Intellectual Point

Certified Ethical Hacker (CEH)

Learning Objectives

Intellectual Point
Introduction to Ethical Hacking, Footprinting and Reconnaissance,

Scanning Networks, Enumeration, Vulnerability Analysis, System Hacking

Intellectual Point
Malware Threats, Sniffing, Social Engineering, Denial-of-Service

Session Hijacking, Evading IDS, Firewalls, and Honeypots

Intellectual Point
Hacking Web Servers, Hacking Web Applications, SQL Injection, Hacking Wireless Networks

Hacking Mobile Platforms, IoT Hacking, Cloud Computing, Session Hijacking

Course Schedule

Lesson 1:


  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis


  • Information gathering & Google hacking
  • Finding information in Wireshark, Using Wireshark to sniff network traffic
  • NMAP host discovery and port scanning, scanning remote system
  • Vulnerability scanning with Nessus
Lesson 2:


  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service


  • Metasploit from the command line
  • Metasploit with Armitage
  • Metasploit with Armitage client-side attack
  • Creating a Trojan with Metasploit
  • ARP poisoning with Ettercap
  • Hiding files with alternate data streams (ADS)
Lesson 3:


  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection


  • Web app vulnerabilities with rational Appscan
  • Intercepting and Spidering with Burp
  • Web application vulnerabilities with Webgoat
  • Password hash cracking with John the Ripper
  • Website password guessing with Burp Suite
Lesson 4:


  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography


  • Configuring and using SNORT and creating a backdoor with NetCat
  • Router SNMP hacking
  • Custom password list with CUPP, password cracking with John the Ripper
  • Cracking WEP Keys, Cracking WPA2 – PSK Keys
  • Discovering hidden SSIDS

Training program

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A C|EH® understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

In its 12th version, the Certified Ethical Hacker provides comprehensive training, handson learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.

The C|EH® exam is a 4-hour exam with 125 multiple-choice questions. This knowledge-based exam will test your skills in information security threats and attack vectors, attack detection, attack prevention, procedures, methodologies, and more!

Register For Class




May: 2024 4, 5, 11, 12 - 9 AM - 6 PM (EST) In-Person & Virtual Register
June: 2024 8, 9, 15, 16 - 9 AM - 6 PM (EST) In-Person & Virtual Register
August: 2024 10, 11, 17, 18 - 9 AM - 6 PM (EST) In-Person & Virtual Register
September: 2024 7, 8, 14, 15 - 9 AM - 6 PM (EST) In-Person & Virtual Register
October: 2024 5, 6, 12, 13 - 9 AM - 6 PM (EST) In-Person & Virtual Register
November: 2024 2, 3, 9, 10 - 9 AM - 6 PM (EST) In-Person & Virtual Register
December: 2024 7, 8, 14, 15 - 9 AM - 6 PM (EST) In-Person & Virtual Register

Download Course PDF

Private Team Training

Enrolling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training

For details, call 704-554-3827

Event Presentation in crowded room

Come Learn With Intellectual Point

Price Match Guarantee!

We will match Competitor’s Price Quote.
Call for more details 703-554-3827

A Certified Ethical Hacker Course at Intellectual Point Includes:
  • Live instructor-led training in modern classrooms
  • Hands-on labs on real tools like Kali Linux, Metasploit, WireShark, Nmap, etc.
  • 24 x 7 access to the real labs in classrooms and remotely
  • Confidence building hands-on training led by industry experts
  • Authorized Pearson VUE Testing at the same location to help you complete your exam*
  • 100% latest material, notes, videos, and practice questions included in the course price

happy clients

What Our Customers Say - Based on over 600+ Reviews!

Our Top Customers
Training and Testing Partners