| Learning Heights Tanzania

Learning Heights

Certified Ethical Hacker (CEH)

Master ethical hacking methodologies to secure systems against malicious attacks.

Course Overview

The Certified Ethical Hacker (CEH) certification provides hands-on training to help you master the techniques hackers use to penetrate networks, enabling you to build effective defenses. You'll learn how to scan, test, hack, and secure systems. This course covers the five phases of ethical hacking: Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Tracks. Endorsed by EC-Council, CEH is a globally recognized standard in cybersecurity.


Learning Outcomes

Upon successful completion of this course, you will be able to:

  • Understand key issues plaguing the information security world, incident management, and penetration testing.
  • Master various footprinting techniques, including countermeasures.
  • Perform network scanning techniques and identify countermeasures.
  • Understand enumeration techniques and countermeasures.
  • Understand system hacking methodologies, steganography, steganalysis attacks, and track covering.
  • Identify different types of malware, system auditing for malware attacks, analysis, and countermeasures.
  • Understand packet sniffing techniques and defenses against sniffing.
  • Grasp social engineering techniques, identify theft, and countermeasures.
  • Understand various Denial-of-Service (DoS/DDoS) attack techniques, botnets, and countermeasures.
  • Implement session hijacking techniques and countermeasures.
  • Understand web server/application attacks, methodologies, and defenses.
  • Grasp SQL injection attacks and detection tools.
  • Understand wireless encryption, hacking methodologies, tools, and security measures.
  • Understand mobile platform attack vectors, vulnerabilities, and countermeasures.
  • Recognize IoT and OT hacking methodologies, tools, and countermeasures.
  • Understand cloud computing concepts, threats, attacks, and security techniques.
  • Understand different types of cryptography ciphers, Public Key Infrastructure (PKI), and cryptanalysis tools.

Comprehensive Syllabus

  • Information Security Overview & Kill Chain Concepts
  • Hacking Concepts, Types, and Phases
  • Ethical Hacking Concepts and Scope
  • Information Security Controls & Laws/Standards
  • Footprinting Concepts and Methodologies
  • Using Search Engines, Web Services, Social Networking Sites
  • Website, Email, Whois, DNS, Network Footprinting
  • Tools and Countermeasures
  • Network Scanning Concepts
  • Scanning Tools (Nmap, Hping2/3, etc.)
  • Scan Techniques (TCP Connect, Stealth Scans, UDP, etc.)
  • Host Discovery, Port and Service Scanning
  • Banner Grabbing/OS Fingerprinting
  • Scanning Beyond IDS and Firewall
  • Countermeasures
  • Enumeration Concepts
  • NetBIOS, SNMP, LDAP, NTP, SMTP Enumeration
  • DNS Zone Transfer
  • Tools and Countermeasures
  • Vulnerability Assessment Concepts
  • Assessment Types and Lifecycle
  • Tools and Solutions
  • Analysis and Reporting
  • System Hacking Concepts & Methodology
  • Gaining Access (Password Cracking, Privilege Escalation)
  • Executing Applications
  • Hiding Files, Covering Tracks
  • Penetration Testing
  • Malware Concepts (Viruses, Worms, Trojans, Ransomware, etc.)
  • APT Concepts
  • Malware Analysis
  • Countermeasures and Anti-Malware Software
  • Sniffing Concepts and Techniques (MAC Attacks, DHCP Attacks)
  • ARP Poisoning, Spoofing Attacks
  • DNS Poisoning
  • Tools and Countermeasures
  • Social Engineering Concepts and Techniques
  • Phases and Attack Vectors
  • Impersonation
  • Insider Threats
  • Countermeasures
  • DoS/DDoS Concepts and Attack Techniques
  • Botnets
  • Tools
  • Countermeasures and Protection Strategies
  • Session Hijacking Concepts
  • Application Level and Network Level Hijacking
  • Tools
  • Countermeasures
  • Concepts and Tools
  • Evasion Techniques
  • Detection Methods
  • Web Server Concepts and Attack Methodologies
  • Attack Tools
  • Countermeasures and Patch Management
  • Web App Concepts and Attack Methodologies
  • Attack Tools (e.g., Burp Suite)
  • Countermeasures
  • SQL Injection Concepts and Attack Techniques
  • Tools
  • Evasion Techniques and Countermeasures
  • Wireless Concepts (Encryption, Antennas)
  • Wireless Hacking Methodology and Tools
  • Bluetooth Hacking
  • Countermeasures and Security Tools
  • Mobile Attack Vectors
  • Android and iOS Hacking
  • Mobile Device Management (MDM)
  • Mobile Security Guidelines and Tools
  • IoT and OT Concepts
  • Attack Methodology and Tools
  • Countermeasures
  • Cloud Computing Concepts
  • Threats and Attacks
  • Security Techniques and Countermeasures
  • Cryptography Concepts
  • Encryption Algorithms (Symmetric/Asymmetric)
  • Public Key Infrastructure (PKI)
  • Email and Disk Encryption
  • Cryptanalysis and Countermeasures

Certification Exam

This course prepares you for the official Certified Ethical Hacker (CEH) exam provided by EC-Council.

  • Exam Code: 312-50 (CEH)
  • Exam Format: Multiple choice questions
  • Number of Questions: 125 questions
  • Pass Mark: Varies (typically 60%-85%, determined by EC-Council analysis)
  • Duration: 4 hours
  • Exam Type: Multiple Choice (Administered via ECC Exam portal or Pearson VUE)

Quick Course Info


Target Audience: Security Officers, Auditors, Security Professionals, Site Administrators, Network Infrastructure Managers.

Prerequisites: Basic understanding of networking protocols (TCP/IP), Operating Systems (Windows/Linux). Prior security experience helpful but not mandatory.

Duration: Typically 5 Days (Adjust as needed)

Format: In-Person (Dar es Salaam) & Online Live options available.

Certification: Certified Ethical Hacker (CEH) by EC-Council


What's Included

Official EC-Council courseware, access to iLabs (hands-on labs environment - specify if included), practice exams, and official CEH exam voucher.


Enrollment Options

Request Training Info Request Corporate Training
 Chat on WhatsApp Chat with Us!