prior to commencement of this course certifying that you will refrain from using the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system and to indemnify EC-Council with respect to the use or misuse of the tools learn during the course.

About the C|EH® Practical Exam
C|EH Practical Exam is a 6-hour, rigorous exam that requires you to demonstrate the application of ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, web app hacking, etc. to solve a security audit challenge.

The hands-on-exam will test you to your limits in unearthing vulnerabilities across major operating systems, databases and networks. You will be presented with various scenarios and will be asked to demonstrate the application of the knowledge acquired in the certified ethical hacker course to find solutions to real-life challenges.

Download Course Brochure

Course Fees & SkillsFuture Funding


Government Funding
Course is eligble for SkillsFuture Course Fee Funding & Absentee Payroll from SSG. 
Self-Sponsored trainee may offset course fee payable using their SkillsFuture Credit Claim or/& PSEA (subject to available balance in trainee's account). 
Terms and conditions apply. 

SkillsFuture Course Title : Certified Ethical Hacker CEH (SF)
Course Ref No. : TGS-2018503879

WSQ Funding Course Fees
WSQ Funding for
Singapore Citizens & Singapore PRs
Total Fee
Incl Regn Fee
Less
SkillsFuture
Course Fee Funding
NETT
Fee
Excl GST 9%
NETT
Fee
Incl GST 9%
SME Company S$2,300.00S$1,575.00S$725.00S$932.00
Non-SME CompanyS$2,300.00S$1,125.00S$1,175.00S$1,382.00
Self-SponsoredS$2,300.00S$1,125.00S$1,175.00S$1,382.00*
 
Mid-Career Enhanced Scheme (MCES)
- Singaporean, 40 yrs & above
S$2,300.00S$1,575.00S$725.00S$932.00*
 
Note: * - SkillsFuture Credit Claims or/and PSEA may be used to offset the course fees.
Course Fees (Applicable to Non-SkillsFuture Trainee/Foreigner)
Course Title Normal Course Fees Promotional Course
Fees valid till
31-Dec-2023
Promo Course Fees w
Certified Ethical Hacker CEH MasterS$2,500.00S$2,250.00S$2,452.50
Registration FeeS$50.00S$50.00S$54.50
Total FeeS$2,550.00S$2,300.00S$2,507.00

Normal Course Fee: S$2,500 (CEH + CEH Practical)
Promotional Course Fee: S$2300 inclusive of regn fee

Course fee includes:
- 1 CEH Exam Voucher (Exam Proctor fee of S$80 payable, subject to prevailing GST)
- 3 CEH Exam Retake Voucher (Exam Proctor fee of S$100 per retake is payable, subject to prevailing GST)

Course fee excludes CEH Practical Exam.
CEH Practical Exam fee @ S$450, subject to prevailing GST.

(Contact Customer Service @ 6333 4843)

Course Prerequisite

Before taking this course, you should have:
• Basic computer literacy & Basic PC operating system navigation skills
• Basic Internet usage skills & Basic networking knowledge


Course Outline

1.0 Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards

  • Download Course brochure

    2.0 Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • 3.0 Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
  • 4.0 Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • 5.0 Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • 6.0 System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
  • 7.0 Malware Threats

  • Malware Concepts
  • ATP Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Analysis
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software
  • 8.0 Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • 9.0 Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identify Theft
  • Social Engineering Countermeasures
  • 10.0 Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures
  • 11.0 Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • 12.0 Evading IDS, Firewalls and Honeypotss

  • IDS, IPS, Firewall and Honeypot Concepts
  • IDS, IPS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • 13.0 Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Web Server Attack Countermeasures
  • Patch Management
  • 14.0 Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks and Web Shell
  • Web Application Security
  • 15.0 SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • SQL Injection Countermeasures
  • 16.0 Hacking Wireless Network

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools
  • 17.0 Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • 18.0 IoT and OT Hacking

  • IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Countermeasures
  • OT Hacking
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Attacks Countermeasures
  • 19.0 Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Treats
  • Cloud Hacking
  • Cloud Security
  • 20.0 Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attacks Countermeasures

  • Course Schedule

    Course Title   Venue Register Online
    Course Mode
    Start Date
    End Date
    Time
    Certified Ethical Hacker CEH Master  

    IT Enabler Consultancy Pte Ltd

    Address: 12 Arumugam Road
    #04-02 LTC Building B
    Singapore 409958

    customerservice@ienabler.com.sg

    +65 6333 4843

    Join Our Mailing Lists

    Stay In Touch