Certified Ethical Hacking Course – CEH v12

This first-of-a-kind official partnership between Certadda & EC-Council offers you a chance to earn a globally recognized CEH v12 certification that focuses on core cyber security skills which are essential for security and network analysts. The training is ideal to validate your skill set in network security, session hijacking, cryptography, system penetration testing, building firewalls, footprinting, and more to become a Certified Ethical Hacker (CEH). Certadda CEH v12 training enables you to handle any challenges that arise in the cyber security domain and gives you a solid understanding of the security aspects.


Certified Ethical Hacking Course – CEH v12 live online classes




Dec 23rd Sat & Sun (5.5 Weeks) Weekend Batch ⚡Filling Fast Timings – 08:30 AM to 12:30 AM (EST)
Jan 19th Fri & Sat (5.5 Weeks) Weekend Batch ⚡Filling Fast  Timings – 08:30 PM to 12:30 AM (EST)


Introduction to Ethical Hacking


  • Information Security Overview
  • Cyber Kill Chain Concepts
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards

 Skills You will Learn

  • Basics of Ethical Hacking
  • Laws and Compliance of Cyber Security
  • Information Security Controls

Footprinting and Reconnaissance


  • Footprinting Concepts
  • Footprinting Methodology
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures

 Hands On:

  • Use Recon-Ng to gather information
  • Use Maltego for data discovery
  • Use FOCA for metadate analysis

 Skills You will Learn

  • Information Gathering
  • Target mapping
  • Pre-attack phase of ethical hacking

Scanning Networks


  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Draw Network Diagrams

 Hands On

  • Use tools such as nmap
  • Implement countermeasures

 Skills You Will Learn

  • Mapping Network
  • Understand a Network’s Security



  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques (IPsec, VoIP, RPC, Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6, and BGP enumeration)
  • Enumeration Countermeasures

 Hands On

  • Bruteforce or enumerate data from a target with tools
  • Exploit a discovery

 Various Enumeration Techniques

  • Enumerate a target with different technologies

Vulnerability Analysis


  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Solutions and Tools
  • Vulnerability Assessment Reports

 Hands On

  • Use tools such as acunetix, nessus
  • Assess vulnerability of target

 Skills You Will Learn

  • Quickly deploy and identify target threats
  • Discover public loopholes in network

System Hacking


  • System Hacking Concepts
  • Gaining Access
  • Cracking Passwords
  • Vulnerability Exploitation
  • Escalating Privileges
  • Maintaining Access
  • Executing Applications
  • Hiding Files
  • Clearing Logs

 Hands On

  • Implement and work on steganography
  • Exploit and hack into systems

 Skills You Will Learn

  • System Hacking Methodology
  • Steganography

Malware Threats


  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • File-less Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software

 Hands On

  • Use Trojan Horse Construction Kit
  • Use Malware exploit kits

 Skills You Will Learn

  • Understanding and identifying malware
  • Malware Countermeasures
  • Auditing a system for malware



  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures
  • Sniffing Detection Techniques

 Hands On

  • Use Wireshark
  • Use Packet Sniffing tools for Mobile

 Skills You Will Learn

  • Capture and analyze data packets
  • Different techniques to sniff packets

Social Engineering


  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social
  • Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures

 Hands On

  • Detect Phishing emails
  • Install Anti-Phishing tools
  • Social Engineering through social media

 Skills You Will Learn

  • Social Engineering Attacks
  • Audit Human-level Vulnerabilities
  • Social Engineering Countermeasures



  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS
  • Case Study
  • DoS/DDoS Attack Tools
  • DoS/DDoS Countermeasures
  • DoS/DDoS Protection Tools

 Hands On

  • DDoS Attack Tools
  • DDoS Attack Tools for Mobile

 Skills You Will Learn

  • DoD and DDoS Attacks
  • DoS Countermeasures and Protection

Session Hijacking


  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures

 Hands On

  • Performing Man in the Middle Attack
  • Spoofing packets to hijack session

 Skills You Will Learn

  • Various Attacks to hijack a live session
  • Countermeasures for session Hijacking

Evading IDS, Firewalls, and Honeypots


  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures

 Hands On

  • Deploy IDS
  • Use Honeypot tools
  • Evade firewall restrictions

 Skills You Will Learn

  • Firewall Security
  • Working with Intrusion Detection System
  • Firewall evasion techniques

Hacking Web Servers


  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Web Server Countermeasures
  • Patch Management
  • Web Server Security Tools

 Hands On

  • Scanning and Hacking into a webserver
  • Implement Metasploit

 Skills You Will Learn

  • Hacking into a web server
  • Patch management
  • Scanning for Information from webserver

Hacking Web Applications


  • Web App Concepts
  • Web App Threats
  • Web App Hacking Methodology
  • Footprint Web Infrastructure
  • Analyze Web Applications
  • Bypass Client-Side Controls
  • Attack Authentication Mechanism
  • Attack Authorization Schemes
  • Attack Access Controls
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Attack Application Logic Flaws
  • Attack Shared Environments
  • Attack Database Connectivity
  • Attack Web App Client
  • Attack Web Services
  • Web API, Webhooks and Web Shell
  • Web App Security

 Hands On

  • Use BurpSuite
  • Use tools that FUZZ information of web application
  • Bypass Web Application Firewall

 Skills You Will Learn

  • Analyze OWASP based vulnerabilities
  • Footprint web application
  • Discover and Exploit vulnerabilities

SQL Injection


  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • SQL Injection Countermeasures

 Hands On

  • Injection Detection Tools
  • Countermeasures for SQL Injection
  • SQL Injection tools like SQLmap

 Skills You Will Learn

  • Hacking into Databases
  • Database Security

Hacking Wireless Networks


  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Countermeasures
  • Wireless Security Tools

 Hands On:

  • Use Aircrack-ng
  • Use WEP Security cracking tools
  • Use WiFi Sniffer to capture packets

 Skills You will Learn

  • Wireless Network Security
  • Wireless Network Hacking Methodology
  • Wireless Security Testing tools
  • Wireless Hacking Countermeasures

Hacking Mobile Platforms


  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools

 Hands On:

  • Perform DoS on mobile
  • Use Proxies to hack
  • Hack into mobile system

 Skills You will Learn

  • Mobile Security
  • Countermeasures and protection

IoT and OT Hacking


  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • IoT Countermeasures
  • OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Hacking Tools
  • OT Countermeasures

 Hands On:

  • Performing IoT and OT device footprinting
  • Capturing and analyzing traffic between IoT devices

 Skills You will Learn

  • IoT Security and Technologies
  • IoT Hacking countermeasures

Cloud Computing


  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Threats
  • Cloud Hacking
  • Cloud Security

 Hands On:

  • Performing S3 bucket enumeration
  • Exploiting misconfigured S3 buckets
  • Escalating privileges of a target IAM user account by exploiting misconfigurations in a user policy

 Skills You will Learn

  • Cloud Security
  • Server-less Computing threats
  • Cloud Computing hacking methodology



  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

 Hands On:

  • Cryptanalysis tools
  • Cryptography attacks

 Skills You will Learn

  • Cryptography
  • Ciphers
  • Public-Key Infrastructure

Is Ethical Hacking a good career?

A CEH certified professional is trusted by various Fortune 500 companies such as IBM,

Microsoft, Cisco, and many more. As per, U.S. BUREAU OF LABOR STATISTICS, 2022, Employment of information security analysts is projected to grow 33 percent from 2020 to 2030, much faster than the average for all occupations. Since the demand is high, Ethical Hacking is one of the most sought after and promising professions at the moment.

Is CEH a good certification?

The Certified Ethical Hacker (CEH) certification is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired and demanding information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.

Who are the instructors at Certadda for the Ethical Hacking Course?

All the instructors at edureka are CEH (v12), CEI, OSCP, CISSP certified practitioners from the Industry with minimum 10-12 yrs of relevant IT experience. They are subject matter experts and are trained by edureka for providing an awesome learning experience. Enroll now with our best CEH certification course online and learn with India’s top instructors.

What is the average salary of a Certified Ethical Hacker?

The average salary for Certified Ethical Hacker (CEH) with 1-4 years of experience varies from ₹592,789 per year to ₹678,436 per year – Payscale.com

Is this live training, or will I watch pre-recorded videos?

This is an Instructor led Live training and no batch shifts are allowed.

Which top companies hire certified ethical hackers?

MNCs around the globe are hiring certified ethical hackers as every organization has a huge demand for Cyber Security experts. Some of the top MNCs that are actively recruiting certified ethical hackers are Amazon, Tesla, Volkswagen, IBM, CISCO, Oracle, SAP, Intel, Accenture, HP, etc.

Can I review my answers during the CEH examination?

You can review your answers before you end the test. You can mark questions to be reviewed later.

Can a beginner learn ethical hacking?

Ethical hacking is an interesting yet difficult area of study and one needs to have specialized skills to start a career as an ethical hacker. So, beginners are recommended to have some prerequisite knowledge of Programming, Operating Systems and Networking. Enroll now with our best CEH certification course online to gain job-ready ethical hacking skills.

What if I miss a class?

You will not be provided class recordings for this course. Please ensure you don’t miss any class for better understanding and learning experience.

Can I take the CEH certification exam online?

All EC-Council exams are available at the ECC Exam Centre, and also available at Pearson VUE testing centers. Certadda Ethical Hacking certified Instructor will provide more information about the Exam timeframe, Exam question format, etc.

What are the job roles available after getting a CEH certification?

Following are the job roles available after getting a CEH certification:
  • System Security Administrator
  • Security Analyst
  • Information Security Manager
  • Cyber Security Consultant
  • IT Security Administrator
  • Network Engineer
  • Vulnerability Assessment Analyst
  • Penetration Tester

What is the duration of the CEH Exam?

The duration of the CEH exam is a 4-hour exam with 125 multiple-choice questions.

What is the EC-Council CEH v12 Certification exam pattern?

Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
Passing Score: 70%

Does hacking require coding?

Yes, a basic understanding of any programming language such as C, Java, Python, etc. is required.

What is the future scope after becoming a certified ethical hacker?

Cyber Security has a rapid growth rate for demand and vacancies every year and with the introduction to new technologies, new challenges will arise, However more upskilling will give you better career opportunities in the cyber security domain.
Here are some of the certifications you can consider taking after becoming CEH certified:
  • CISSP Certification
  • CISA Certification
  • CISM Certification
  • OSCP Certification

What necessary tools are required to attend the Ethical Hacking training sessions?

The following tools you’ll need to attend the Ethical Hacking Course are:

  • For Windows it is required to have atleast Windows XP SP3 or higher.
  • For Mac you must have OSX 10.6 or higher.
  • Good Internet speed.
  • Headset, microphone, and speakers.

How long is the CEH certification valid?

CEH Certification offered by EC-Council company is valid for three years. After 3 years, you have to renew your certification, and renewal for CEH certification is valid for a further three years. This means that it is necessary to renew the certificate each time it expires.

Can I do CEH after 12th?

The best option to go with following the 12th grade if interested about Ethical Hacking will be the Science stream that includes maths. Some employers may require having a bachelor’s degree in computer-related fields such as IT, Computer Science, or Cyber Security in its own right.

Can a beginner learn ethical hacking?

Whether you already have some relevant knowledge or you’re a total beginner, an online CEH course can be the ideal place to start learning ethical hacking. Certadda course provides an Introduction to the core principles and methods of hacking and penetration testing.

How do I enroll in the online training?

To enroll for the CEH Training, you can make the online payment using any of the following options:

  • American Express
  • Visa Credit or Debit Card
  • PayPal
  • MasterCard
  • Rozarpay

How does CEH v12 differ from CEH v11?

CEH v12 is the advanced version compared to CEH v11. This CEH v12 has evolved with modern Hacking Tools,  operating system, methodology, and the latest technologies.

What are the different job roles for certified ethical hackers?

The different job roles for certified ethical hackers are information security analyst, security engineer, penetration tester, cyber security engineer, security analyst, etc.

Do hackers make use of Python programming?

Presently so many hacking tools have evolved in the market. If you have Python programming knowledge, that’s an additional advantage for you. This Ethical hacking certification course will help you to learn all the latest hacking tools and technologies.

Will CEH Certification get me a job?

Once you have earned this CEH certification, there are various job opportunities like cybersecurity consultant, cyber defense analyst, security analyst, information security administrator, network security engineer, and more.

What skills should an Ethical Hacker Possess?

CEH certification is regarded highly by businesses. This is due to the fact that CEH certification is a way to show theoretical knowledge along with the practical expertise and expertise required to protect the IT infrastructure of a business.

What book do you suggest reading for Ethical Hacking?

These Books are more prevalent in Ethical Hacking platform:
Book Title: Hacking – A Beginners Guide to Computer Hacking, basic Security and Penetration testing.
Author : John Slavio
Book Title: Penetration Testing – A Hands On Introduction to Hacking
Author : Georgia Weidman
Book Title : Hacking – The Art of Exploitation.
Author : Jon Erickson

What certification will I receive after completing the CEH course?

After completing this Ethical Hacking course, you will receive an industry-recognized completion certificate which Top companies worldwide mainly prefer.

Am I required to sign any agreement prior to the exam?

Yes, You must sign on by accepting the non-disclosure agreement, Security and Integrity Policy.

How to become a professional certified Ethical Hacker?

Enrolling in Certadda CEH training course is the first step to becoming a certified Ethical Hacker. This Ethical Hacking course will give you real-time practical experience and will help you to clear the CEH exam on the first attempt.

What are the different modes of training that Certadda provides?

Certadda only provides the Online Live CEH certification training with real-time practical experience.

Does Certadda offer placement assistance?

To assist you in this process to help you succeed, Certadda has added the software for building resumes within your LMS. You can build an impressive resume in only three easy steps. You’ll have access to these templates across various roles and job titles. To create a resume, you must sign into your LMS and click the “create your resume” and “create a CV”options.

How do you feel that the ethical hacking business has increased in recent years?

Hacking has grown in popularity in recent years. It became most significant because of the increase in personal computers and the Internet and the number of users and their ability. In the United States alone, the represent ethical Hacking is an industry with nearly $ 4 billion in value. The research firm Frost and Sullivan estimates the sector is growing at 21% per year and has more than 2.3 million security experts providing online security worldwide.

Others Courses

× How may I help you?