The Certified Ethical Hacker (CEH) program (currently in version 13) covers 20 comprehensive modules. These modules are designed to take a student through the five phases of ethical hacking: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Clearing Tracks.
The curriculum is structured as follows:
Module 01: Introduction to Ethical Hacking: Covers information security fundamentals, cyber laws, and the ethical hacking process.
Module 02: Footprinting and Reconnaissance: Techniques and tools (including AI) to gather information about a target before attacking.
Module 03: Scanning Networks: Identifying live hosts, open ports, and services on a network.
Module 04: Enumeration: Extracting specific information like user names, machine names, and network resources.
Module 05: Vulnerability Analysis: Identifying security loopholes and weaknesses in the target network.
Module 06: System Hacking: Methodologies to gain access, escalate privileges, and hide data (steganography).
Module 07: Malware Threats: Understanding Trojans, viruses, worms, and fileless malware.
Module 08: Sniffing: Intercepting and monitoring network traffic to capture data.
Module 09: Social Engineering: Human-based attacks like phishing and identity theft.
Module 10: Denial-of-Service (DoS): Techniques to crash systems or make them unavailable to legitimate users.
Module 11: Session Hijacking: Taking over valid user sessions to gain unauthorized access.
Module 12: Evading IDS, Firewalls, and Honeypots: Techniques to bypass security perimeters.
Module 13: Hacking Web Servers: Attacks targeting web server infrastructure.
Module 14: Hacking Web Applications: Exploiting vulnerabilities in web apps (e.g., XSS).
Module 15: SQL Injection: Manipulating database queries to steal or corrupt data.
Module 16: Hacking Wireless Networks: Cracking Wi-Fi encryption (WEP, WPA2/3) and Bluetooth attacks.
Module 17: Hacking Mobile Platforms: Android/iOS attack vectors and mobile device management.
Module 18: IoT and OT Hacking: Targeting Internet of Things (IoT) and Operational Technology (OT) devices.
Module 19: Cloud Computing: Security threats and hacking techniques specific to cloud environments.
Module 20: Cryptography: Encryption algorithms, Public Key Infrastructure (PKI), and cryptanalysis attacks.
You cannot secure (or break) what you do not understand. This course is the absolute prerequisite for aspiring Ethical Hackers and Cybersecurity professionals. We move beyond theory to teach you the anatomy of the internet—from the OSI model and TCP/IP protocols to Subnetting and Routing. Learn how data really moves, how networks are built, and where their vulnerabilities lie.
Go beyond basic coding. This comprehensive course teaches you to build dynamic, responsive websites from the ground up—covering Front-End (HTML, CSS, JavaScript) and Back-End technologies. Uniquely, we integrate Secure Coding principles directly into the curriculum, training you to develop robust applications that are not only functional but resistant to modern cyber threats.
Code is the language of the digital universe. Whether you are building high-performance applications or writing scripts for ethical hacking, mastery of core languages is non-negotiable. We take you from the absolute basics of logic building in C to Object-Oriented Programming in C++ and Java, and finally to the versatility of Python for automation and security