top of page

Certified Ethical Hacker

Course Overview

In an ever-evolving threat landscape, defending your network infrastructure requires the same mindset and tools that malicious hackers use. Certified Ethical Hacker (CEH) empowers you to spot vulnerabilities before they can be exploited—teaching you to think, act, and test like a real hacker, but with the goal of strengthening security defenses. By adopting a hacker’s approach under ethical and controlled conditions, you’ll learn to identify and fix flaws in networks and systems, effectively reducing the risk of a successful cyber-attack.

certified-hacker.jpg
Young Programmer

Course Objectives

  • Adopt a Hacker’s Mindset: Understand how attackers gather information, locate system weaknesses, and exploit them.

  • Assess Vulnerabilities: Conduct penetration tests that mimic real-world hacking attempts with minimal disruption to services.

  • Enhance Security: Learn the methodologies that ethical hackers use to help organizations bolster their defenses against threats.

  • Stay Ahead of Cybercriminals: Gain insights into emerging threat vectors, hacking tools, and modern intrusion techniques.

 

Key Benefits

  • Vendor-Neutral Credential: CEH is recognized worldwide, proving your expertise in network security and ethical hacking principles.

  • Stronger Security Skill Set: Ideal for security officers, IT administrators, auditors, and anyone concerned about data and network integrity.

  • High-Demand Certification: As cyber threats escalate, qualified ethical hackers are vital for safeguarding critical infrastructure.

  • Practical, Hands-On Approach: Learn advanced hacking concepts like footprinting, reconnaissance, system hacking, sniffing, and penetration testing.

 

Target Audience

  • Security Officers and Auditors ensuring compliance and secure operations.

  • Network Administrators and Firewall Administrators maintaining robust network defense.

  • Security Professionals aspiring to expand their offensive and defensive skill sets.

 

Prerequisites

  • Solid knowledge of TCP/IP

  • Background in Information Systems and Security

  • 12+ months of experience in networking technologies

 

Examination Details

  • Number of Questions: 125

  • Passing Score: 70%

  • Duration: 4 Hours

  • Format: Multiple Choice

  • Delivery: Prime Prometric (IBT), VUE, and APTC

 

Course Outline

  1. Introduction to Ethical Hacking

  2. Footprinting and Reconnaissance

  3. Scanning Networks

  4. Enumeration

  5. System Hacking

  6. Trojans and Backdoors

  7. Viruses and Worms

  8. Sniffers

  9. Social Engineering

  10. Denial of Service

  11. Session Hijacking

  12. Hacking Web Servers

  13. Hacking Web Applications

  14. SQL Injection

  15. Hacking Wireless Networks

  16. Hacking Mobile Platforms

  17. Evading IDS, Firewalls, and Honeypots

  18. Buffer Overflows

  19. Cryptography

  20. Penetration Testing

 

Next Steps

Ready to defend your organization from ever-evolving threats? Enroll now in the Certified Ethical Hacker (CEH)course. Gain the necessary skills to break into systems ethically and reveal vulnerabilities before malicious hackers do.

CONTACT US

MMID Studio, 3rd Floor Westlands Road, Nairobi, Kenya
Email: info@harmony.co.ke
Phone: +254 020 2473145/6

CONNECT WITH US

  • Facebook
  • Twitter
  • LinkedIn

© 2025 Harmony Solutions Ltd. All rights reserved.

ITIL® / PRINCE2® / PRINCE2 Agile® / MSP® / M_o_R® / P3O® / MoP® / MoV® and the Swirl Device® are registered trademarks of PeopleCert group. Used under the license from PeopleCert. All Rights Reserved. AgilePM® and AgileBA® are registered trademarks of Agile Business Consortium Limited. All rights reserved.IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by the International Institute of Business Analysis.

bottom of page