Certified Ethical Hacker CEH

from EC Counci Renowned Ultimate Ethical Hacking Course


Duration : 5 Days (40hrs) / 9.00am-6.00pm

Course Summary

The Certified Ethical Hacker program (CEH Course Singapore) is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

The goal of this course (Certified Ethical Hacker CEH) is to help you master an ethical hacking methodology that can be used in at penetration testing or ethical hacking situation.

You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

What you will learn

At the end of the course,participants will be equipped with latest commercial-grade hacking tools, techniques and methodologies.

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking.
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls and Honeypots...etc

Why take Courses at iENABLER




The Certified Ethical Hacker program (CEH Course Singapore) is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization.

The goal of this course (Certified Ethical Hacker CEH) is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.


Course Information

Course Objective

Certified Ethical Hacker (CEH) Version 11

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.

CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.

In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

Non-Disclosure Agreement (NDA)
All participants must sign a NDA prior to commencement of this course certifying that you will refrain from using the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system and to indemnify EC-Council with respect to the use or misuse of the tools learn during the course.

Download Course Brochure

Course Fees & SkillsFuture Funding


Government Funding
Course is eligble for SDF Training Grant & Absentee Payroll from SSG. 
Self-Sponsored trainee may offset course fee payable using their SkillsFuture Credit Claim or/& PSEA (subject to available balance in trainee's account). 
Terms and conditions apply. 

SDF Course Title : Certified Ethical Hacker CEH (SF)
Course Ref No. : CRS-Q-0035225-ICT

WSQ Funding Course Fees
WSQ Funding
Singapore Citizens & Singapore PRs
Total Fee
Incl Regn Fee
Less
SDF Training
Grant
NETT
Fee
Excl GST 7%
NETT
Fee
Incl GST 7%
SME Company S$2,550.00S$2,000.00S$550.00S$728.50
Non-SME CompanyS$2,550.00S$600.00S$1,950.00S$2,128.50
Self-SponsoredS$2,550.00S$600.00S$1,950.00S$2,128.50*
 
Mid-Career Enhanced Scheme (MCES)
- Singaporean, 40 yrs & above
S$2,550.00S$2,000.00S$550.00S$728.50*
 
Note: * - SkillsFuture Credit Claims or/and PSEA may be used to offset the course fees.
Course Fees (Applicable to Non-SDF/Foreigner)
Course Title Normal Course Fees Promotional Course
Fees valid till
31-Dec-2099
Promo Course Fees w GST
Certified Ethical Hacker CEHS$2,500.00S$2,500.00S$2,675.00
Registration FeeS$50.00S$50.00S$53.50
Total FeeS$2,550.00S$2,550.00S$2,728.50


(Contact Customer Service @ 6333 4843)

Course Prerequisite

Before taking this course, you should have:
• Basic computer literacy & Basic PC operating system navigation skills
• Basic Internet usage skills & Basic networking knowledge


Course Outline

1.0 Introduction to Ethical Hacking

  • Information Security Overview
  • Cyber Kill Chain Concepts
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards

  • Download Course brochure

    2.0 Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • 3.0 Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Draw Network Diagrams
  • 4.0 Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • 5.0 Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Solutions and Tools
  • Vulnerability Assessment Reports
  • 6.0 System Hacking

  • System Hacking Concepts
  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
  • 7.0 Malware Threats

  • Malware Concepts
  • ATP Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Analysis
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • 8.0 Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Detection Techniques
  • 9.0 Social Engineering

  • Understanding SQL Server Agent Security
  • Configuring Credentials
  • Configuring Proxy Accounts
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identify Theft
  • Countermeasures
  • 10.0 Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • 11.0 Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • 12.0 Evading IDS, Firewalls and Honeypotss

  • IDS, IPS, Firewall and Honeypot Concepts
  • IDS, IPS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • 13.0 Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Countermeasures
  • Patch Management
  • Web Server Security Tools
  • 14.0 Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks and Web Shell
  • Web Application Security
  • 15.0 SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures
  • 16.0 Hacking Wireless Network

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • 17.0 Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • 18.0 IoT and OT Hacking

  • IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • OT Hacking
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • Countermeasures
  • 19.0 Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Treats
  • Cloud Hacking
  • Cloud Security
  • 20.0 Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

  • Course Schedule

    Course Title   Venue Register Online
    Course Mode
    Start Date
    End Date
    Time
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME6-Dec-202110-Dec-20219:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME24-Jan-202228-Jan-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME21-Mar-202225-Mar-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME30-May-20223-Jun-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME4-Jul-20228-Jul-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME26-Sep-202230-Sep-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterFULL-TIME28-Nov-20222-Dec-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterSAT4-Dec-202115-Jan-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterSAT5-Mar-20222-Apr-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterSAT21-May-202218-Jun-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterSAT20-Aug-202217-Sep-20229:00-6:00PM 
    Certified Ethical Hacker CEHSingaporeRegisterSAT19-Nov-202217-Dec-20229:00-6:00PM 

    IT Enabler Consultancy Pte Ltd

    Address: 35 Selegie Road #09-06
    Parklane Shopping Mall
    Singapore 188307

    customerservice@ienabler.com.sg

    +65 6333 4843

    +65 6333 4883

    Join Our Mailing Lists

    Stay In Touch