Cyberattack cases have been rising over the past few years – and the demand for cyber security professionals will continue to increase rapidly.

Security experts designed the course to imitate real-time cyber-attack scenarios. The part-time course allows you access to over 2200 most used hacking tools to engage you in the world of hacking.

With over 1685 specially designed slides filled with immersive visuals, the concepts are presented to you through a fully engaging 5-day, interactive class held by one of our certified trainers.

The goal of this course is to aid you in fully grasping and executing the tools and techniques that hackers use to detect, test, hack and secure any computer system and virtual network ethically.


Note: This course prepares you for the EC-Council CEH exam 312-50.

Upon completion of the course, you will gain a comprehensive understanding of various attack vectors, ethical hacking phases, and preventative countermeasures. It will educate you on how hackers think and act to equip you better to set up your security infrastructure and prevent future cyberattacks. By understanding system weaknesses and vulnerabilities, organizations can strengthen their system security controls to minimize the risk of an incident.

The part-time program was built to integrate a systematic process and hands-on environment across every ethical hacking methodology and domain, allowing you to work towards attaining the knowledge and skills needed to perform the job of an ethical hacker. This program will introduce you to a different posture towards the measures and responsibilities required to be secure.

The 11th version of CEH incorporates the most current operating systems, tools, exploits, tactics, and technologies. Here are some significant updates:

  • Integrating Parrot Security OS
  • Re-Mapped to NIST/NICE Framework
  • Enhanced IoT, Cloud Security, and OT Modules
  • Modern Malware Analysis
  • Covering the Latest Threats – Fileless Malware
  • Operating Systems and New Lab Designs
  • Hands−on Focus and Increased Lab Time
  • Industry’s Most Comprehensive Tools Library


What You Will Learn ?

  • Critical issues include plaguing the information security world, information security controls, ethical hacking, laws, and standards.
  • Perform reconnaissance and footprinting using the latest footprinting tools and methods as a vital pre-attack phase essential in ethical hacking.
  • Network scanning methods and scanning countermeasures.
  • Enumeration countermeasures and enumeration techniques.
  • Vulnerability analysis to identify security loopholes in the target organization’s network, end systems and communication infrastructure .
  • System hacking steganography, methodology, steganalysis attacks, and covering tracks to discover network and system vulnerabilities.
  • Different types of malware (Virus, Trojan, worms, etc.), malware analysis, system auditing for malware attacks, and countermeasures.
  • Packet sniffing techniques to discover countermeasures to defend sniffing and network vulnerabilities.
  • Social engineering methods and how to identify theft attacks to audit human- level vulnerabilities and suggest social engineering countermeasures.
  • Session hijacking methods to discover authentication/authorization, network-level session management, cryptographic weaknesses, and countermeasures.
  • DoS/DDoS attack techniques and tools to audit a target and countermeasures.
  • An extensive method of auditing web server vulnerabilities and countermeasures for web server attacks.
  • Web application attacks and extensive web application hacking techniques to audit vulnerabilities in web applications and countermeasures.
  • Wireless hacking methodology and tools, wireless encryption and Wi-Fi security tools.
  • Mobile platform attack vector, mobile security guidelines and tools and android vulnerability exploitations.
  • Cloud computing concepts (serverless computing, container technology), security techniques, various attacks/threats and tools.
  • Honeypot, Firewall and IDS evasion tools and techniques to audit a network perimeter for weaknesses and countermeasures.
  • Penetration testing, vulnerability assessment, security audit, and penetration testing roadmap.
  • Threats to IoT and OT platforms and learn how to securely defend IoT and OT devices .
  • SQL injection attack methods, injection detection tools to detect SQL injection attempts, and countermeasures.
  • Cryptography cyphers, cryptography attacks, cryptanalysis tools and Public Key Infrastructure (PKI).


Course Outline

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Session Hijacking
  • System Hacking
  • Sniffing
  • Social Engineering
  • Vulnerability Analysis
  • Malware Threats
  • Denial-of-Service
  • Evading IDS, Firewalls, and Honeypots
  • SQL Injection
  • IoT Hacking
  • Cloud Computing
  • Cryptography
  • Hacking Web Servers
  • Hacking Web Applications
  • Hacking Wireless Networks
  • Hacking Mobile Platforms

The course is designed for:

  • Security Analysts
  • Security Consultants
  • Security Researchers
  • Security Officers
  • Security Professionals
  • Site Administrators
  • Anyone with an interest in ethical hacking, infosec and cyber security.
  • Anyone who is concerned about the integrity of a network infrastructure.

Number of Questions : 125

Test Duration : 4 Hours

Test Format : Multiple Choice

Test Delivery : ECC EXAM, VUE

Exam Prefix : 312-50 (ECC EXAM), 312-50 (VUE)


Passing Score

As part of our commitment to maintaining high standards of certification, EC-Council Exams are offered in a variety of formats (e.g. different question banks). Our exams are tested with appropriate sample groups under the supervision of a committee of subject matter experts who ensure both academic rigour and real -world relevance. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall cut score for each exam form. Cut scores are set “per exam form” to ensure equal assessment standards across all forms. Cut scores can vary from 60% to 85 %, depending on the exam form.



24 Feb, 2, 9, 16, 23


11, 18, 25, 1 Jun, 8 Jun


31 Aug, 7, 14, 21, 28


23, 30 Nov, 7, 14, 21

Duration: 5 Days

Course Fee


Course Fee excluding GST $2,500.00
Course Fee including GST (9% effective 1st Jan 2024) $2,725.00
SME (Company Sponsored Employees) – All Singaporeans and Permanent Residents $975.00
Citizens of Singapore aged 40 years and older $975.00
Singapore Citizens below 40 years old and Permanent Residents $1,475.00

Exam Fee

Exam Voucher is included in course fee above.

Certification Body

Skillsfuture Credit

All WSG-SSG Funded course are eligible for Skillsfuture Credit. Singaporean Aged 25 and above are eligible to use their Skillsfuture credit for course enrolment.

Post-Secondary Education Account (PSEA)

Singaporeans under 31 years of age may enrol in this course using their PSEA accounts.
Alternatively, participants can use the balances of their siblings’ PSEA accounts (if there are insufficient balances in your account).

Book Now

    Leave a Comment

    Your email address will not be published.