Build your IT career the UNIQUE way.
facebook twitter
Home>>Certified Ethical Hacking (CEH)




CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest Hacking Techniques, methodologies, tools, tricks and security measures. Unlike other theoretical training, you will be immersed in interactive sessions and there will be hands-on lab. You can explore the newly gained knowledge right away in your classroom by trying to test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems.


Key Features in CEH

  • CEH iLabs (subscription based) – Students now can dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection. This is a cloud based subscription service from EC-Council designed to deliver serious hands on practice for the information security professional.
  • The cloud portal enables a course participant to launch an entire range of target machines and access them remotely with just a few clicks. It is the most cost effective, easy to use, live range lab solution available globally today.
  • CEH focuses on addressing security issues to the latest operating systems including Windows 8 and Windows Server 2012.
  • CEH focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure.
  • Provide adequate ICT skills and knowledge which will enable the graduates to be competent in solving the ICT related problems relevant to their level of study
  • CEH certified members will receive their certification bearing the ANSI stamp of quality.


Get the Knowledge on

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing


"...Having the CEH certification has helped open the door to a new level of opportunity
by increasing the confidence of my clients in my expertise, opening their eyes to the real threat,
and by Pen-testing our own products for vulnerabilities and provide a higher quality of service."

- Terry P Cutler - Novell