Partner

EH
Ethical Hacker

Rating:
4.8
English
Intermediate
Video preview
FACE 2 FACE
ON SITE TRAINING
LIVE VIRTUAL
TRAINING
COACHING
& MENTORING
SELF-PACED
TRAINING
Select Date
Download Brochure

Course Overview

This Certified Ethical Hacker Version 12 course is a comprehensive five-day training program designed to equip participants with a profound understanding of ethical hacking and cybersecurity concepts. Over the course of the program, participants will be introduced to various aspects of ethical hacking, including network and system hacking, malware threats, web and network security, vulnerability analysis, and data security. The curriculum also covers emerging areas like IoT and mobile security. Each day includes hands-on lab sessions to provide practical experience with tools and techniques. In addition to technical skills, the course emphasizes ethical considerations and prepares participants for the Certified Ethical Hacker (CEH) certification exam. The training concludes with a thorough review of key concepts and a dedicated session for exam preparation.

Hetaf A.
Coordinator - Program Enrollment

Key Takeaways

1
Understand and Apply Ethical Hacking Methodologies: Participants will learn the core concepts and methodologies of ethical hacking, enabling them to conduct a comprehensive security audit on an organization.
2
Identify, Analyze, and Mitigate Threats: Participants will gain the ability to identify different types of cybersecurity threats, analyze their potential impact, and implement effective strategies to mitigate these threats.
3
Utilize Various Hacking Tools and Techniques: Participants will gain hands-on experience with various tools and techniques used in ethical hacking, including system hacking, sniffing, social engineering, denial of service attacks, and others.
4
Conduct Vulnerability Assessment and Penetration Testing: Participants will learn how to use industry-standard tools for vulnerability scanning and penetration testing, equipping them to effectively identify security weaknesses in a network or system.
5
Prepare for the CEH Certification Exam: The course provides comprehensive preparation for the Certified Ethical Hacker (CEH) certification exam, enhancing participants' chances of successfully achieving the certification.

LEORON - Professional Development Institute
Brand Logo
LEORON is the leading corporate training and EdTech company in the EMEA region, with the most comprehensive learning and development solutions in all strategic corporate functions, including Corporate Finance, HR, Procurement and SCM, Technology, Quality, Operations and Engineering. Through instructor-led sessions, in-company training, and coaching, our faculty of experts deliver over 1200+ programs annually, while 25,000+ professionals are equipped with up-to-date relevant education and the latest tech solutions across the EMEA region.We help our valued clients with a wide range of services, including Training Needs Analysis, Competency Development and Assessment, and custom-built e-Learning solutions that cater to specific industries and knowledge areas.LEORON mission remains boosting competitiveness of our clients worldwide through continuous learning, while we strive to achieve our vision of becoming the best quality corporate training and EdTech Company in the EMEA and the world.Whether our clients are facing difficulties re-organising their brand, equipping their workforce with an extra set of skills or aiming to assess competencies within an existing structure, our development planning is a great solution.LEORON’s mission is to help our worldwide clients boost their competitiveness by improving the competency levels of their employees, through top quality training and development solutions delivered by unrivaled global experts and facilitated by the best training managers in the industry.

Course Outline

Day 1: Introduction to Ethical Hacking and Networking Concepts
Session 1: Introduction to Ethical Hacking

•Understanding what ethical hacking is
•Differentiating between white, black and grey hat hackers
•Reviewing the ethics and legal implications of 
hacking
•Exploring the phases of ethical hacking

Session 2: Networking Concepts

•Delving into TCP/IP and OSI Models
•Understanding network topologies: star, bus, ring, mesh, and hybrid
•Examining types of networks: LAN, WAN, MAN
•Introducing common networking devices: Routers, Switches, Firewalls

Session 3: Lab

•Setting up the lab environment
•Introduction to virtual machines and their use in ethical hacking
•Understanding VPNs and their importance in maintaining anonymity

Session 4: Reconnaissance

•Examining Footprinting, its techniques, and tools
•Understanding network scanning techniques and tools
•Studying Enumeration, its methods, and tools

Day 2: System Hacking and Malware Threats
Session 1: System Hacking

•Understanding methods for gaining access
•Studying privilege escalation techniques
•Learning how hackers maintain access through backdoors
•Exploring methods for covering tracks and clearing 
logs

Session 2: Malware Threats

•Introduction to various types of Malware: Virus, 
Worm, Trojan, etc.
•Studying how malware can infect systems
•Exploring anti-malware solutions and their effectiveness

Session 3: Lab

•Hands-on experience with password cracking tools: John the Ripper, Hydra
•Introduction to malware analysis using tools like VirusTotal, Cuckoo Sandbox

Session 4: Sniffing and Social Engineering

•Understanding the concept of sniffing and its techniques
•Exploring social engineering, human hacking techniques

Day 3: Web and Network Security
Session 1: Web Server and Web Application Hacking

•Studying common web server vulnerabilities and mitigation
•Understanding web application vulnerabilities: 
SQL Injection, Cross-Site Scripting (XSS), Cross-Site 
Request Forgery (CSRF)
•Demonstrating web application hacking tools: 
OWASP ZAP, Burp Suite

Session 2: Network Security

•Learning about Firewalls, IDS, IPS, and honeypots
•Understanding wireless network threats and countermeasures
•Exploring IoT and cloud security challenges and best practices

Session 3: Lab

•Practicing SQL Injection and XSS attacks in a controlled environment
•Learning to use tools for evasion and bypassing firewalls: hping3, Nmap

Session 4: Denial of Service

•Understanding the concept and impact of DoS/DDoS attacks
•Studying botnets and their role in launching DDoS attacks
•Exploring DoS/DDoS prevention techniques

Day 4: Vulnerability Analysis and Data Security
Session 1: Vulnerability Analysis

•Learning to conduct vulnerability scanning using tools 
like Nessus, OpenVAS
•Understanding the stages and methodologies of penetration testing

Session 2: Data Security

•Exploring the principles of cryptography, symmetric 
and asymmetric encryption
•Understanding Public Key Infrastructure (PKI)
•Exploring SSL/TLS security, certificates, and how they work

Session 3: Lab

•Practicing vulnerability scanning using various tools
•Hands-on experience with cryptanalysis tools: Wireshark, OpenSSL

Session 4: Mobile and Cloud Security

•Understanding mobile platform attack vectors, mobile malware
•Studying mobile security guidelines and tools
•Exploring cloud security, its risks and best practices

Day 5: Review and Certification Exam Preparation
Session 1: IoT and Emerging Attack Vectors

•Understanding the security risks associated with 
IoT devices
•Exploring methods for securing IoT devices
•Discussing emerging attack vectors and staying 
ahead of new threats

Session 2: Review of Key Concepts

•Comprehensive review of all topics covered in the course
•Open discussion and Q&A on all topics
•Revisiting any topics as requested by participants

Session 3: Certification Exam Preparation

•Reviewing the format and rules of the Certified Ethical Hacker (CEH) exam
•Discussing effective study techniques for exam preparation
•Going through sample questions and discussing the answers

Session 4: Final Lab and Course Closure

•Conducting final practical exercises to apply everything learned in the course
•Collecting course feedback and discussing potential improvements
•Discussing next steps for further learning and how to continue developing ethical hacking skills after the course ends.

Who Should Attend?

This Certified Ethical Hacker Version 12 course is designed for:

•IT Professionals: Those who are working in various IT roles and want to enhance their understanding of cybersecurity threats and solutions.

•Security Officers: Professionals responsible for securing IT infrastructure, including network administrators, system administrators, and security officers.

•Auditors: IT auditors who need to understand the hacking techniques to properly assess the security of the system.

•Site Administrators: Those who are responsible for the website or web application security.

•Individuals Seeking CEH Certification: Anyone planning to achieve the Certified Ethical Hacker (CEH) certification to validate their ethical hacking skills.

FAQ

What language will the course be taught in and what level of English do I need to take part in a LEORON training program?
Most LEORON courses are delivered in English. However, there are some courses offered in Arabic, mainly online. For our in-house courses, sessions can be curated and delivered in any language upon request. In general, the best way to confirm language availability is to check with our Enrollment Managers for the most up-to-date information. Simply click on “Let’s talk on WhatsApp” to chat with us directly.
What formats are the courses offered in?
LEORON delivers training in various formats including face-to-face, live virtual sessions, self-paced learning, in-house delivery as well as online courses.
Are LEORON Public courses certified by an official body/organization?
Yes, most LEORON public courses are accredited by internationally recognized bodies such as CIPD, ATD, PMI, EdEx, and many others—depending on the course.
Who accredits LEORON’s training programs?
LEORON partners with over 20 international bodies such as PMI, CIPD, ATD, EdEx, NASBA, CISI, GARP, HRCI, SHRM, ACCA, ASQ, IIA, ILM, IAC, and others
Are CPD points or PDUs provided?
Yes, learners can earn CPD credits and professional development units (PDUs) including NASBA CPEs, PMI PDUs, CISI, GARP, HRCI, SHRM, and more.
How can I register for a course?
You can register through our website by filling in the inquiry form, or by speaking directly with one of our consultants via WhatsApp or email. Once we confirm your interest, we’ll guide you through the steps.
When is the registration deadline for public courses?
Registration typically closes 14 days before the course start date, with occasional late registrations accepted upon confirmation
What is included in the course fee?
The fee generally covers 5-star venue facilities, training materials, certified instruction, lunches and refreshments, plus certification and membership where applicabl0065
Are there group rates or discounts?
Yes, group bookings and corporate-level discounts are available. Learners are encouraged to reach out to discuss specific arrangements
What support is available with registration?
Enrollment Managers and a Registration Desk assist with the entire process, including deadlines, travel logistics, and course customization. As well as any other special requests you might have. Simply to go your preferred course and click on “Let’s chat on WhatsApp” to do so.
Can I request a bespoke course at my location or within my organization?
Yes, in-house training is fully customizable in terms of curriculum, language, delivery, and timing. You can suggest dates and locations. Simply to go your preferred course and click on “Let’s chat on WhatsApp” in order to address any questions or concerns in this regards.
What is the refund or cancellation policy?
Refund and cancellation policies vary depending on the course type and location. Generally, cancellations made at least 14 days before the course start date may be eligible for a full or partial refund, while cancellations made closer to the course date may incur a fee. For exact terms, please consult your Enrollment Manager or refer to the course confirmation email.
Can I register multiple employees from my company?
Yes. We support group registrations and offer corporate packages for organizations enrolling multiple participants. Our team can help coordinate the logistics for group bookings.
Who should attend these courses?
LEORON caters to a variety of professionals: from those seeking leadership development to project managers, HR specialists, finance professionals, cybersecurity, procurement, Ai enthusiasts and many others.
Do I need prior experience or academic qualifications?
Not always. Many specialized paths, like cybersecurity, accept learners without prior experience. However, some courses (e.g., PMI PDU-based ones) may have recommended prerequisites. Its always better to chat with one of our Enrollment Managers to discuss more. Simply to go your preferred course and click on “Let’s chat on WhatsApp” to do so.
Will I receive a certificate after completing the course?
Yes. Upon full attendance and successful completion, you will receive a certificate of participation or accreditation, depending on the course.
Are meals and refreshments included in face-to-face courses?
Yes. For in-person courses, lunch and coffee breaks are provided daily at the venue.
Can LEORON deliver a course in-house at our organization?
Absolutely. All programs can be delivered privately at your company or virtually for your team, customized to match your internal goals and structure.

Reviews

  • Review:
    Certified Professional in Quality and Patient Safety
    Dating back to 2014, Mobily’s “LEORON” experience has grown from a single collaboration to a long-term partnership. We consider “LEORON” Institute as a strategic partner, whose contribution has been nothing but premium in equipping our staff with field-based knowledge and information. Past three years have resulted with an expanded collaboration with superior customer service and support. Best Regards,
    Turki S. Alsahaan
  • Review:
    Certified Professional in Quality and Patient Safety
    Since the partnership was signed between BAE Systems Saudi Development & Training and LEORON in 2017, we have been working together to offer the Saudi market a complete portfolio of training solutions benefiting from the wide and extensive experience of both parties. Recognizing the great success of this partnership, we are looking for further collaborations in the future that will position both companies as one of the leading training providers in Saudi Arabia. We thank the LEORON team for their full cooperation and continuing support, and look forward to further success together in the years to come.
    Emad Alrajih
  • Review:
    Certified Professional in Quality and Patient Safety
    We have been working with LEORON for the past two years and will be working with them again this upcoming year. The programs they delivered were fruitful and exciting and our organization has received positive feedback from the participants. What our organization aims to do is to provide at no cost training for all the private sector employees so that they may benefit from our offered programs in Innovation and Professional development. LEORON has helped us achieve this goal. We look forward to continuing this service and wish them the best of luck. Regards,
    Nasser M. Al-Subaie
  • Review:
    IAMM Internal Audit Maturity Model
    In recognition of their dedication and contribution supporting IKEA Saudi Arabia in arranging training programs during 2017 & 2018, looking forward for more development and exciting effort this year. On behalf of IKEA Saudi Arabia, THANK YOU!
    Dalal Kutbi
  • Review:
    Certified Professional in Quality and Patient Safety
    Dating back to 2014, Mobily’s “LEORON” experience has grown from a single collaboration to a long-term partnership. We consider “LEORON” Institute as a strategic partner, whose contribution has been nothing but premium in equipping our staff with field-based knowledge and information. Past three years have resulted with an expanded collaboration with superior customer service and support. Best Regards,
    Turki S. Alsahaan
  • Review:
    Certified Professional in Quality and Patient Safety
    Since the partnership was signed between BAE Systems Saudi Development & Training and LEORON in 2017, we have been working together to offer the Saudi market a complete portfolio of training solutions benefiting from the wide and extensive experience of both parties. Recognizing the great success of this partnership, we are looking for further collaborations in the future that will position both companies as one of the leading training providers in Saudi Arabia. We thank the LEORON team for their full cooperation and continuing support, and look forward to further success together in the years to come.
    Emad Alrajih
  • Review:
    Certified Professional in Quality and Patient Safety
    We have been working with LEORON for the past two years and will be working with them again this upcoming year. The programs they delivered were fruitful and exciting and our organization has received positive feedback from the participants. What our organization aims to do is to provide at no cost training for all the private sector employees so that they may benefit from our offered programs in Innovation and Professional development. LEORON has helped us achieve this goal. We look forward to continuing this service and wish them the best of luck. Regards,
    Nasser M. Al-Subaie
  • Review:
    IAMM Internal Audit Maturity Model
    In recognition of their dedication and contribution supporting IKEA Saudi Arabia in arranging training programs during 2017 & 2018, looking forward for more development and exciting effort this year. On behalf of IKEA Saudi Arabia, THANK YOU!
    Dalal Kutbi