Certified Ethical Hacker Training

Program Inquries

By clicking “Request a call” you accept our Terms. Our representative will get in touch with you

Certificate Program Details

This course is designed to help you master an ethical hacking methodology that can be used in penetration testing to systematically and lawfully assess the security of a system. Current and prospective information security professionals will be trained to find, with the network owner's consent, potentially exploitable security vulnerabilities. This course delivers in-demand ethical hacking skills, tools, and techniques while preparing you for the internationally-recognized Certified Ethical Hacker certification exam (312-50) from EC-Council.

This course will help get you into a “Hacker's Mindset” in order to best prepare you to think like a hacker and better defend against possible attacks.

EC-Council security experts have designed a variety of labs, which mimic real-time scenarios to help you “live” through attacks as if they were real. You’ll also be given access to over 2,200 commonly used hacking tools to immerse you into the hacker world. More than 40 percent of class time is dedicated to hands-on, practical learning skills.

At TBC, your labs will be complimented by simulations and mock "attack and defend" scenarios (red and blue: experiencing both sides will allow participants to better grasp the wholistic, purple, process required for effectively understanding ).

Who this course is intended for:

Security officers

Ethical Hackers


Web managers

Security professionals

Site administrators

Penetration testers

Individuals concerned about the integrity of network infrastructure


40 Hours

Delivery Mode

On-line (live instructor-led plus asynchronous)

In-class and online

Tuition and Fees


Course Outline

Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls & Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

What our students have to say

From Real Students

Got a Question?

Don't hesitate to get in touch with us,

Our Friendly team is here to help.

Contact Us