Certified Ethical Hacker CEH

from EC Counci Renowned Ultimate Ethical Hacking Course
(Version 12)


Duration : 5 Days (40hrs) / 9.00am-6.00pm

Course Summary

The Certified Ethical Hacker v12 program (CEH Course Singapore) is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

The goal of this course (Certified Ethical Hacker CEH v12) is to help you master an ethical hacking methodology that can be used in at penetration testing or ethical hacking situation.

You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 (Pearson VUE Test Centres)

What you will learn

At the end of the course,participants will be equipped with latest commercial-grade hacking tools, techniques and methodologies.

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls and Honeypots
  • Hacking Web Servers & Web Applications
  • SQL Injection
  • Hacking Wireless Networks & Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing and Crytography

Why take Courses at iENABLER




The Certified Ethical Hacker v12 program (CEH Course Singapore) is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

The goal of this course (Certified Ethical Hacker CEH v12) is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.


Course Information

Course Objective

Certified Ethical Hacker (CEH) Version 12

CEH v12 provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.

CEH v12 was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

In its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

Non-Disclosure Agreement (NDA)
All participants must sign a NDA prior to commencement of this course certifying that you will refrain from using the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system and to indemnify EC-Council with respect to the use or misuse of the tools learn during the course.

Download Course Brochure

Course Fees & SkillsFuture Funding


Government Funding
Course is eligble for SkillsFuture Course Fee Funding & Absentee Payroll from SSG. 
Self-Sponsored trainee may offset course fee payable using their SkillsFuture Credit Claim or/& PSEA (subject to available balance in trainee's account). 
Terms and conditions apply. 

SkillsFuture Course Title : Certified Ethical Hacker CEH (SF)
Course Ref No. : TGS-2018503879

WSQ Funding Course Fees
WSQ Funding for
Singapore Citizens & Singapore PRs
Total Fee
Incl Regn Fee
Less
SkillsFuture
Course Fee Funding
NETT
Fee
Excl GST 8%
NETT
Fee
Incl GST 8%
SME Company S$2,550.00S$1,750.00S$800.00S$1,004.00
Non-SME CompanyS$2,550.00S$1,250.00S$1,300.00S$1,504.00
Self-SponsoredS$2,550.00S$1,250.00S$1,300.00S$1,504.00*
 
Mid-Career Enhanced Scheme (MCES)
- Singaporean, 40 yrs & above
S$2,550.00S$1,750.00S$800.00S$1,004.00*
 
Note: * - SkillsFuture Credit Claims or/and PSEA may be used to offset the course fees.
Course Fees (Applicable to Non-SkillsFuture Trainee/Foreigner)
Course Title Normal Course Fees Promotional Course
Fees valid till
31-Dec-2099
Promo Course Fees w GST
Certified Ethical Hacker CEHS$2,500.00S$2,500.00S$2,700.00
Registration FeeS$50.00S$50.00S$54.00
Total FeeS$2,550.00S$2,550.00S$2,754.00


(Contact Customer Service @ 6333 4843)

Course Prerequisite

Before taking this course, you should have:
• Basic computer literacy & Basic PC operating system navigation skills
• Basic Internet usage skills & Basic networking knowledge


Course Outline

1.0 Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards

  • Download Course brochure

    2.0 Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • 3.0 Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
  • 4.0 Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • 5.0 Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • 6.0 System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
  • 7.0 Malware Threats

  • Malware Concepts
  • ATP Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Analysis
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software
  • 8.0 Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • 9.0 Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identify Theft
  • Social Engineering Countermeasures
  • 10.0 Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures
  • 11.0 Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
  • 12.0 Evading IDS, Firewalls and Honeypotss

  • IDS, IPS, Firewall and Honeypot Concepts
  • IDS, IPS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • 13.0 Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Web Server Attack Countermeasures
  • Patch Management
  • 14.0 Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks and Web Shell
  • Web Application Security
  • 15.0 SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • SQL Injection Countermeasures
  • 16.0 Hacking Wireless Network

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools
  • 17.0 Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • 18.0 IoT and OT Hacking

  • IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Countermeasures
  • OT Hacking
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Attacks Countermeasures
  • 19.0 Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Treats
  • Cloud Hacking
  • Cloud Security
  • 20.0 Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attacks Countermeasures

  • Course Schedule

    Course Title   Venue Register Online
    Course Mode
    Start Date
    End Date
    Time
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME19-Jun-202323-Jun-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME24-Jul-202328-Jul-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME28-Aug-20231-Sep-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME18-Sep-202322-Sep-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME16-Oct-202320-Oct-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME27-Nov-20231-Dec-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME18-Dec-202322-Dec-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterSAT2-Sep-202330-Sep-20239:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterSAT18-Nov-202316-Dec-20239:00-6:00PM 

    IT Enabler Consultancy Pte Ltd

    Address: 12 Arumugam Road
    #04-02 LTC Building B
    Singapore 409958

    customerservice@ienabler.com.sg

    +65 6333 4843

    Join Our Mailing Lists

    Stay In Touch