CEH v12 Course Content / Exams

With the massive increase in connected devices to exchange information and businesses move to digitization at a faster pace than ever before, the devices, networks, and systems’ security remain at stake, and more vulnerable to information and data threats and hacking incidents. is highly prone to. Companies strive to hire highly Cyber Security professionals to build and maintain hack-proof organizational infrastructure, creating a skyrocketing demand for Certified Ethical Hackers.


EC-Council’s CEH v12 certification training focuses to train aspiring security professionals to gain essential ethical hacking skills with the practical implementation of scanning, testing, hacking, and securing the systems. The CEH v12 training and certification from ICSS features:


  • Inducing “think like hacker” approach in the participants
  • Explains the functioning of the perimeter defenses, scan and hacking networks without affecting the real networks to identify vulnerabilities
  • Demonstrates the exploitation of privileges by intruders and fool-proof security measures to protect the security architecture of the organization
  • Real-like test environments to help participants explore their acquired skills
  • Interactive theory and lab sessions delivered by industry experts having several years of experience.

Successful completion the CEH V12 certification training empowers you with across the board understanding of:


  •  Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
  • Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
  • Performing network scans, host and port discovery by utilizing different scanning tools
  • Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
  • Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
  • Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
  • Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
  • Packet sniffing concepts, techniques, and protection against the same.
  • Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defense tools
  • Security solutions like firewall, IPS, honeypots, their evasion, and protection
  • Web server and web application-based attacks, methodologies
  • SQL injection, hijacking, and evasion techniques
  • Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
  • Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
  • Operational Technology (OT) essentials, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.
  • Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
  • Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
  • Cloud computing, threats and security, essentials of container technology and serverless computing
Module 01: Introduction to Ethical Hacking
Module 02: Foot Printing and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT and OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
  • Students 
  • Freshers and Job Seekers
  • Defense Professionals
  • Ethical Hackers
  • System Administrators
  • Network Administrators
  • Engineers
  • Web Managers
  • Auditors
  • Security Professionals
  • The candidate must be 12th standard qualified to become eligible for the Certified Ethical Hacker course.
  • There are no specific prerequisites for joining the course, but it would be advantageous for the candidate if they have a basic knowledge of networking.
  • Certification Name:  312-50 (ECC EXAM), 312-50 (VUE)
  • Test Format: Multiple Choice
  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Delivery: ECC EXAM, VUE

CEH v12 Course Key Features

  • This Course is Highly Practical but it won't neglect the theory

  • EC-Council CEH v12 Certification- Include Exam voucher & Exam Fee

  • Live Mentor Connect Sessions

  • iLab & Virtual Labs for Practical

  • EC-Council Certified Instructors having 5-10 years of work experience

  • Study material by EC-Council (e-kit)

  • Hands on training with live demonstrations for all modules

  • Small Batches for Better Understanding

  • Learn from Basics to Advanced

  • English & Hindi

  • 100% Passing Rate

  • Job Assistance

Highlights of some of what sets CEH v12 apart from the rest

WHY CHOOSE US

  • Expert Instructors

    Our industry-aligned instructors are well prepared, set clear and fair expectations, have a positive attitude, are patient with students, and assess their teaching regularly.

  • Virtual Labs for Practice

    We provide a comprehensive Learning Management System (LMS) around the Virtual Labs where the students can get complete knowledge about various sophisticated tools and technologies.

  • ss
  • Global International Certification

    Offering recognised International and Government certification to our students and trend them towards the new developments.

  • Improvise Your Technical / Non-technical Skills

    Improving your ability to learn new skills, tips, & trends about the industries and job requirements.

  • Practical With Implementation

    Providing hands-on practical training and experience with sophisticated technologies and tools with a high degree of priority

  • Online & Classroom Program

    Providing online and classroom training as per the students’ requirements

Copyright @ 2025 by ICSS.All Rights Reserved.