Certified Ethical Hacker Course in Singapore

The CEH certification course in Singapore provides a comprehensive training pathway for IT professionals aiming to become certified ethical hackers. This advanced program introduces learners to the latest AI-driven tools and strategies used in modern cybersecurity. Covering every phase of ethical hacking, from information gathering to vulnerability exploitation and securing digital environments, this course is designed to equip participants with practical, in-demand skills. With AI integration at its core, the training emphasises automation in threat detection, breach prediction, and rapid incident response. It also explores how to defend AI-enabled systems, ensuring organisations remain secure in the face of evolving cyber threats.

By blending theoretical knowledge with hands-on practice, the CEH certification enables participants to carry out predictive analysis, identify anomalies, and conduct real-time threat assessments. Whether taken in person or as an online course, this funded training opportunity empowers professionals in Singapore to proactively enhance cybersecurity posture and reduce risks across various digital infrastructures.

CEH provides the most extensive, immersive hands-on lab and practice range experience in the market, along with a thorough training program designed to prepare you for the certification exam.

Operating Systems:

  • Windows 11, Windows Servers, Linux, Android, and Ubuntu
  • CEH includes Windows Server 2022.

Lab and Threat Updates:

  • 221 hands-on labs
  • Cover over 550 attack techniques.
  • Adds Techniques for Establishing Persistence, MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, Evading NAC and Endpoint Security, Fog Computing, Edge Computing, and Grid Computing.
  • Hack AI Systems based on OWASP’s Top 10 AI Attack Vulnerabilities and Threats
  • Explore 4,000+ commercial-grade hacking and security tools

Labs Included:

    • Supply Chain Cyber Attack
    • Ransomware Incident Response
    • Corporate Espionage Investigation
    • MITRE Framework

 

What You Will Learn ?

  • Leverage AI-driven techniques to enhance your ethical hacking skills, automate threat detection, predict breaches, and stay ahead of evolving cyber threats.
  • Key issues plaguing the information security world include ethical hacking, information security controls, laws, and standards.
  • Conduct footprinting and reconnaissance utilizing cutting-edge techniques and tools as an essential pre-attack phase required in ethical hacking.
  • Network scanning countermeasures and techniques.
  • Enumeration countermeasures and techniques.
  • Conducting vulnerability analysis, which involved identifying security weaknesses within the network, communication infrastructure, and end systems of the target organization.
  • Unveiling system and network weaknesses using techniques such as steganalysis attacks, system hacking methodology, covering traced and steganography.
  • Social engineering techniques and how to identify theft attacks to audit human- level vulnerabilities and suggest social engineering countermeasures.
  • DoS/DDoS tools and attack techniques to audit a target and DoS/DDoS countermeasures.
  • Various forms of malware (such as Trojans, viruses, worms, etc.), conducting system audits to detect malware attacks, analyzing malware, and implementing countermeasures.
  • Countermeasures, session hijacking techniques to uncover session management at network-level, authentication/authorization, and cryptographic weaknesses.
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend sniffing.
  • Assessing vulnerabilities in web applications involves utilizing a comprehensive web application hacking methodology to identify web application attacks and implementing appropriate countermeasures.
  • Countermeasures, injection detection tools to detect SQL injection attempts, and SQL injection attack techniques.
  • Web server attacks and a comprehensive attack methodology to audit vulnerabilities in web server infrastructure, and countermeasures.
  • IDS, honeypot and firewall evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
  • Attack vectors on mobile platforms, exploits targeting Android vulnerabilities, and guidelines along with tools for enhancing mobile security.
  • Discover potential risks targeting IoT and OT platforms and acquire strategies for securely safeguarding IoT and OT devices.
  • Wireless encryption, wireless hacking tools, wireless hacking methodology, and Wi-Fi security tools.
  • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Public Key Infrastructure (PKI), cryptography ciphers, cryptanalysis tools, and cryptography attacks.
  • Cloud computing concepts (Serverless computing, container technology), various threats/attacks, and security techniques and tools.

 

Certified Ethical Hacker (CEH) Outline

Module 01: Introduction to Ethical Hacking

Module 02: Foot printing and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypot

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wellness Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT and OT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

 

The objective of this funded CEH course is to assist you in becoming a master of ethical hacking methodology that can be used in an ethical hacking or penetration testing situation. Our expert-led, funded programs can elevate your cybersecurity journey. With online flexibility and comprehensive content, become a certified ethical hacker ready for any penetration testing scenario, all through our convenient online training courses.

This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

System Administrators, Network Administrators and Engineers, Web Managers, Auditors, Ethical Hackers, and Security Professionals in General.

Duration of test: 4 Hours

Amount of exam questions : 125

Format of test : Multiple Choice

Exam Prefix :  312-50 (VUE), 312-50 (ECC EXAM)

Test Delivery : VUE, ECC EXAM

 

Passing Score

To uphold the integrity of our certification exams, EC-Council offers them in various formats, each drawn from distinct question banks. These formats undergo meticulous analysis, including beta testing with relevant sample groups overseen by subject matter expert committees. This ensures not only academic rigor but also real-world relevance. Additionally, we employ a method to gauge the difficulty level of each question, which then contributes to setting an overall cut score for each exam format. To maintain uniform assessment standards, cut scores are established individually for each exam format, ranging from 60% to 85% depending on the specific format challenged.

2025

Jan

20 – 24 (Virtual)

Mar

24 – 28

May

26 – 30 (Virtual)

Jul

28 – 1 Aug

Sep

29 – 3 Oct (Virtual)

Nov

24 – 28

Duration: 5 Days

Course Fee

 

Course Fee w/o GST $2,500.00
Course Fee w. GST (9% effective 1st Jan 2024) $2,725.00
SME (Company Sponsored) – All Singaporean and Permanent Resident Employee $975.00
Singapore Citizens aged 40 years old and above $975.00
Singapore Citizens below 40 years old and Permanent Residents $1,475.00

Exam Fee

  • Exam Voucher is included in course fee above.

Certification Body

Skillsfuture Credit

All courses funded by WSG-SSG are eligible for Skillsfuture Credit, which individuals aged 25 and above in Singapore can utilize for course enrollment.

Post-Secondary Education Account (PSEA)

All Singaporeans below 31 years old are entitled to utilize their PSEA account for this following course.

Participants may also opt to utilize his/her sibling’s PSEA account balance (if there are insufficient balances in your account).

Book Now

    Leave a Comment

    Your email address will not be published.