NTUC LearningHub

The C|EH® v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and hands-on application through our cyber range.Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.”

 

With over 220 hands-on labs conducted in our cyber range environment, you will have the opportunity to practice every learning objective on live machines and vulnerable targets in the course. Pre-loaded with over 3,500 hacking tools and various operating systems, you will
gain unprecedented exposure and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems in the industry. Our range is web accessible, making it easier for you to learn and practice from anywhere.

What’s Covered:

 

  • 100% virtualization for a complete learning experience
  • After login, you will have full access to preconfigured targets, networks, and the attack tools necessary to exploit them:

• Pre-configured vulnerable websites

• Vulnerable, unpatched operating systems

• Fully networked environments

• 3,500+ hacking tools

• And much more!

 

  • Wide range of target platforms to hone your skills
  • Objective-oriented flags for critical thinking and applied knowledge assessment
  • Cloud-based cyber range
  • 519 attack techniques

 

Upon completing the course, students will be able to:

  • Carry out threat modelling and secured source code review
  • Conduct authorised penetration testing of systems consisting of a range of penetration testing methodologies, tools and techniques
  • Use a suite of network monitoring and vulnerability scanning tools to assess the threats and vulnerabilities in a system
  • Identify vulnerability exploitations and potential attack vectors into a system
  • Analyse vulnerability scan results to size and assess security loopholes and threats
  • Evaluate if current systems can overcome emerging threats and hacking techniques
  • Assess current security practices and controls against expected performance parameters or guidelines
  • Develop a vulnerability assessment and penetration testing report, highlighting key threats and areas for improving system security
  • Understand process and techniques for secured source code review
  • Identify threat modelling techniques
  • Discover penetration testing techniques and methodologies
  • Identify penetration testing tools and their usage
  • Understand network monitoring tools and their usage
  • Understand vulnerability assessment tests and interpretation of results
  • Identify range and types of security loopholes and threats

Pre-requisites

 

 

Knowledge, Skills & Experience

You should have some foundational knowledge and skills in network security and IT.

 

While there are no formal prerequisites for CEH certification, you should demonstrate a good understanding of the exam topics and some familiarity and or experience in information security.

 

It is recommended that you have prior formal trainings in the following:

  • CompTIA A+

  • CompTIA Network +

  • CompTIA Security+

  • EC-Council Certified Network Defender (CND) (SF)

 

Bonus*

For Learner's who do not have any prior network security knowledge, after signing up for this course we will be giving you a free Network Defense Essentials (NDE) and Ethical Hacking Essentials (EHE) E-Book and Video to prepare you.

Course Outline

1. New Learning Methodology: Learn – Certify – Engage – Compete
2. Compete: new challenges every month to test your job-ready skills!
3. 100% Compliance to NICE 2.0 Framework
4. Based on a comprehensive industry-wide job-task analysis
5. Hands-on learning labs
6. Practice Range
7. Global C|EH community competitions
8. Cheat Sheet
9. Coverage of the latest malware
10. Lab-intensive program (Every learning objective is demonstrated using labs)
11. Hands-on program (More than 50% of training time is dedicated to labs)
12. Lab environment simulates a real-time environment(Lab setup simulates real-life networks and platforms)
13. Covers the latest hacking tools (Based on Windows, macOS, and Linux)
14. Latest OS covered and a patched testing environment
15. All the tool screenshots are replaced with the latest version
16. All the tool listing slides are updated with the latest tools
17. All the countermeasure slides are updated

Certificate Obtained and Conferred by

 

  • Certificate of Completion from NTUC LearningHub

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.

  • Statement of Attainment (SOA) from SkillsFuture Singapore

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):

    • ICT-DIT-3012-1.1 Security Assessment and Testing
  • External Certification

After completing this course and upon passing the official “EC Council Certified Ethical Hacker” certification exam, candidates will receive the official certification from EC Council. The certification is governed and maintained by EC Council.

Categories
More Information
  • NTUC LearningHub
  • No comments yet.
  • Add a review
    error: Content is protected !!