Certified Ethical Hacker (CEH) (SF) – (Synchronous e-learning)
Course Code:
TGS-2023035654
Duration:
5 Days
Next Available Course Date:
6 Jan 2025
Delivery Mode:
Online Live Learning (OLL)
(Confirmed)
Fees:
$2,725.00

(Before Funding)

Other Available Course Dates:

*Note: Please enquire within for available Saturday schedules.

Certified Ethical Hacker (CEH) is the world’s most advanced certified ethical hacking course that covers core Domains of Cybersecurity and has global recognition and Accreditations while offering a higher employability rate. 
The latest version of CEH v13 from EC-Council, are equipped with AI-powered tools and techniques to identify, exploit, and secure vulnerabilities in systems and networks.

The C|EH v13 not only provides extensive hands-on coverage but also integrates AI into all five phases of ethical hacking: 

  1. Reconnaissance

  2. Scanning

  3. Gaining Access

  4. Maintaining Access 

  5. Clearing Tracks 

Course Outline

Lesson 1: Introducing to Ethical Hacking


Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Lesson 2: Footprinting and Recoinnaissance


Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking

Lesson 3: Scanning Networks


Learn different network scanning techniques and countermeasures.

Lesson 4: Enumeration


Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Lesson 5: Vulnerability Analysis


Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.

Lesson 6: System Hacking


Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Lesson 7: Malware Threats


Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Lesson 8: Sniffing


Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Lesson 9: Social Engineering


Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Lesson 10: Denial-of-Service

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Lesson 11: Session Hijacking

Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Lesson 12: Evading IDS, Firewalls, and Honeypots

Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Lesson 13: Hacking Webservers

Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in  web server infrastructures and countermeasures.

Lesson 14: Hacking Web Applications

Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.

Lesson 15: SQL Injection

Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Lesson 16: Hacking Wireless Networks

Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Lesson 17: Hacking Mobile Platforms

Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Lesson 18: IoT Hacking

Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Lesson 19: Cloud Computing

Learn different cloud computing concepts, such as container technologies and serverless computing,
various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Lesson 20: Cryptography

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Course Fee (inclusive of 9% GST)

Criteria Individual Company Sponsored (Non-SME) Company Sponsored (SME)
Full Course Fee
$2,725.00
SG Citizens aged 21 – 39 years old / PRs aged 21 years old and above
$817.50
$817.50
$317.50
SG Citizens age 40 years old and above
$317.50
$317.50
$317.50
Course Prerequisite
Participants who wish to take up Certified Ethical Hacker (CEH) (SF) should have experience and educational background on information security.
Important Notes
All Trainees must take note of the following:
  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:
    a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session.
    b. The QR Code is only accessible on:
    • Morning Session: between 9.00 am to 1.00 pm.
    • Afternoon Session: between 2.00 pm to 6.00 pm.
    c. Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.
The course completion requirements for this course as follow:
  1. Attended at least 75% of the course.
  2. Declared as competent during the assessments: Written Assessment, Practical Performance, Oral Interview.
Who Should Attend?
Security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Why ITEL?

  • Diverse Range of IT Courses

    We offer a diverse range of IT courses tailored to student needs. Our curriculum covers foundational to advanced topics, ensuring comprehensive learning. We stay updated with industry trends to deliver relevant courses.

  • Skilled & Experienced Instructors

    We are proud to have a team of highly skilled and experienced instructors. Our instructors are industry professionals with in-depth knowledge and expertise across various IT domains.

  • Practical & Hands-on Exercises

    Our courses feature hands-on exercises, projects, and simulations to build practical skills. Students gain confidence by applying knowledge to real-world scenarios.

Course Enquiry for Certified Ethical Hacker (CEH) (SF) – (Synchronous e-learning)

"*" indicates required fields

I want to find out more about:
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription
This field is for validation purposes and should be left unchanged.