Course Overview

The general objectives for the Certified Ethical Hacker (CEH) course typically revolve around providing participants with comprehensive knowledge and practical skills related to ethical hacking and cybersecurity. The course aims to equip individuals with the necessary tools and techniques to identify vulnerabilities and weaknesses in computer systems, networks, and applications in order to improve their security.

Overall, the CEH course aims to equip participants with a comprehensive skill set that allows them to identify vulnerabilities, assess risks, and implement effective security measures to protect computer systems and networks from potential threats. It emphasizes ethical and responsible hacking practices to enhance cybersecurity posture and safeguard digital assets.

Course Objective

By the end of this course, participants will be able to:

         Understand Ethical Hacking by Gain a solid understanding of the ethical hacking mindset, principles, and legal aspects involved in ethical hacking and penetration testing.

         Knows Information Security Fundamentals within Develop a strong foundation in information security concepts, including confidentiality, integrity, and availability, as well as the CIA triad (Confidentiality, Integrity, Availability).

         Make Foot printing and Reconnaissance by Learn how to gather information about a target system or network using various foot printing and reconnaissance techniques, and understand the importance of information gathering in ethical hacking.

         Scan and Enumeration: Acquire knowledge about network scanning tools and techniques to identify active hosts, open ports, and services, followed by enumeration techniques to gather more information about the target.

         Vulnerability Analysis: Learn how to identify and assess vulnerabilities in target systems and networks, and understand the significance of vulnerability analysis in ethical hacking.

         Understand System Hacking: Explore techniques to gain unauthorized access to target systems, including password cracking, privilege escalation, and backdoor attacks, while understanding defensive mechanisms.

         Knows Malware Threats: Understand different types of malware, such as viruses, worms, Trojans, and ransomware, and learn how to analyze and counteract their impact.

         Understand Network Traffic Analysis: Gain insights into network sniffing techniques, tools, and countermeasures to analyze and secure network traffic.

         Understand Social Engineering: Explore psychological manipulation techniques used by attackers to exploit human behavior and gain unauthorized access and learn how to defend against social engineering attacks.

         Understand Denial of Service (DoS) Attacks: Understand DoS and DDoS attack methods, their impact on systems and networks, and strategies to mitigate and prevent such attacks.

         Understand Session Hijacking: Learn how attackers can hijack user sessions and implement countermeasures to prevent session hijacking attacks.

         Understand Web Application Security: Develop skills to identify vulnerabilities in web applications, including injection attacks, cross-site scripting (XSS), and cross-site request forgery (CSRF), and understand methods to secure web applications.

         Understand Wireless Network Security: Explore wireless network vulnerabilities and encryption protocols and learn how to secure wireless networks effectively.

Archaeological content


Information about the course


Date Time Price
(Saudi Rial)
location Language Course Duration Choose

The fees include Value Added Tax (VAT)
Tax Identification Number: 310501241600003