Select Your City
Select your city to view local pricing, upcoming sessions, and region-specific information.
Can't find your city? We also offer remote training sessions.
Download for free
CEH Checklist: Ethical Hacker Methodology
The 5 phases of ethical pentesting detailed with tools and techniques to master.
Presentation
Complete training in ethical hacking and penetration testing with EC-Council CEH certification
Objectives
- Master the 5 phases of ethical pentesting (Reconnaissance → Exploitation)
- Use standard tools: Nmap, Metasploit, Burp Suite, Wireshark
- Identify and exploit web vulnerabilities (OWASP Top 10)
- Conduct network and system penetration tests
- Prepare for and pass the EC-Council CEH exam
Target Audience
- →IT professionals wanting to become pentesters
- →Security analysts and SOC analysts
- →Network and system administrators
- →Offensive security consultants
- →Developers interested in application security
Prerequisites
Strong TCP/IP networking and systems (Windows/Linux) knowledge. System administration or development experience. Security+ or equivalent recommended.
Detailed Program
- •Ethics, legality and pentesting methodology
- •Hacking phases: reconnaissance, scanning, exploitation, post-exploitation
- •Lab environments: Kali Linux, Metasploitable, DVWA
- •Attack surface and threat modeling
Frequently Asked Questions
Detailed Curriculum
Module 1: Ethical Hacking Fundamentals
- →Ethics, legality and pentesting methodology
- →Hacking phases: reconnaissance, scanning, exploitation, post-exploitation
- →Lab environments: Kali Linux, Metasploitable, DVWA
- →Attack surface and threat modeling
Module 2: Reconnaissance and Scanning
- →OSINT: footprinting, Google dorks, Shodan, theHarvester
- →Network scanning with Nmap: techniques and NSE scripts
- →Enumeration: DNS, SMTP, SNMP, SMB, LDAP
- →Vulnerability scanning: Nessus, OpenVAS
Module 3: System Exploitation
- →Metasploit Framework: modules, payloads, meterpreter
- →Windows attacks: pass-the-hash, Mimikatz, BloodHound
- →Linux attacks: privilege escalation, kernel exploits
- →Antivirus evasion and obfuscation techniques
Module 4: Web and Application Hacking
- →OWASP Top 10: SQL injection, XSS, CSRF, SSRF
- →Burp Suite: interception, scanning, intruder
- →REST and GraphQL API attacks
- →Session security and authentication
Module 5: Advanced Attacks
- →Network attacks: MITM, ARP spoofing, DNS poisoning
- →Wireless attacks: WPA2 cracking, Evil Twin
- →Social engineering and phishing
- →Cryptanalysis and password cracking
Questions about the program?
Prerequisites
Strong TCP/IP networking and systems (Windows/Linux) knowledge. System administration or development experience. Security+ or equivalent recommended.
Target Audience
- →IT professionals wanting to become pentesters
- →Security analysts and SOC analysts
- →Network and system administrators
- →Offensive security consultants
- →Developers interested in application security
Expected Outcomes
Master the 5 phases of ethical pentesting (Reconnaissance → Exploitation)
Use standard tools: Nmap, Metasploit, Burp Suite, Wireshark
Identify and exploit web vulnerabilities (OWASP Top 10)
Conduct network and system penetration tests
Prepare for and pass the EC-Council CEH exam
Why choose our training?
- Certified instructors with field experience
- Up-to-date content with latest 2025 threats
- Practical approach: 60% hands-on exercises
- Complete course materials included
- In-person in 10 cities + remote option
- Satisfaction rate: 4.8/5 (127 reviews)
Availability
Sessions available year-round in our 10 cities. In-person and remote training available. Request the complete schedule for your city.
FAQs
Ready to get started?
Select your city to view upcoming sessions and local pricing
Available on-site in 13 cities and via remote training