Certified Ethical Hacker (CEH)

Preparation Training – EC-Council

Awarded Credential:

Certificate of Completion

Total Hours:


ALL FEES Included FOR:

Course bookTop Rated Practice Exams
EC-Council Certification Voucher

Total Tuition & Fees:



This certification preparation program is for individuals seeking the CEH certification. This program will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. The CEH, is the first part of a 3 part EC-Council Information Security Certification Focus Area which helps you master hacking technologies. You will become a hacker, but an ethical one!

Flexible Schedule

Personalized, Flexible IT and Cyber Training courses begin weekly. Course content in online with a structured schedule for keeping on-track to complete the course in 12 weeks or less. Call or email ABL Cyber Academy to discuss a flexible training schedule to meet you work or other demands on your time.

Cyber / IT Practice Range

This is real-world, hands on skills building lab, provided with every course. Learn security scanning and hacking tools using Live Range Targets. All students learn NMAP, Metasploit, BurpSuite, Wireshark and dozens more. Learn how to hash files use encryption, identify application and network systems vulnerabilities. ABL Cyber Range facilities are open to every student 6 days a week, or access VPN 24/7.

Cyber and IT Mentoring

In-person and virtual meetings are available for One-on-One Mentoring by a CEH mentor, which helps get you ready to pass your certification and SHINE in job interviews. Your certification and Cyber IT Range skills get ABL Academy student selected over other job applicants.


Intro to Ethical Hacking, Foot printing & Reconnaissance, Scanning Networks, & Enumeration
  • Topic A: Information Security Overview

  • Topic B: Information Security Threats and Attack Vectors

  • Topic C: Hacking Concepts, Types, and Phases

  • Topic D: Ethical Hacking Concepts and Scope

  • Topic E: Information Security Controls

  • Topic F: Information Security Laws and Standards

  • Topic G: Foot printing Concepts

  • Topic H: Foot printing Methodology

  • Topic I: Foot printing Tools

  • Topic J: Foot printing Countermeasures

  • Topic K: Foot printing Penetration Testing

  • Topic L: Overview of Network Scanning

  • Topic M: CEH Scanning Methodology

  • Topic N: Scanning Pen Testing

  • Topic O: Enumeration Concepts

  • Topic P: NetBIOS Enumeration

  • Topic Q: SNMP Enumeration

  • Topic R: LDAP Enumeration

  • Topic S: NTP Enumeration

  • Topic T: SMTP Enumeration

  • Topic U: Enumeration Countermeasures

  • Topic V: SMB Enumeration Countermeasures

  • Topic W: Enumeration Pen Testing

System Hacking, Malware Threats, & Sniffing
  • Topic A: CEH Hacking Methodology (CHM)
  • Topic B: CEH System Hacking Steps
  • Topic C: Hiding Files
  • Topic D: Covering Tracks
  • Topic E: Penetration Testing
  • Topic F: Introduction to Malware
  • Topic G: Types of Trojans
  • Topic H: Virus and Worms Concepts
  • Topic I: Malware Reverse Engineering
  • Topic J: Malware Detection
  • Topic K: Countermeasures
  • Topic L: Anti-Malware Software
  • Topic M: Penetration Testing
  • Topic N: Sniffing Concepts
  • Topic O: MAC Attacks
  • Topic P: DHCP Attacks
  • Topic Q: ARP Poisoning
  • Topic R: Spoofing Attack
  • Topic S: DNS Poisoning
  • Topic T: Sniffing Tools
  • Topic U: Sniffing Detection Techniques
  • Topic V: Sniffing Pen Testing
Social Engineering, Denial-of-Service, Session Hijacking, & Hacking Webservers
  • Topic A: Social Engineering Concepts
  • Topic B: Social Engineering Techniques
  • Topic C: Impersonation on Social Networking Sites
  • Topic D: Identity Theft
  • Topic E: Social Engineering Countermeasures
  • Topic F: Penetration Testing
  • Topic G: DoS/DDoS Concepts
  • Topic H: DoS/DDoS Attack Techniques
  • Topic I: Botnets
  • Topic J: DDoS Case Study
  • Topic K: Counter-measures
  • Topic L: DoS/DDoS Protection Tools
  • Topic M: DoS/DDoS Attack Penetration Testing
  • Topic N: Session Hijacking Concepts
  • Topic O: Application Level Session Hijacking
  • Topic P: Network-level Session Hijacking
  • Topic Q: Session Hijacking Tools
  • Topic R: Session Hijacking Pen Testing
  • Topic S: Webserver Concepts
  • Topic T: Webserver Attacks
  • Topic U: Attack Methodology
  • Topic V: Webserver Attack Tools
  • Topic W: Patch Management
  • Topic X: Webserver Security Tools
  • Topic Y: Webserver Pen Testing
Hacking Web Applications, SQL Injection, Hacking Wireless Networks, & Hacking Mobile Platforms

Topic A: Web App Concepts/Threats

Topic B: Web App Hacking Methodology

Topic C: Web Application Hacking Tools

Topic D: Security Tools

Topic E: Web App Pen Testing

Topic F: SQL Injection Concepts

Topic G: Types of SQL Injection

Topic H: SQL Injection Methodology

Topic I: SQL Injection Tools

Topic J: Evasion Techniques

Topic K: Counter-measures

Topic L: Wireless Concepts

Topic M: Wireless Encryption

Topic N: Wireless Threats

Topic O: Wireless Hacking Methodology

Topic P: Wireless Hacking Tools

Topic Q: Bluetooth Hacking

Topic R: Counter-measures

Topic S: Wireless Security Tools

Topic T: Wi-Fi Pen Testing

Evading IDS, Firewalls, & Honeypots, Cloud Computing, & Cryptography

Topic A: Mobile Platform Attack Vectors

Topic B: Hacking Android OS

Topic C: Hacking iOS

Topic D: Hacking Windows Phone OS

Topic E: Hacking BlackBerry

Topic F: Mobile Device Management (MDM)

Topic G: Mobile Security Guidelines and Tools

Topic H: Mobile Pen Testing

Topic I: IDS, Firewall and Honeypot Concepts/System

Topic J: Evading IDS

Topic K: Evading Firewall

Topic L: IDS/Firewall Evading Tools

Topic M: Detecting Honeypots

Topic N: Penetration Testing

Topic O: Cloud Computing Threats/Attacks

Topic P: Cloud Security

Topic Q: Cloud Security Tools

Topic R: Cloud Penetration Testing

Topic S: Cryptography Concepts

Topic T: Encryption Algorithms

Topic U: Cryptography Tools

Topic V: Public Key Infrastructure(PKI)

Topic W: Email Encryption

Topic X: Disk Encryption

Topic Y: Cryptography Attacks

Topic Z: Cryptanalysis Tools


EC-Council Organization

Certification Recommendations/Prerequisites

To be eligible for the CEH certification, you must attend an official training class (from an EC-Council Authorized Training Provider) OR have at least two years of Internet Security related experience. 

Students who complete an Advanced Business Learning EC-Council program are automatically eligible to sit for the certification exam due to their Authorized Training Provider status.

EC-Council Organization

Certification Exam Requirements

To be certified, students must pass the certification exam in the allotted period to complete the 125-question exam.

ABL Cyber Range and Academy
an Arizona Licensed School

ABL Cyber Academy - All Rights Reserved ©