Certified Ethical Hacker (CEH) (SF) - ITEL

Certified Ethical Hacker (CEH) (SF)

Cybersecurity

Clientele

Certified Ethical Hacker (CEH) (SF)

Course Overview

Certified Ethical Hacker (CEH) is the world’s most advanced certified ethical hacking course that covers core Domains of Cybersecurity and has global recognition and Accreditations while offering a higher employability rate. 

The latest version of CEH v13 from EC-Council, are equipped with AI-powered tools and techniques to identify, exploit, and secure vulnerabilities in systems and networks.

 

The C|EH v13 not only provides extensive hands-on coverage but also integrates AI into all five phases of ethical hacking: 

  1. Reconnaissance

  2. Scanning

  3. Gaining Access

  4. Maintaining Access 

  5. Clearing Tracks

Learning Outcomes

  • Master the five phases of ethical hacking: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering Tracks. 

  • Identify  and mitigate vulnerabilities in networks, systems, web applications, cloud, IoT, and mobile platforms. 

  • Utilize AI tools for automated threat detection, reporting, and incident response.

  • Prepare for and pass the CEH certification. (Optional)

Who Should Attend?

Security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course Prerequisite

Participants who wish to take up Certified Ethical Hacker (CEH) (SF) should have experience and educational background on information security.

Potential Roles

These top 10 reflect current industry demand (2025 data), prioritizing roles with highest job postings and growth rates that overlap EC-Council’s CEH mappings (e.g., penetration testing, SOC analysis).

Rank Job Role Key Demand Driver

1

Penetration Tester
High postings; offensive skills core to CEH

2

SOC Security Analyst
Entry/mid-level volume leader

3

Cybersecurity Analyst
Broad applicability, 20%+ growth

4

Ethical Hacker
Direct CEH match; ethicalpentestingsurge

5

Security Engineer
Infrastructure focus; enterprise staple

6

Vulnerability Analyst
Scanning/remediation boom

7

Incident Responder
Response team expansion

8

Network Security Engineer
Hybrid/cloud security needs

9

Threat Hunter
Proactive hunting roles rising

10

Security Administrator
Operational management demand

Course Outline

Lesson 1: Introducing to Ethical Hacking


Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Lesson 2: Footprinting and Recoinnaissance


Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking

Lesson 3: Scanning Networks


Learn different network scanning techniques and countermeasures.

Lesson 4: Enumeration


Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Lesson 5: Vulnerability Analysis


Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.

Lesson 6: System Hacking


Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Lesson 7: Malware Threats


Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Lesson 8: Sniffing


Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Lesson 9: Social Engineering


Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Lesson 10: Denial-of-Service

Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Lesson 11: Session Hijacking

Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Lesson 12: Evading IDS, Firewalls, and Honeypots

Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Lesson 13: Hacking Webservers

Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in  web server infrastructures and countermeasures.

Lesson 14: Hacking Web Applications

Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.

Lesson 15: SQL Injection

Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Lesson 16: Hacking Wireless Networks

Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Lesson 17: Hacking Mobile Platforms

Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Lesson 18: IoT Hacking

Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Lesson 19: Cloud Computing

Learn different cloud computing concepts, such as container technologies and serverless computing,
various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Lesson 20: Cryptography

Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Course Kits

While all CEHAI course kits have complete access to eCourseware and include an exam voucher, a few additional features and learning materials can be added to build deeper expertise and gain practical experience. This means that there is a CEHAI package to suit everyone’s learning requirments

CEHAI ELITE

  • eCourseware
  • Exam Voucher
  • 10 Ethical Hacking Video Library
  • 6 Months of Official Labs
  • CEHAI Engage
  • Annual CEHAI Challenge Pass (12 CTF’s)
  • CEHAI Practical Exam
  • 1 Exam Retake*

 

*Exam Retakes: This benefit provides candidates with the respective exam voucher on the ECC EXAM portal but excludes proctor administration fees which will apply for each attempt of the examination. Applicable to CEH Exam only. Please contact us for details.

 

Course Fee (inclusive of 9% GST)

Individual
Criteria Price inclusive of GST

Full Course Fee

$2,725.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,475.00

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$975.00

Criteria Price inclusive of GST

Full Course Fee

$2,725.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,475.00

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$975.00

Criteria Price inclusive of GST

Full Course Fee

$2,725.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$975.00

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$975.00

SkilsFuture Credit

SSG-funded courses are eligible for SkillsFuture Credit. Singaporeans over the age of 25 can use their Skillsfuture credit to register in courses.

Post-Secondary Education Account (PSEA)

All Singaporeans aged under 31 are eligible to use their PSEA account for the following course.

Course Dates

Course Dates Mode of Delivery Duration
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days

SSG Funding Requirements

All Trainees must take note of the following:

  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:
    a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session.
    b. The QR Code is only accessible on:
    – Morning Session: between 9.00 am to 1.00 pm.
    – Afternoon Session: between 2.00 pm to 6.00 pm.
    Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.

Certification

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion by ITEL

Course Code: TGS-2018500736
Course Support Period: 6 May 2019 to 22 Apr 2027

Note: All certificate images are for illustrative purposes only and may be subject to change at the discretion of ITEL.

e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG)

Upon meeting attendance requirements and passing the assessment(s), participants will receive an e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG).

External Certification Exam

The participant will be able to attempt the CCNA exam after attending this course. Upon passing the exam, the participant will receive CCNA accreditation from Cisco.

FAQs

Is CEH v13 for beginners?

CEH is a great place to start your career in cybersecurity, but you’re required to have some knowledge before applying. It’s recommended that you have a minimum of 2 years of IT security experience before attempting CEH.

There are no specific prerequisites for the CEH program. However, we strongly recommend that candidates possess a minimum of 2 years of experience in IT security before attempting CEH.

 

CEH training involves testing systems and using them for purposes not originally intended. Candidates should understand the basic functions of those IT systems before attempting to hack them.

 

For example, CEH will teach the process of host evaluation leading to enumeration. In this process, trainees will scan downrange targets using common scanning techniques such as Nmap, which will respond with a list of ports. Enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems.

 

However, in this scenario, CEH will not teach you what a port is. This is essential knowledge that you must have to be successful in the class.

Considering the global need and lack of qualified talent in the workforce, cybersecurity professionals are usually paid exceptionally well.

 

As of September 2024, a simple search on Salary.com for US -based positions shows that Ethical Hackers make an average of $110,757 per year, which is an increase of $6800 compared to $103,866 in 2022, and with the 90th percentile earning above $137,000.

 

Experience, education levels, and other certifications typically increase earning potential, but it’s common to see starting salaries for ethical hackers that often exceed six figures.

 

We recommend searching your local job boards, viewing local salary information, and talking to potential employers to assess your own value in the market. CEH has been ranked in the top 5 highest paid cybersecurity certifications for the last 10 years and continues to grow worldwide.

Ethical hacking is crucial to cybersecurity and offers extensive growth opportunities. If you want to learn ethical hacking on your own, it may seem easy, but it requires a lot of experience and knowledge.

 

You need to stay up-to-date with the latest hacking trends and resources in order to combat the escalating cyber threats. In addition to technical skills, you should also be familiar with basic hacking tools, penetration testing, and other aspects of ethical hacking, including the use of AI in cybersecurity.

 

The ethical hacking phases require extensive training and practical experience in areas such as attack vectors and penetration testing, SQL injection attacks, denial of service attacks, firewall attacks, password cracking, enumeration, and cloud computing.

 

There are many online resources available for learning ethical hacking, but it can be difficult to choose the right one. Therefore, it is important to have a structured learning method from a reliable source.

 

An accredited program like the EC-Council’s CEH (Certified Ethical Hacker) is considered the gold standard in ethical hacking and is recognized worldwide. If you’re passionate about this field and enjoy thinking outside the box, then you can build a successful career in this field.

Getting certified is about validating your knowledge. CEH is trusted by employers across the globe as a baseline cybersecurity certification. Certified ethical hackers hold various job titles and roles because the ethical hacking process is fundamental to many cybersecurity operations.

 

While some organizations have ethical hackers in their job role framework, they often take on other forms with a specialization such as Network Defender, Penetration Tester, Secure Coder, Cloud Security Engineer, Security Architect, Auditor, and even leadership roles.

Learner's Testimonials

Become a Certified Ethical Hacker, Empowered by AI Technology.

Early registrations are encouraged.

Certified Ethical Hacker (CEH) (SF)

Instructor-Led Training (ILT)

5 Days

From S$ 975.00 (After Eligible SSG Subsidies) 

Download Certified Ethical Hacker (CEH) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cloud Technology Solutions Architect Associate (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Security Analysis and Penetration Testing (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Information Systems Security (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified: Azure Fundamentals (AZ-900) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Azure Network Engineer Associate (AZ-700) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Threat Intelligence Analyst (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Forensics Investigator (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Security Incident Handling and Response (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Advanced Certificate in Cyber Security Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Higher Certificate in Network Administration Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Strategic Cyber Security Leadership (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cisco Certified Network Associate (CCNA) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Course Listing Download Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Cisco Certified Network Associate Download Course Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List
Course Enquiry for Certified Ethical Hacker (CEH) (SF)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
I want to find out more about:*
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription