Choose Ethical Hacker V12 Course Online in Malaysia
Completely project-based Certified Ethical Hacker.
619 Google Reviews
5-star reviews by all students who joined our course.
Ethical Hacker V12 Course
Best Ethical Hacker Course in Malaysia

Overview
✔ Certified Ethical Hacker (CEH) course by Nexperts Academy:
Comprehensive training program for security professionals.
✔ Topics covered:
Network security, system security, cryptography, and ethical hacking methodologies.
✔ Hands-on experience:
Utilize EC-Council’s iLabs platform and real-world examples of cyber-attacks.
✔ Accredited trainers:
Course delivered by experienced instructors in both classroom and online formats.
✔ Certificate of completion:
Receive a certificate from Nexperts Academy upon course completion.
✔ CEH certification exam:
Eligible to take the CEH exam issued by EC-Council.
✔ Exam retake and preparation:
Free exam retake and access to an exam preparation guide.
✔ Practical and engaging:
Designed to equip professionals with skills to protect organizations against cyber-attacks.
Get the best!
Skills You Will Gain
The CEHv12 course will provide learners with a range of skills, including:

Tools you will learn
Throughout the course, learners will use a range of tools, including:
Training Deliverables
✔ Comprehensive course materials, including presentation slides, handouts, and reference guides
✔ Access to online training materials, including video lectures, quizzes, and practice exercises
✔ Hands-on lab exercises to practice applying the course concepts in a real-world environment
✔ Access to EC Council hacking lab -Hands-on practice in simulated environments, including virtual machines and hacking labs
✔ Classroom and online training options to accommodate different learning styles and preferences
✔ Expert instructors with extensive industry experience and knowledge of the latest cybersecurity trends and best practices
✔ A dedicated support team to answer questions and provide assistance throughout the course
✔ Exam preparation guide to help students prepare for the certification exam
✔ Practice exam to simulate the certification exam experience and assess readiness
✔ Free exam retake if the student fails the exam on their first attempt (terms and conditions apply)
✔ Certificate of completion issued by Nexperts Academy to showcase the student’s achievement and demonstrate their knowledge and skills to employers

Course Module’s Outline
Introduction to Ethical Hacking
- Information Security Overview
- Hacking Methodologies and Frameworks
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Information Security Laws and Standards
Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website Footprinting
- Email Footprinting
- Whois Footprinting
- DNS Footprinting
- Network Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures
Scanning Networks
- Network Scanning Concepts
- Scanning Tools
- Host Discovery
- Port and Service Discovery
- OS Discovery (Banner Grabbing/OS Fingerprinting)
- Scanning Beyond IDS and Firewall
- Network Scanning Countermeasures
Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP and NFS Enumeration
- SMTP and DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
Vulnerability Analysis
- Vulnerability Assessment Concepts
- Vulnerability Classification and Assessment Types
- Vulnerability Assessment Tools
- Vulnerability Assessment Reports
System Hacking
- Gaining Access
- Escalating Privileges
- Maintaining Access
- Clearing Logs
Malware Threats
- Malware Concepts
- APT Concepts
- Trojan Concepts
- o Worm Makers
- Fileless Malware Concepts
- Malware Analysis
- Malware Countermeasures
- Anti-Malware Software
Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC Attacks
- Sniffing Technique: DHCP Attacks
- Sniffing Technique: ARP Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Technique: DNS Poisoning
- Sniffing Tools
Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
Denial-of-Service
- DoS/DDoS Concepts
- Botnets
- DoS/DDoS Attack Techniques
- DDoS Case Study
- DoS/DDoS Attack Countermeasures
Session Hijacking
- Session Hijacking Concepts
- Application-Level Session Hijacking
- Network-Level Session Hijacking
- Session Hijacking Tools
- Session Hijacking Countermeasures
Evading IDS, Firewalls, and Honeypots
- IDS, IPS, Firewall, and Honeypot Concepts
- IDS, IPS, Firewall, and Honeypot Solutions
- Evading IDS
Exceptions and Assertions
- Defining the purpose of Java exceptions
- Using the try and throw statements
- Using the catch, multi-catch, and finally clauses
- Autoclose resources with a try-with-resources statement
- Recognizing common exception classes and categories
- Creating custom exceptions
- Testing invariants by using assertions
- Evading NAC and Endpoint Security
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Countermeasures
Hacking Web Servers
- Web Server Concepts
- Web Server Attacks
- Web Server Attack Methodology
- Web Server Attack Countermeasures
Hacking Web Applications
- Web Application Concepts
- Web Application Threats
- Web Application Hacking Methodology
- Web API, Webhooks, and Web Shell
- Web Application Security
SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- SQL Injection Countermeasures
Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Wireless Attack Countermeasures
- Wireless Security Tools
Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Device Management
- Mobile Security Guidelines and Tools
IoT and OT Hacking
- IoT Hacking
- IoT Concepts
- IoT Attacks
- IoT Hacking Methodology
- OT Hacking
- OT Concepts
- OT Attacks
- OT Hacking Methodology
Cloud Computing
- Cloud Computing Concepts
- Container Technology
- Manipulating CloudTrial Service
- Cloud Security
Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Email Encryption
- Disk Encryption
- Cryptanalysis
- Cryptography Attack Countermeasures
Objectives
Sure, here are some possible course objectives for the Certified Ethical Hacker v12 (CEH v12) course:
Highly experienced
with interview preparation
Certified trainers
24/7 support
Lifetime access to
recorded sessions
One on one assistance
Flexible schedule
Why NEXPERTS ACADEMY
The world has become so fast paced that people don’t want to stand by reading a page of info

Trusted By Students
Years Industry Experience
Percent Placement Record
Partners and Clients
We work with some of the prestigious brands of the globe.


















Check out what our students say

“Nexperts Academy is well-known for networking and security courses. Their delivery is awesome, and they keep up to the industry standard.”
Mr. Shan,
Senior Lecturer, INTI International College, Subang, Malaysia.

“I recently completed the full stack training program, and I must say it exceeded my expectations in every way. The training was comprehensive, well-structured, and provided a holistic understanding of both front-end and back-end development.”
Johanna Watts
You might be interested in
Contact Us
Let’s Connect
Together we will learn and grow!

©2023 Copyright. Nexperts Academy. SDN BHD