Certified Ethical Hacker (CEH) V12: Your Pathway to CEH Training For Certification
Master essential ethical hacking skills to identify vulnerabilities, assess security, and advance your cybersecurity career with practical training for security professionals.
If you’re tasked with identifying vulnerabilities before malicious actors do, mastering CEH skills is essential. Whether you’re conducting penetration tests, assessing network security, or evaluating web applications, this training provides the practical knowledge needed to act as a responsible ethical hacker. Completing this course equips you with the techniques and tools to find security gaps and strengthen defenses effectively.
This comprehensive CEH course covers all critical aspects of ethical hacking, aligned with the latest CEH 12 exam objectives. You’ll explore attack methodologies, defensive strategies, and the latest hacking techniques used by cybercriminals. With hands-on activities and real-world scenarios, you’ll learn how to simulate attacks ethically, analyze vulnerabilities, and implement countermeasures. This training prepares you for the EC-Council CEH certification exam, a recognized credential that validates your skills in cybersecurity.
What sets this training apart is its focus on practical application. You won’t just learn theory; you’ll use industry-standard tools like Nmap, Wireshark, Metasploit, and more. You’ll also explore emerging areas such as IoT and cloud security, making your skills relevant across diverse environments. Our approach ensures you gain real-world experience that directly translates to workplace success.
What You Will Learn
By completing this CEH v12 course, you will develop the ability to assess and improve security postures across various systems. You will learn how to identify vulnerabilities, exploit weaknesses ethically, and recommend effective mitigation strategies. Here are some specific skills you will gain:
- Understand core concepts of ethical hacking and cybersecurity principles to establish a security-minded approach.
- Perform footprinting and reconnaissance to gather intelligence on target systems using advanced tools and techniques.
- Conduct network scanning to identify active devices and uncover open ports and services.
- Analyze systems for vulnerabilities using industry-standard scanning and enumeration tools.
- Execute system hacking techniques to test security controls on operating systems and applications.
- Identify malware threats and implement strategies to detect, prevent, and remove malicious software.
- Apply social engineering tactics ethically to evaluate human factors in security defenses.
- Simulate Denial-of-Service (DoS) attacks and session hijacking to assess system resilience.
- Develop skills to evade detection by IDS, firewalls, and honeypots during security assessments.
- Hack web servers and applications, including SQL injection and cross-site scripting (XSS), to identify vulnerabilities.
- Secure wireless networks and mobile platforms through penetration testing techniques.
- Explore the security challenges associated with IoT and OT environments and how to assess them ethically.
- Examine cloud security practices and learn cryptographic techniques to protect data in cloud environments.
Who This Course Is For
This course is ideal for IT professionals seeking to advance in cybersecurity roles, including security analysts, network administrators, and penetration testers. It suits individuals aiming to become certified ethical hackers or cybersecurity consultants. Whether you’re just starting out or have years of experience, this training provides practical skills to strengthen your security expertise. Prerequisites include basic knowledge of networking and operating systems, but no prior ethical hacking experience is required.
Why These Skills Matter
Developing strong CEH skills makes you a valuable asset in any organization’s security team. The CEH certification, governed by EC-Council, is recognized worldwide and demonstrates your ability to identify vulnerabilities ethically. This credential can open doors to higher-paying roles such as penetration tester, security analyst, or cybersecurity consultant. Employers actively seek professionals who can proactively defend against threats, and certified ethical hackers are in high demand across industries.
Beyond certification, mastering these skills enhances your practical understanding of cybersecurity. You’ll be equipped to perform security assessments, advise on risk mitigation, and implement effective controls. As cyber threats continue to grow in sophistication, your ability to think like an attacker—legally and ethically—gives you a clear competitive edge. This knowledge supports your career growth, increases your earning potential, and positions you as a key defender in your organization’s security strategy.
Module 1 – Introduction To Ethical Hacking
- 1.0 Introduction to CEH v12
- 1.1 Elements of Security
- 1.2 Cyber Kill Chain
- 1.3 MITRE ATT&CK Framework
- 1.3.1 Activity – Researching the MITRE ATTACK Framework
- 1.4 Hacking
- 1.5 Ethical Hacking
- 1.6 Information Assurance
- 1.7 Risk Management
- 1.8 Incident Management
- 1.9 Information Security Laws and Standards
- 1.10 Introduction to Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
- 2.1 Footprinting Concepts
- 2.2 OSINT Tools
- 2.2.1 Activity – Conduct OSINT with OSR Framework
- 2.2.2 Activity – OSINT with theHarvester
- 2.2.3 Activity – Add API Keys to theHarvester
- 2.2.4 Activity – Extract Document Metadata with FOCA
- 2.2.5 Activity – Extract Document Metadata with FOCA
- 2.3 Advanced Google Search
- 2.3.1 Activity – Google Hacking
- 2.4 Whois Footprinting
- 2.4.1 Activity – Conducting Whois Research
- 2.5 DNS Footprinting
- 2.5.1 Activity – Query DNS with NSLOOKUP
- 2.6 Website Footprinting
- 2.6.1 Activity – Fingerprint a Webserver with ID Serve
- 2.6.2 Activity – Extract Data from Websites
- 2.6.3 Activity – Mirror a Website with HTTrack
- 2.7 Email Footprinting
- 2.7.1 Activity – Trace a Suspicious Email
- 2.8 Network Footprinting
- 2.9 Social Network Footprinting
- 2.10 Footprinting and Reconnaissance Countermeasures
- 2.11 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
- 3.1 Scanning Concepts
- 3.2 Discovery Scans
- 3.2.1 Activity – ICMP ECHO and ARP Pings
- 3.2.2 Activity – Host Discovery with Angry IP Scanner
- 3.3 Port Scans
- 3.3.1 Activity – Port Scan with Angry IP Scanner
- 3.4 Other Scan Types
- 3.5 Scanning Tools
- 3.5.1 Activity – Hping3 Packet Crafting
- 3.5.2 Activity – Fingerprinting with Zenmap
- 3.6 NMAP
- 3.6.1 Activity – Nmap Basic Scans
- 3.6.2 Activity – Host Discovery with Nmap
- 3.6.3 – Activity – Nmap Version Detection
- 3.6.4 Activity – Nmap Idle (Zombie) Scan
- 3.6.5 Activity – Nmap FTP Bounce Scan
- 3.6.6 – Activity – NMAP Scripts
- 3.7 Firewall and IDS Evasion
- 3.7.1 Activity – Nmap Advanced Scans
- 3.8 Proxies
- 3.9 Scanning Countermeasures
- 3.10 Scanning Networks Review
Module 4: Enumeration
- 4.1 Enumeration Overview
- 4.2 SMB_NetBIOS_Enumeration
- 4.2.1 Activity – Enumerate NetBIOS Information with Hyena
- 4.3 File Transfer Enumeration
- 4.4 WMI Enumeration
- 4.4.1 – Activity – Enumerating WMI with Hyena
- 4.5 SNMP Enumeration
- 4.5.1 Activity – Enumerate WMI, SNMP and Other Information Using SoftPerfect
- 4.6 LDAP Enumeration
- 4.7 DNS Enumeration
- 4.8 SMTP Enumeration
- 4.8.1 Activity – Enumerate Email Users with SMTP
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration
- 4.10.1 Activity – Enumerate a Website with DirBuster
- 4.11 Other Enumeration Types
- 4.12 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
- 5.1 Vulnerability Scanning
- 5.1.1 Vulnerability Scanning with OpenVAS
- 5.2 Vulnerability Assessment
- 5.3 Vulnerability Analysis Review
Module 6: System Hacking
- 6.1 System Hacking Concepts
- 6.2 Common OS Exploits
- 6.3 Buffer Overflows
- 6.3.1 Activity – Performing a Buffer Overflow
- 6.4 System Hacking Tools and Frameworks
- 6.4.1 Activity – Hack a Linux Target from Start to Finish
- 6.5 Metasploit
- 6.5.1 Activity – Get Started with Metasploit
- 6.6 Meterpreter
- 6.7 Keylogging and Spyware
- 6.7.1 Activity – Keylogging with Meterpreter
- 6.8 Netcat
- 6.8.1 Activity – Using Netcat
- 6.9 Hacking Windows
- 6.9.1 Activity – Hacking Windows with Eternal Blue
- 6.10 Hacking Linux
- 6.11 Password Attacks
- 6.11.1 Activity – Pass the Hash
- 6.11.2 Activity – Password Spraying
- 6.12 Password Cracking Tools
- 6.13 Windows Password Cracking
- 6.13.1 Activity – Cracking Windows Passwords
- 6.13.2 Activity – Cracking Password Hashes with Hashcat
- 6.14 Linux Password Cracking
- 6.15 Other Methods for Obtaining Passwords
- 6.16 Network Service Attacks
- 6.16.1 Activity – Brute Forcing a Network Service with Medusa
- 6.17 Post Exploitation
- 6.18 Pivoting
- 6.18.1 & 6.18.2 Activity – Pivoting Setup and Attack
- 6.19 Maintaining Access
- 6.19.1 Activity – Persistence
- 6.20 Hiding Data
- 6.20.1 Activity – Hiding Data Using Least Significant Bit Steganography
- 6.21 Covering Tracks
- 6.21.1 Activity – Clearing Tracks in Windows
- 6.21.2 Activity – View and Clear Audit Policies with Auditpol
- 6.22 System Hacking Countermeasures
- 6.23 System Hacking Review
Module 7: Malware Threats
- 7.1 Malware Overview
- 7.2 Viruses
- 7.3 Trojans
- 7.3.1 Activity – Deploying a RAT
- 7.4 Rootkits
- 7.5 Other Malware
- 7.6 Advanced Persistent Threat
- 7.7 Malware Makers
- 7.7.1 Activity – Creating a Malware Dropper and Handler
- 7.8 Malware Detection
- 7.9 Malware Analysis
- 7.9.1 Activity – Performing a Static Code Review
- 7.9.2 Activity – Analyzing the SolarWinds Orion Hack
- 7.10 Malware Countermeasures
- 7.11 Malware Threats Review
Module 8: Sniffing
- 8.1 Network Sniffing
- 8.2 Sniffing Tools
- 8.2.1 Activity- Sniffing HTTP with Wireshark
- 8.2.2 Activity – Capturing Files from SMB
- 8.3 ARP and MAC Attacks
- 8.3.1 Activity – Performing an MITM Attack with Ettercap
- 8.4 Name Resolution Attacks
- 8.4.1 Activity – Spoofing Responses with Responder
- 8.5 Other Layer 2 Attacks
- 8.6 Sniffing Countermeasures
- 8.7 Sniffing Review
Module 9: Social Engineering
- 9.1 Social Engineering Concepts
- 9.2 Social Engineering Techniques
- 9.2.1 Activity – Deploying a Baited USB Stick
- 9.2.2 Activity – Using an O.MG Lightning Cable
- 9.3 Social Engineering Tools
- 9.3.1 Activity – Phishing for Credentials
- 9.4 Social Media, Identity Theft, Insider Threats
- 9.5 Social Engineering Countermeasures
- 9.6 Social Engineering Review
Module 10: Denial-of-Service
- 10.1 DoS-DDoS Concepts
- 10.2 Volumetric Attacks
- 10.3 Fragmentation Attacks
- 10.4 State Exhaustion Attacks
- 10.5 Application Layer Attacks
- 10.5.1 Activity – Performing a LOIC Attack
- 10.5.2 Activity – Performing a HOIC Attack
- 10.5.3 Activity – Conducting a Slowloris Attack
- 10.6 Other Attacks
- 10.7 DoS Tools
- 10.8 DoS Countermeasures
- 10.9 DoS Review
Module 11: Session Hijacking
- 11.1 Session Hijacking
- 11.2 Compromising a Session Token
- 11.3 XSS
- 11.4 CSRF
- 11.5 Other Web Hijacking Attacks
- 11.6 Network-Level Session Hijacking
- 11.6.1 Activity – Hijack a Telnet Session
- 11.7 Session Hijacking Tools
- 11.8 Session Hijacking Countermeasures
- 11.9 Session Hijacking Review
Module 12: Evading IDS, Firewalls, and Honeypots
- 12.1 Types of IDS
- 12.2 Snort
- 12.3 System Logs
- 12.4 IDS Considerations
- 12.5 IDS Evasion
- 12.5.1 Activity – Fly Below IDS Radar
- 12.6 Firewalls
- 12.7 Packet Filtering Rules
- 12.8 Firewall Deployments
- 12.9 Split DNS
- 12.10 Firewall Product Types
- 12.11 Firewall Evasion
- 12.11.1 Activity – Use Social Engineering to Bypass a Windows Firewall
- 12.11.2 Activity – Busting the DOM for WAF Evasion
- 12.12 Honeypots
- 12.13 Honeypot Detection and Evasion
- 12.13.1 Activity – Test and Analyze a Honey Pot
- 12.14 Evading IDS, Firewalls, and Honeypots Review
Module 13: Hacking Web Servers
- 13.1 Web Server Operations
- 13.2 Hacking Web Servers
- 13.3 Common Web Server Attacks
- 13.3.1 Activity – Defacing a Website
- 13.4 Web Server Attack Tools
- 13.5 Hacking Web Servers Countermeasures
- 13.6 Hacking Web Servers Review
Module 14: Hacking Web Applications
- 14.1 Web Application Concepts
- 14.2 Attacking Web Apps
- 14.3 A01 Broken Access Control
- 14.4 A02 Cryptographic Failures
- 14.5 A03 Injection
- 14.5.1 Activity – Command Injection
- 14.6 A04 Insecure Design
- 14.7 A05 Security Misconfiguration
- 14.8 A06 Vulnerable and Outdated Components
- 14.9 A07 Identification and Authentication Failures
- 14.10 A08 Software and Data integrity Failures
- 14.11 A09 Security Logging and Monitoring Failures
- 14.12 A10 Server-Side Request Forgery
- 14.13 XSS Attacks
- 14.13.1 Activity – XSS Walkthrough
- 14.13.2 Activity – Inject a Malicious iFrame with XXS
- 14.14 CSRF
- 14.15 Parameter Tampering
- 14.15.1 Activity – Parameter Tampering with Burp
- 14.16 Clickjacking
- 14.17 SQL Injection
- 14.18 Insecure Deserialization Attacks
- 14.19 IDOR
- 14.19.1 Activity – Hacking with IDOR
- 14.20 Directory Traversal
- 14.21 Session Management Attacks
- 14.22 Response Splitting
- 14.23 Overflow Attacks
- 14.24 XXE Attacks
- 14.25 Web App DoS
- 14.26 Soap Attacks
- 14.27 AJAX Attacks
- 14.28 Web API Hacking
- 14.29 Webhooks and Web Shells
- 14.30 Web App Hacking Tools
- 14.31 Hacking Web Applications Countermeasures
- 14.32 Hacking Web Applications Review
Module 15: SQL Injection
- 15.1 SQL Injection Overview
- 15.2 Basic SQL Injection
- 15.3 Finding Vulnerable Websites
- 15.4 Error-based SQL Injection
- 15.5 Union SQL Injection
- 15.5.1 Activity – Testing SQLi on a Live Website – Part 1
- 15.5.2 Activity – Testing SQLi on a Live Website – Part 2
- 15.6 Blind SQL Injection
- 15.7 SQL Injection Tools
- 15.7.1 Activity – SQL Injection Using SQLmap
- 15.8 Evading Detection
- 15.9 Analyzing SQL Injection
- 15.10 SQL Injection Countermeasures
- 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
- 16.1 Wireless Concepts
- 16.2 Wireless Security Standards
- 16.3 WI-FI Discovery Tools
- 16.4 Common Wi-Fi Attacks
- 16.5 Wi-Fi Password Cracking
- 16.6 WEP Cracking
- 16.6.1 Activity – Cracking WEP
- 16.7 WPA,WPA2,WPA3 Cracking
- 16.7.1 Activity – WPA KRACK Attack
- 16.8 WPS Cracking
- 16.9 Bluetooth Hacking
- 16.10 Other Wireless Hacking
- 16.10.1 Activity – Cloning an RFID badge
- 16.10.2 Activity – Hacking with a Flipper Zero
- 16.11 Wireless Security Tools
- 16.12 Wireless Hacking Countermeasures
- 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
- 17.1 Mobile Device Overview
- 17.2 Mobile Device Attacks
- 17.3 Android Vulnerabilities
- 17.4 Rooting Android
- 17.5 Android Exploits
- 17.5.1 Activity – Hacking Android
- 17.5.2 Activity – Using a Mobile Device in a DDoS Campaign
- 17.6 Android-based Hacking Tools
- 17.7 Reverse Engineering an Android App
- 17.8 Securing Android
- 17.9 iOS Overview
- 17.10 Jailbreaking iOS
- 17.11 iOS Exploits
- 17.12 iOS-based Hacking Tools
- 17.13 Reverse Engineering an iOS App
- 17.14 Securing iOS
- 17.15 Mobile Device Management
- 17.16 Hacking Mobile Platforms Countermeasures
- 17.17 Hacking Mobile Platforms Review
Module 18: IoT AND OT Hacking
- 18.1 IoT Overview
- 18.2 IoT Infrastructure
- 18.3 IoT Vulnerabilities and Threats
- 18.3.1 Activity – Searching for Vulnerable IoT Devices
- 18.4 IoT Hacking Methodology and Tools
- 18.5 IoT Hacking Countermeasures
- 18.6 OT Concepts
- 18.7 IT-OT Convergence
- 18.8 OT Components
- 18.9 OT Vulnerabilities
- 18.10 OT Attack Methodology and Tools
- 18.11 OT Hacking Countermeasures
- 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
- 19.1 Cloud Computing Concepts
- 19.2 Cloud Types
- 19.3 Cloud Benefits and Considerations
- 19.4 Cloud Risks and Vulnerabilities
- 19.5 Cloud Threats and Countermeasures
- 19.5.1 Activity – Hacking S3 Buckets
- 19.6 Cloud Security Tools And Best Practices
- 19.7 Cloud Computing Review
Module 20: Cryptography
- 20.1 Cryptography Concepts
- 20.2 Symmetric Encryption
- 20.2.1 Activity – Symmetric Encryption
- 20.3 Asymmetric Encryption
- 20.3.1 Activity – Asymmetric Encryption
- 20.4 Public Key Exchange
- 20.5 PKI
- 20.5.1 Activity – Generating and Using an Asymmetric Key Pair
- 20.6 Digital Signatures
- 20.7 Hashing
- 20.7.1 Activity – Calculating Hashes
- 20.8 Common Cryptography Use Cases
- 20.9 Cryptography Tools
- 20.10 Cryptography Attacks
- 20.11 Cryptography Review
- 20.12 Course Conclusion
This course is included in all of our team and individual training plans. Choose the option that works best for you.
Enroll My Team.
Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.
Choose a Plan.
Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.
Frequently Asked Questions.
What topics are covered in the CEH v12 (Certified Ethical Hacker) exam, and how does this training prepare me for it?
The CEH v12 (Certified Ethical Hacker) exam, administered by EC-Council, covers a broad spectrum of cybersecurity topics related to ethical hacking and penetration testing. Key domains include reconnaissance and footprinting, scanning networks, enumeration, vulnerability analysis, system hacking, malware threats, social engineering, web application security, wireless security, IoT security, cloud security, cryptography, and penetration testing tools and techniques.
This training course is designed to align with the latest CEH v12 exam objectives. It offers comprehensive coverage of each domain through theoretical lessons and practical exercises. You will learn how to use industry-standard tools such as Nmap, Wireshark, Metasploit, and Burp Suite to simulate real-world attacks ethically. The course emphasizes hands-on practice, enabling you to identify vulnerabilities, exploit weaknesses, and recommend appropriate countermeasures, all of which directly prepare you for the exam.
How does the CEH v12 certification benefit my cybersecurity career?
The CEH v12 certification, offered by EC-Council, is globally recognized and highly valued in the cybersecurity industry. It demonstrates your ability to think and act like an attacker ethically, which is crucial for proactive security defense. Holding this credential can significantly enhance your employability, opening doors to roles such as penetration tester, security analyst, security consultant, or risk management specialist.
Beyond career advancement, the CEH v12 certification validates your technical skills and knowledge in identifying and mitigating vulnerabilities across various systems and environments. This recognition can lead to higher salaries and increased job security as organizations prioritize professionals capable of defending their digital assets against sophisticated cyber threats. Moreover, the certification keeps you current with the latest hacking techniques and security practices, ensuring your skills remain relevant in a rapidly evolving field.
What practical skills will I gain from this CEH v12 training, and how are they applicable in real-world scenarios?
Upon completing the CEH v12 training, you will develop a wide range of practical skills essential for cybersecurity professionals. These include performing reconnaissance, scanning networks for vulnerabilities, exploiting system weaknesses ethically, and analyzing malware threats. You will also learn how to conduct web application testing, assess wireless and IoT security, and evaluate cloud environments, making your skills applicable across diverse IT landscapes.
The course emphasizes hands-on exercises with real-world scenarios, such as simulating attacks to identify security gaps, testing defenses against DoS and session hijacking, and evaluating human factors through social engineering techniques. These practical experiences prepare you to perform security assessments in professional settings, advise organizations on risk mitigation, and implement effective security controls to prevent actual cyberattacks.
What are the recommended prerequisites for enrolling in the CEH v12 course, and how should I prepare for the certification exam?
While no prior ethical hacking experience is required to enroll in the CEH v12 course, a foundational understanding of networking concepts, operating systems, and basic cybersecurity principles is highly recommended. Knowledge of TCP/IP, system administration, and scripting languages can significantly ease learning and practical application.
To prepare effectively for the CEH certification exam, it is advisable to review the official exam objectives, engage actively in hands-on labs during the course, and utilize additional practice exams and study guides. EC-Council also offers official training materials and practice tests, which can help you gauge your readiness. Consistent study, practical application of tools, and understanding real-world attack scenarios will increase your chances of success on the exam and in your cybersecurity career.
How does this CEH v12 training incorporate emerging topics like cloud, IoT, and mobile security?
This CEH v12 training expands beyond traditional network security to include emerging areas such as cloud computing, IoT (Internet of Things), and mobile security. You will learn how cybercriminals exploit vulnerabilities in cloud environments, and how to ethically assess and secure cloud-based infrastructure using specialized techniques and tools.
Similarly, the course covers security challenges associated with IoT devices and OT (Operational Technology) environments, emphasizing the importance of evaluating these systems ethically. Mobile security testing is also included, demonstrating how to identify vulnerabilities in mobile platforms and applications. By incorporating these current topics, the training ensures you develop relevant skills to protect modern, heterogeneous environments, making your expertise valuable across diverse industry sectors and technological landscapes.