CEH - Certified Ethical Hacker | AKTINA IT

CEH - Certified Ethical Hacker

  • Course Overview
  • Course Outline
  • Course Arrangements


The Certified Ethical Hacker (CEH) course will provide participants with the skills and knowledge necessary to learn how to scan, test, hack and secure a system as well as prepare for the latest Certified Ethical Hacker (CEH) exam.It will also provide participants with the tools and techniques used by hackers and information security professionals alike to break into an organization. It will immerse participants into the Hacker Mindset so that they will be able to defend against future attacks. It will put them in the driver’s seat of a hands-on environment with a systematic ethical hacking process as well as expose them to an entirely different way of achieving optimal information security posture in their organization; by hacking it! It will cover the Five Phases of Ethical Hacking of Reconnaissance, Gaining Access, Enumeration, Maintaining Access and covering tracks.


 AKTINA is an EC-Council Accredited Training Center (ATC), authorised to offer its official courses and exams.


Information Security officers, IT auditors, security professionals, site administrators Penetration Testers and anyone who is concerned about the integrity of the network infrastructure.

At Course Completion: 


After completing this course, students will have obtained deep knowledge in the following areas:

  • Footprinting and reconnaissance
  • Hacking web servers, web applications, and wireless networks
  • Cryptography
  • Penetration testing
  • Social engineering
  • Trojans, viruses, and worms
  • Evading IDS, firewalls, and honeypots
  • Enumeration
  • Buffer overflows
Certified Professional Exam(s): 
Profesional Certification(s): 
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
Lab 1: Footprinting and Reconnaissance
•        Discover Network Paths with the Ping Utility
•        Query DNS with nslookup Utility
•        Search for People Using the AnyWho Online Tool
•        Analyze Domain and IP Address Queries Using SmartWhois
•        Trace Network Routes Using Path Analyzer Pro
•        Trace E-Mail Delivery Routes with the eMailTrackerPro Tool
•        Copy a Website with the HTTrack Web Copier Tool
•        Extract Web Data with the Web Data Extractor Tool
•        Search for Web Vulnerabilities with Search Diggity Tool
3. Scanning Networks
Lab 2: Scanning Networks
•        Scan System and Network Resources Using Advanced IP Scanner
•        Monitor TCP/IP Connections Using the CurrPorts Tool
•        Scan for Network Vulnerabilities Using the GFI Languard Network Scanner
•        Scan Hosts for Services Using Nmap
•        Scan for Vulnerabilities with the Nessus Tool
•        Map a Network Using Global Network Inventory Tool
•        Create Proxies with Proxy Workbench Tool
•        Perform Tunneling with HTTPort/HTTHost Tool
•        Create Packets Using Colasoft Packet Builder
•        Perform Traffic Analysis with the Dude Sniffer Tool
4. Enumeration
Lab 3: Enumeration
•        Enumerate Services with Zenmap
•        Enumerate Hosts Using the SuperScan Tool
•        Enumerate Networks with SoftPerfect Network Scanner
•        Enumerate a Network with SolarWinds Toolset
5. System Hacking
Lab 4: System Hacking
•        Extracting Administrator Passwords Using LCP
•        Hiding Files Using NTFS Streams
•        Search for Alternate Data Streams using the ADS Spy Tool
•        Hide Content with Stealth Files Steganography
•        Extract Passwords with the PWdump7 Tool
•        Generate Rainbow Tables with the Winrtgen Tool
•        Crack Hashed Passwords using the Rainbowcrack Tool
•        Crack Hashed Passwords with the L0phtCrack Tool
•        Execute Files Remotely with the RemoteExec Tool
•        Hide Content with the Snow Steganography Tool
•        Control System Auditing with the Auditpol Utility
•        Reset Passwords with the CHNTPW.iso Tool
•        Monitor Users with the Spytech SpyAgent Tool
•        Hide Content with the QuickStego Tool
6. Malware Threats
Lab 5: Trojans and Backdoors
•        Create a Server Using the ProRat Tool
•        Create a Trojan with the OneFile EXE Maker Tool
•        Create a Server with the Proxy Server Trojan
•        Create a Server with the HTTP Trojan
•        Create a Server with Atelier Web Remote Commander
•        Create a Trojan with Biodox Trojan Creator Tool
Lab 6: Viruses and Worms
•        Create a Virus Using the JPS Virus Maker Tool
•        Reverse Engineer Code Using the IDA Pro Analysis Tool
•        Scan for Viruses with Kaspersky Anti-Malware
•        Generate a Worm Using Internet Worm Maker Thing Tool
•        Create a Backdoor with Metasploit
7. Sniffing
Lab 7: Sniffers
•        Analyze Packet Captures Using the OmniPeek Network Analyzer
•        Spoof MAC Address Using SMAC
•        Analyze a Network Using the Colasoft Capsa Network Analyzer
•        Sniff Network Traffic with Wireshark
•        Perform ARP Poisoning with Cain
•        Detect Hosts in Promiscuous Mode with PromqryUI
8. Social Engineering
Lab 8: Social Engineering
•        Detect Phishing Using Netcraft
•        Create a Rogue Website with Social Engineering Toolkit (SET)
9. Denial of Service
Lab 9: Denial of Service
•        Use Hping to Create a Denial of Service Attack
•        Use DoSHTTP to Create a Denial of Service Attack
10. Session Hijacking
11. Hacking Webservers
Lab 11: Hacking Webserver
•        Footprint Webservers with the HTTP Recon Tool
•        Footprint a Webserver Using ID Serve
•        Attack Webservers with Metasploit
12. Hacking Web Applications
Lab 12: Hacking Web Applications
•        Create a Cross-Site Scripting Attack with JavaScript
•        Explore the Vampire Vulnerability Scanner
•        Scan a Website for Vulnerabilities Using Acunetix
13. SQL Injection
Lab 13: SQL Injection
•        Perform SQL Injection Attacks on MS SQL Database
•        Scan an Internet Site with IBM App Scan Vulnerability Scanner
•        Scan a WebServer with N-Stalker Vulnerability Scanner
14. Hacking Wireless Networks
Lab 14: Hacking Wireless Networks
•        Analyze WiFi Traffic with AirPcap with Wireshark
•        Crack the WEP Key for Captured Traffic with Aircrack-ng
•        UnWEP Bulk Captured Traffic with OmniPeek Once Key is Known
15. Hacking Mobile Platforms
16. Evading IDS, Firewalls, and Honeypots
Lab 15: Evading IDS and Firewalls
•        Configure the Snort Intrusion Detection Tool
•        Use the Kiwi Syslog Viewer to Analyze Snort Logs
•        Install, Configure, and Attack the KFSensor Honeypot Tool
17. Cloud Computing
Lab 16: Buffer Overflow
•        Code, Compile, and Execute a Buffer Overflow Attack
18. Cryptography
Lab 17: Cryptography
•        Hash Files and Data Using HashCalc
•        Encrypt Data Using the Advanced Encryption Package
•        Encrypt File Systems with TrueCrypt
•        Encrypt Data with the BCTextEncoder Tool


Dates and Times: 
Dec 15, 18, 19, 20, 21 at 8:00 - 3:30 a.m.
Duration (Hours): 

AKTINA Training Center
20 Loukis Akritas street, 1st floor
2064 Strovolos
(behind Kykko secondary schools)


Newsletter Subscription

Subscribe with your email address to stay up to date.

Find a Course

Go to top