CEH

Choose Ethical Hacker V12 Course Online in Malaysia

Completely project-based Certified Ethical Hacker.

619 Google Reviews

5-star reviews by all students who joined our course.


Ethical Hacker V12 Course

Best Ethical Hacker Course in Malaysia

Duration: 5 days/40 hours live instructor-led training.

No prior skills on coding required.

Anyone can join from freshies to professionals.

Fee including: 
  • Materials 
  • EC Council Labs 
  • Examination voucher 
  • Examination retake voucher 
  • Preparation for examination 
  • Trained by Certified trainers 

Limited time Course Price


RM 6,250

(Excluding 6% SST)

Overview

Certified Ethical Hacker (CEH) course by Nexperts Academy:

Comprehensive training program for security professionals.

Topics covered:

Network security, system security, cryptography, and ethical hacking methodologies.

Hands-on experience:

Utilize EC-Council’s iLabs platform and real-world examples of cyber-attacks.

Accredited trainers:

Course delivered by experienced instructors in both classroom and online formats.

Certificate of completion:

Receive a certificate from Nexperts Academy upon course completion.

CEH certification exam:

Eligible to take the CEH exam issued by EC-Council.

Exam retake and preparation:

Free exam retake and access to an exam preparation guide.

Practical and engaging:

Designed to equip professionals with skills to protect organizations against cyber-attacks.

Get the best!

Skills You Will Gain

The CEHv12 course will provide learners with a range of skills, including:

An understanding of information security laws, standards, and controls
The ability to scan networks and identify vulnerabilities
The ability to perform vulnerability analysis and assessment
An understanding of malware threats and the ability to counter them
The ability to perform session hijacking and evade IDS, firewalls, and honeypots
The ability to hack web servers and applications
The ability to hack wireless networks and mobile platforms
An understanding of cloud computing and cryptography
The ability to perform footprinting and reconnaissance on computer systems and networks
The ability to enumerate computer systems and networks
The ability to hack into computer systems and networks
The ability to perform network sniffing and social engineering attacks
An understanding of denial-of-service attacks and the ability to counter them
An understanding of SQL injection and the ability to counter it
An understanding of IoT and OT hacking

Tools you will learn

Throughout the course, learners will use a range of tools, including:

Nmap

Nessus

Metasploit

Wireshark

Aircrack-ng

Cain and Abel

John the Ripper

Sqlmap

Hydra

Burp Suite

Maltego

Social-Engineer Toolkit

Netcat

Nikto

Training Deliverables

Comprehensive course materials, including presentation slides, handouts, and reference guides 

Access to online training materials, including video lectures, quizzes, and practice exercises 

Hands-on lab exercises to practice applying the course concepts in a real-world environment 

Access to EC Council hacking lab -Hands-on practice in simulated environments, including virtual machines and hacking labs 

Classroom and online training options to accommodate different learning styles and preferences 

Expert instructors with extensive industry experience and knowledge of the latest cybersecurity trends and best practices 

A dedicated support team to answer questions and provide assistance throughout the course 

Exam preparation guide to help students prepare for the certification exam 

Practice exam to simulate the certification exam experience and assess readiness 

Free exam retake if the student fails the exam on their first attempt (terms and conditions apply) 

Certificate of completion issued by Nexperts Academy to showcase the student’s achievement and demonstrate their knowledge and skills to employers 

Course Module’s Outline

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 20
1

Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Methodologies and Frameworks
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards
2

Footprinting and Reconnaissance

  • Footprinting Concepts 
  • Footprinting through Search Engines 
  • Footprinting through Web Services 
  • Footprinting through Social Networking Sites 
  • Website Footprinting 
  • Email Footprinting 
  • Whois Footprinting 
  • DNS Footprinting 
  • Network Footprinting 
  • Footprinting through Social Engineering 
  • Footprinting Tools 
  • Footprinting Countermeasures
3

Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
4

Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
5

Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
6

System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
7

Malware Threats

  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • o Worm Makers
  • Fileless Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software
8

Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
9

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
10

Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures
11

Session Hijacking

  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
12

Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
13

Exceptions and Assertions

  • Defining the purpose of Java exceptions
  • Using the try and throw statements
  • Using the catch, multi-catch, and finally clauses
  • Autoclose resources with a try-with-resources statement
  • Recognizing common exception classes and categories
  • Creating custom exceptions
  • Testing invariants by using assertions
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
14

Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
15

Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security
16

SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • SQL Injection Countermeasures
17

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools
18

Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
19

IoT and OT Hacking

  • IoT Hacking
  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • OT Hacking
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
20

Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Manipulating CloudTrial Service
  • Cloud Security
20

Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attack Countermeasures

Objectives

Sure, here are some possible course objectives for the Certified Ethical Hacker v12 (CEH v12) course:

Gain knowledge of session hijacking concepts, application-level session hijacking, and network-level session hijacking, and learn how to use them to take control of user sessions

Master different hacking concepts and ethical hacking concepts, and use them for securing computer networks and systems

Gain knowledge of footprinting and reconnaissance techniques, and use them to collect information about potential targets

Develop expertise in evading IDS, firewalls, and honeypots, and learn how to use IDS/Firewall evasion tools and countermeasures to bypass security mechanisms

Master the art of enumeration, and learn how to gather information about system resources and user accounts in computer networks

Develop expertise in social engineering techniques, and learn how to use them to manipulate individuals and groups to gain unauthorized access to computer networks and systems

Develop skills in cryptography concepts, encryption algorithms, email encryption, disk encryption, and cryptography attack countermeasures.

Learn about web server and web application hacking, SQL injection concepts and methodology, wireless network hacking, mobile platform hacking, IoT and OT hacking, and cloud computing security concepts

Learn about the different information security controls, laws, and standards that apply to ethical hacking and cybersecurity

Develop expertise in various hacking methodologies and frameworks, and learn how to apply them effectively

Learn about network scanning, host discovery, port and service discovery, and OS fingerprinting techniques, and use them to detect vulnerabilities in computer networks

Understand the various malware threats, APT concepts, Trojan concepts, and fileless malware concepts, and learn how to counter them effectively

Gain knowledge of sniffing techniques, MAC attacks, DHCP attacks, ARP poisoning, and spoofing attacks, and learn how to use them to analyze network traffic and detect security breaches

Develop expertise in vulnerability assessment and analysis, and learn how to identify vulnerabilities and assess their impact on computer networks and systems

Learn about denial-of-service attacks, botnets, DDoS attack techniques, and DDoS case studies, and develop skills in countermeasures and defense mechanisms

Understand the principles and practices of ethical hacking and information security

It’s Now or Never

Training Mode

Physical Classroom Training (Malaysia)
On-site Company Training (Malaysia)
Online Training via Microsoft Team (Malaysia and International)
Highly experienced
with interview preparation
Certified trainers
24/7 support
Lifetime access to
recorded sessions
One on one assistance
Flexible schedule

Why NEXPERTS ACADEMY

The world has become so fast paced that people don’t want to stand by reading a page of info

0

Trusted By Students

0

Years Industry Experience

0

Percent Placement Record

Partners and Clients

We work with some of the prestigious brands of the globe.

Check out what our students say

“Nexperts Academy is well-known for networking and security courses. Their delivery is awesome, and they keep up to the industry standard.”
Mr. Shan,
Senior Lecturer, INTI International College, Subang, Malaysia.
“I recently completed the full stack training program, and I must say it exceeded my expectations in every way. The training was comprehensive, well-structured, and provided a holistic understanding of both front-end and back-end development.”
Johanna Watts

You might be interested in

Microsoft Azure Fundamentals

Duration: Weekdays and Weekends Intake Available

RM 250/-

Network & Security

Duration: Weekdays and Weekends Intake Available

RM 2500/-

AWS Certified Solutions Architect -Associate (Architecting on AWS)

Duration: 3 days/40 hours

RM 850/-

Contact Us

Let’s Connect

Together we will learn and grow!

©2023 Copyright. Nexperts Academy. SDN BHD