Call Us Today! 03-22871829

Certified Ethical Hacker (C|EH) v12

Certified Ethical Hacker (C|EH) v12

Course Duration
5 Days

Training Mode

Accredited By

Course Overview

Certified Ethical Hacker (CEH) v12 covers the most recent ethical hacking tools and techniques used by hackers and cybersecurity professionals to secure systems and networks. This course covers topics such as ethical hacking methodologies, network scanning, enumeration, system hacking, and malware threats. 

After completing the course, students will be able to identify vulnerabilities and weaknesses in systems and networks, as well as develop effective countermeasures to protect against cyber-attacks. 

Corporate Benefits

Upskilling your employees in this certification offers several advantages, including: 

  • Effectively detecting and identifying potential security risks in the organization’s systems and networks
  • Improving company’s compliance with industry regulations and standards
  • Demonstrating company’s commitment to maintaining a secure environment to stakeholders
  • Enhancing company’s ability to handle security incidents
  • Providing greater protection of sensitive data and intellectual property to the company

Course ratings

Redza Mohamad
IT Security Manager
Read More
"Our team has taken several courses with CEH v12 and the results have been outstanding. The instructors are knowledgeable and engaging, and the content is up-to-date and relevant to our needs."
Nurul Huda Hamzah
Senior Network Engineer
Read More
"CEH v12 is one of the best training programs we've ever used for improving our cybersecurity skills. The hands-on labs and real-world scenarios really helped us understand how to defend against attacks."
Amir Abdul Razak
Information Security Analyst
Read More
"CEH v12 was a game-changer for our organization. We were able to identify and fix vulnerabilities that we didn't even know existed before taking the course. Highly recommended."
Nurul Ain Ismail
Security Consultant
Read More
"CEH v12 helped us achieve compliance with industry standards and regulations, which was critical for our business. The course materials were well-organized and easy to follow."
Saiful Ali
Cybersecurity Analyst
Read More
"I was impressed with the depth of knowledge and expertise of the CEH v12 instructor. He was able to answer all of our questions and provide valuable insights that we could apply immediately in our jobs."
Farah Mohd Azizan
IT Security Specialist
Read More
"CEH v12 exceeded our expectations in terms of content and quality. The course provided us with the knowledge and skills we needed to stay ahead of evolving cybersecurity threats."
Shahrul Nizam Shamsudin
Cybersecurity Manager
Read More
"CEH v12 is an excellent investment for any organization looking to improve their cybersecurity posture. The course is comprehensive and engaging, and the instructor is top-notch."
Aisyah Mohd Azman
Penetration Tester
Read More
"CEH v12 helped us identify vulnerabilities in our systems that we were unaware of, which allowed us to take proactive measures to prevent attacks. The course was well worth the investment."

Why Choose Us ?

  • Reputable training facility with over 20 years of experience.
  • Experienced and knowledgeable instructors
  • High-quality, relevant, and up-to-date training materials
  • Convenient training that fits your hectic schedule
  • Good value for money that is worth the investment

Course Objectives

  • Discover how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android) – with over 3,500 hacking tools
  • Describe MITRE Attack Framework
  • Recognize the diamond model of intrusion analysis
  • Understand techniques for establishing persistence
  • Discover how to evade NAC and endpoint security
  • Explain Fog, Edge, and Grid Computing Model
Show more

Who Should Get Certified

  • IT security professionals
  • Cybersecurity professionals
  • Network administrators and engineers
  • Security consultants and auditors
  • Information security managers
  • Anyone interested in pursuing a career in cybersecurity, or those who are already working in an IT-related field and want to specialise in cybersecurity
Show more


  • A minimum of two years of experience in cyber security
  • Capable of understanding basic testing system functions and using them for purposes other than those for which they were designed
Show more

Course Curriculum

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Foot Printing and Reconnaissance
  • Module 3: Scanning networks
  • Module 4: Enumeration
  • Module 5: Vulnerability
  • Module 6: System Hacking
  • Module 7: Malware Threats
  • Module 8: Sniffing
  • Module 9: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT and OT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography
Show more

Claim with HRD-Corp

We are an authorized training provider of HRD Corp (Human Resources Development Corporation). Our certification training programs are eligible for funding under SBL-Khas Scheme. 

HRD Corp provides training and upskilling opportunities for Malaysian employees who are: 

  • Malaysian citizens or permanent residents
  • Employed in a company that contributes to HRD Corp (employer with 10 or more Malaysian employees, or employers from specific sectors)
  • Registered with the HRD Corp portal and have an activated account
  • Have not attended the same training program within the last 12 months
  • Meet the specific requirements for the training program, such as qualifications, skills, or job-specific criteria

Invest in your employees’ professional growth and development by claiming your training with HRD-Corp today!