EC-Council CEH - Certified Ethical Hacker (V12)
International Rate - Request for the rate in your country
The Certified Ethical Hacker (CEH) certification training program is designed to provide students with the requisite knowledge and skills to protect their organizations from malicious cyber attacks.
The program is globally recognized and provides students with access to the latest tools and techniques used by hackers. Upon completion of the program, students will be able to understand and apply hacking concepts to protect their systems from malicious attacks.
Emerging Attack Vectors
A greater focus on 18 attack vectors, including the OWASP Top 10, IoT hacking, Vulnerability Analysis, APT, Fileless Malware, Web API Threats, Webhooks, Web Shell, OT Attacks, Cloud Attacks, AI, ML, and much more!
Modern Exploit Technologies
Improve your exploit development by learning about existing and new vulnerabilities from the elementary level. Get exposure to the latest technologies, such as OT Technology, Container Technology.
Hands-on Hacking Challenges
You will get the luxury of trying 24 exceptional hacking challenges (on steroids!) spread across FOUR complexity levels with our Break-The-Code Challenge. Showcase your cutting-edge tricks to get into highly sought-after positions.
Modern Case Studies and Current Events
Exemplary case studies to help you understand the TTPs and scope of an attack. Learn from modern real-world incidents and ongoing trends to protect, detect, and analyze a potential cyberattack beforehand.
Enhanced Focus on Malware Analysis
You are now one step closer to learning the latest Malware Analysis tactics for ransomware, banking and financial malware, IoT botnets, OT Malware Analysis, Android Malware, and more!
Live, Cyber Range (no simulations)
The brand-new iLabs Cyber Range is now 100% mapped to the Certified Ethical Hacker Training program. It is no more based on simulations rather than real-world challenges.
Greater Focus on Cloud and IoT
Get dedicated modules on cloud and IoT, incorporating CSP’s Container Technologies (like Docker, Kubernetes), Cloud Computing threats, and various IoT hacking tools, such as Shikra, Bus Pirate, more!
Thousands of Hacking Techniques, Tricks, and Tools
CEH V12 continues its legacy to introduce you to the latest hacking techniques, such as fileless malware, advanced social engineering practices, and more. Learn how to use the most advanced hacking tools.
What new in CEH Version 12?
- Focus on skill-based learning.
- Over 15% new content
- A new lab setup environment
- All the lab are refreshed, updated and validated on the new lab setup.
- Over 30 new labs.
Course Start Date
Start-date : 3rd - 7th November 2022
Timing : 10.00am-1.30pm & 2.30pm-6.00pm ( Malaysia /APAC)
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50 (VUE)
In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has real world applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.
Clause: Age Requirements and Policies Concerning Minors
The age requirement for attending the training or the exam is restricted to any candidate that is permitted by his/her country of origin/residency.
If the candidate is under the legal age as permitted by his/her country of origin/residency, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center/EC-Council a written consent/indemnity of their parent/legal guardian and a supporting letter from their institution of higher learning. Only candidates from a nationally accredited institution of higher learning shall be considered.
Who is this for?
- Information Security Analyst/Administrator
- Information Assurance (IA) Security Officer
- Information Security Manager/Specialist
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security/IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
Click Here To Download Brochure