Ethical Hacking and Countermeasures v12


Duration: 5 days

About the Course

The C|EH® v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and hands-on application through our cyber range. Every tactic discussed in training is backed by step-by-step labs conducted in a
virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.”

In its 12th version, the Certified Ethical Hacker provides comprehensive training, handson learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework:

              1. Learn 2. Certify 3. Engage 4. Compete.

Who Should Attend
The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course Objectives

Armed with your attack platform, Parrot OS, and a plethora of tools used by Ethical Hackers, you will embark on a 4-part engagement to assess ABCDorg’s security posture. Follow the process, practice your TTP and experience the real thing in a controlled environment with no consequences, just the ultimate learning experience to support your career as an Ethical Hacker! Each phase builds on the last as you progress through your ABCDorg’s engagement.


1. New Learning Methodology: Learn – Certify – Engage – Compete
2. Compete: new challenges every month to test your job-ready skills!
3. 100% Compliance to NICE 2.0 Framework
4. Based on a comprehensive industry-wide job-task analysis
5. Hands-on learning labs
6. Practice Range
7. Global C|EH community competitions
8. Cheat Sheet
9. Coverage of the latest malware
10. Lab-intensive program (Every learning objective is demonstrated using labs)
11. Hands-on program (More than 50% of training time is dedicated to labs)
12. Lab environment simulates a real-time environment(Lab setup simulates
real-life networks and platforms)
13. Covers the latest hacking tools (Based on Windows, macOS, and Linux)
14. Latest OS covered and a patched testing environment
15. All the tool screenshots are replaced with the latest version
16. All the tool listing slides are updated with the latest tools
17. All the countermeasure slides are updated

Technology Updates:
1. MITRE ATTACK Framework
2. Diamond Model of Intrusion Analysis
3. Techniques for Establishing Persistence
4. Evading NAC and Endpoint Security
5. Fog Computing
6. Edge Computing
7. Grid Computing

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.


  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll


MODULE 01 –  Introduction to Ethical Hacking
Cover the fundamentals of key issues in the information security world,
including the basics of ethical hacking, information security controls,
relevant laws, and standard procedures

MODULE 02 – Foot Printing and Reconnaissance
Learn how to use the latest techniques and tools to perform foot
printing and reconnaissance, a critical pre-attack phase of the ethical
hacking process.

MODULE 03 – Scanning Networks
Learn different network scanning techniques and countermeasures.

MODULE 04 – Enumeration
Learn various enumeration techniques, such as Border Gateway
Protocol (BGP) and Network File Sharing (NFS) exploits, and associated

MODULE 05 – Vulnerability Analysis
Learn how to identify security loopholes in a target organization’s
network, communication infrastructure, and end systems. Different
types of vulnerability assessment and vulnerability assessment tools.

MODULE 06 – System Hacking
Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover
system and network vulnerabilities.

MODULE 07 – Malware Threats
Learn different types of malware (Trojan, virus, worms, etc.), APT
and fileless malware, malware analysis procedure, and malware

MODULE 08  – Sniffing
Learn about packet-sniffing techniques and how to use them to discover
network vulnerabilities, as well as countermeasures to defend against
sniffing attacks.

MODULE 09 – Social Engineering
Learn social engineering concepts and techniques, including how to
identify theft attempts, audit human-level vulnerabilities, and suggest
social engineering countermeasures.

MODULE 10 – Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS
(DDoS) attack techniques, as well as the tools used to audit a target and
devise DoS and DDoS countermeasures and protections.

MODULE 11 – Session Hijacking
Understand the various session hijacking techniques used to discover
network-level session management, authentication, authorization, and
cryptographic weaknesses and associated countermeasures.

MODULE 12 – Evading IDS, Firewalls, and Honeypots
Get introduced to firewall, intrusion detection system (IDS), and
honeypot evasion techniques; the tools used to audit a network
perimeter for weaknesses; and countermeasures.

MODULE 13 – Hacking Web Servers
Learn about web server attacks, including a comprehensive attack
methodology used to audit vulnerabilities in web server infrastructures
and countermeasures.

MODULE 14 – Hacking Web Applications
Learn about web application attacks, including a comprehensive web
application hacking methodology used to audit vulnerabilities in web
applications and countermeasures.

MODULE 15 – SQL Injection
Learn about SQL injection attacks, evasion techniques, and SQL
injection countermeasures.

MODULE 16 – Hacking Wireless Networks
Understand different types of wireless technologies, including
encryption, threats, hacking methodologies, hacking tools, Wi-Fi
sedcurity tools, and countermeasures.

MODULE 17 – Hacking Mobile Platforms
Learn Mobile platform attack vector, android and iOS hacking, mobile
device management, mobile security guidelines, and security tools.

MODULE 18 – IoT Hacking
Learn different types of IoT and OT attacks, hacking methodology,
hacking tools, and countermeasures.

MODULE 19 – Cloud Computing
Learn different cloud computing concepts, such as container technologies
and server less computing, various cloud computing threats, attacks,
hacking methodology, and cloud security techniques and tools.

MODULE 20 – Session Hijacking
Understand the various session hijacking techniques used to discover
network-level session management, authentication, authorization, and
cryptographic weaknesses and associated countermeasures.