Cyber Security Category Banner Image

EC-Council Certified Ethical Hacker Pro

  • Length 5 days
  • Version 12
  • Inclusions Exam voucher
Course overview
View dates &
book now

Why study this course

The C|EH® v12 certification is a comprehensive program that combines hands-on training, labs, assessment, a mock engagement (practice), and global hacking competitions to equip you with the essential knowledge and skills in ethical hacking. Stay on top of your game with the most in-demand skills required to succeed in the field of cyber security.

The C|EH v12 is a specialised and one-of-a-kind training program to teach you everything you need to know about ethical hacking with hands-on training, labs, assessment, a mock engagement (practice), and global hacking competition. Stay on top of the game with the most in-demand skills required to succeed in the field of cyber security.

The EC-Council Certified Ethical Hacker training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cyber security. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH continues to evolve to keep up with the latest OS, exploits, tools, and techniques.

You can sit sessions in person for the Certified Ethical Hacker course in Metro Manila. Visit our campus, which has state-of-the-art training facilities in BGC. If time or distance prevents you from coming to us, we can train your team on your premises or deliver state-of-the-art remote instructor-led training.

With over 220 hands-on labs conducted in our cyber range environment, you will have the opportunity to practice every learning objective on live machines and vulnerable targets in the course. Pre-loaded with over 3,500 hacking tools and various operating systems, you will gain unprecedented exposure and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems in the industry. Our range is web accessible, making it easier for you to learn and practice from anywhere.

In its 12th version, the Certified Ethical Hacker training in the Philippines provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

This CEH certification course includes:

  • CEHv12 Digital Kit (includes e-book with 24 months access + exam voucher)

  • CEHv11 CyberQ Lab (6 months unlimited access)

  • Next version e-book (update to any new versions during your 24 month access)

  • CEH Re-Exam Voucher x 3 (Up to 3 exam attempts)

  • CodeRed Ethical Hacking Videos x 5 (1 year access)

  • CEH Engage on CyberQ (1 year access)

See all details in the CEH v12 Brochure.

Exam vouchers
Note that exams are not taken while sitting an EC-Council course. You will be provided with an exam voucher. Candidates are required to book their exam after completion of the course, and are welcome to book a spot at their local Lumify Work campus. Your voucher will come with an expiry date. Please refer to the Lumify Work booking terms and conditions regarding exam voucher validity.

Please note: There are strict conditions applied to attendance at this course. Prior to the course, or on the first day, students are required to sign an agreement form. Further details and a copy of the form will be provided in your pre-course information or with your courseware in MyDDLS.

Request Course Information


What you’ll learn

Attendees will learn:

  • Key issues include plaguing the information security world, ethical hacking, information security controls, laws, and standards.

  • Perform footprinting and reconnaissance using the latest footprinting techniques and tools as a critical pre-attack phase required in ethical hacking.

  • Network scanning techniques and scanning countermeasures.

  • Enumeration techniques and enumeration countermeasures.

  • Vulnerability analysis to identify security loopholes in the target organisation’s network, communication infrastructure, and end systems.

  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.

  • Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.

  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.

  • Social engineering techniques and how to identify theft attacks to audit human level vulnerabilities and suggest social engineering countermeasures.

  • DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorisation, cryptographic weaknesses, and countermeasures.

  • Web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.

  • Web application attacks and comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.

  • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.

  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

  • Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.

  • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.

  • Cloud computing concepts (Container technology, serverless computing), various threats/attacks, and security techniques and tools.

  • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.

  • Threats to IoT and OT platforms and learn how to defend IoT and OT devices securely.

  • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.


EC-Council ATC Shield Logo

EC-Council at Lumify Work

The International Council of E-Commerce Consultants (EC-Council) is a member-based organisation that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), EC-Council Certified Security Analyst (ECSA) and Licensed Penetration Tester (LPT) certifications and cyber security courses. Lumify Work is the partner of choice for EC-Council in Australia.


Who is the course for?

This security training course will significantly benefit security professionals like:

  • Information Security Analyst/Administrator

  • Information Assurance (IA) Security Officer

  • Information Security Manager/Specialist

  • Information Systems Security Engineer/Manager

  • Information Security Professionals/Officers

  • Information Security Auditors

  • Risk/Threat/Vulnerability Analyst

  • System Administrators

  • Network Administrators and Engineers

  • Anyone who is concerned about the integrity of the network infrastructure


Course subjects

  • Introduction to Ethical Hacking

  • Footprinting and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT and OT Hacking

  • Cloud Computing

  • Cryptography


Prerequisites

  • Networking experience

  • Some Linux experience is beneficial as Linux command line will be covered in the course

  • Windows Server Experience

  • TCP/UDP/IP experience

  • Experience with virtual machines

The age requirement for attending the training or attempting the CEH exam is restricted to any candidate who is at least 18 years old. If the candidate is under the age of 18, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training centre / EC-Council a written consent of their parent / legal guardian and a supporting letter from their institution of higher learning. Only applicants from nationally accredited institutions of higher learning shall be considered.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Personalise your schedule with Lumify USchedule

Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.



Offers

Continue your learning experience online with Lumify Plus
Lumify Plus (formerly DDLS Plus) is your online learning pathway to extend knowledge beyond courses. Get resources to help you practice what you learned and prepare for future courses, exams and certifications.
Cyber Analyst and Incident Professional Bundle
This bundle combines two highly recognised certifications: CompTIA Cybersecurity Analyst+ (CySA+) and EC-Council Certified Incident Handler (ECIH). Professionals will be provided with instructor-led training and exam vouchers for both courses.