Skip to content

Certified Ethical Hacker (CEH v11)


Technological developments in the field of IT are going very fast. This ensures that vulnerabilities quickly arise in systems that criminal hackers can make grateful use of. During this training you will learn to look at your organization's systems through the eyes of an attacker and to identify any vulnerabilities. In addition, you will learn to infiltrate systems and to leave as few digital traces (footprints) as possible.


During this training you will be trained in accordance with the current exam requirements of EC-Council 'Certified Ethical Hacker (312-50 ECC EXAM)'. The training, like the exam, is fully taught in English.

Learning objectives

Course Outline:


  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography