WhatsApp Chat on WhatsApp



Logo 1
Logo 1
Logo 1
Logo 3
Logo 4
Logo 5
Logo 4
Logo 1
Logo 1
Logo 1
Logo 3
Logo 4
Logo 5
Logo 4
Course

Course Details

EC Council Licensed
05 days/ 3 Months Course
Once a Week, 4 Hours a Day
Price CEH: 230,000 LKR
Flexible Hours
Limited time offer: 130,000 LKR
Morning & Evening Classes
1-on-1 Training
Course

Overview

The C|EH v13 program offers a comprehensive immersion into practical ethical hacking with the interactive C|EH practice environment. Through C|EH Engage, participants develop their skills and demonstrate their ability to succeed as ethical hackers. A new addition to C|EH v13 allows learners to participate in a simulated ethical hacking engagement for the first time. This four-stage experience challenges students to apply critical thinking as they work through each phase, capturing specific flags to showcase their knowledge and skills. This hands-on approach, delivered in EC-Council’s latest “Cyber Range,” provides a safe environment for skill application without real-world consequences.

Through C|EH Engage, learners transition from theory to practice, undertaking a simulated hacking engagement that replicates real-world scenarios. This four-part challenge, structured in a capture-the-flag format, requires students to engage with an emulated organization, tackling critical flag-based questions. By progressing through these stages, participants gain valuable hands-on experience that mirrors a full-scale ethical hacking operation.


Training Plan

  • Course Name: Certified Ethical Hacker.
  • Duration: 05 days / 03 months
  • Weekly Classes: 1 Class / 4 hours.
  • Delivery Options: Online or Physical Classroom.
  • With internationl exam (CEH): 230,000 LKR
  • Installment Plan for (CEH): Call for more details about installment options
  • Practical Training: Yes, with Ec council portal


Training Batch Schedule

Online Batch

Starting December 2024



Prerequisites

Basic understanding of networking concepts.
Familiarity with operating systems and cybersecurity fundamentals.


Benefits of getting CEH Certified

Think Like a Hacker

This certification will train you to think like a hacker and work towards identifying and mitigating threats in the field of cyber security.

Learn Hacking Tools

You will be able to learn real hacking tools including Linux-based tools commonly used by hackers.

Advance Your Career

You will be able to advance in your career and negotiate better pays when you are a certified ethical hacker.



Course Modules

Module Details
Module 01: Introduction to Ethical Hacking Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Module 02: Footprinting and Reconnaissance Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking.
Module 03: Scanning Networks Learn different network scanning techniques and countermeasures.
Module 04: Enumeration Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Module 05: Vulnerability Analysis Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.
Module 06: System Hacking Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Module 07: Malware Threats Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.
Module 08: Sniffing Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Module 09: Social Engineering Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Module 10: Denial-of-Service Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Module 11: Session Hijacking Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Module 12: Evading IDS, Firewalls, and Honeypots Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Module 13:Hacking Web Servers
  • Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Module 14:Hacking Web Applications
  • Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.
Module 15:SQL Injection
  • Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Module 16:Hacking Wireless Networks
  • Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17:Hacking Mobile Platforms
  • Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18:IoT Hacking
  • Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Module 19:Cloud Computing
  • Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.
Module 20:Cryptography
  • Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.


Why Choose ATN Campus Sri Lanka for Your CEH?

  • Experienced Panel of Lecturers - Industry professionals with extensive experience.
  • Quality Teaching - Individual attention and continuous monitoring of student progress.
  • Language Preferences - Instructions provided in languages like English, Hindi, Tamil, Malayalam, Sinhala.
  • Recovery Classes - Support sessions available for missed classes due to valid reasons.
  • Practical Training - Hands-on experience with real Cisco devices and software.


CEH v13 The world's first ethical hacking certification with a 4-phase AI-powered learning framework.

  • Learn: Access courseware and cyber range to gain essential skills.
  • Certify: Demonstrate knowledge with both knowledge-based and practical exams, earning industry recognition.
  • Engage: Experience hands-on learning with a live cyber range for real-world experience.
  • Compete: Participate in a global ethical hacking competition to earn respect and prove your skills.

IT Security Expert Combo Exam Details

Exam Title Exam Code Exam Cost Exam Format No of questions Passing score Duration Language Choice
CEH Online Exam Certified Ethical Hacker (C|EH®) Certification 1150 AED Multiple choice 125 Depends on EC Council 4 Hours English

Average Salaries for IT Security Experts

United States
$95,000 USD
United Kingdom
£50,000 GBP
Australia
$80,000 AUD
Sri Lanka
140,000 AED
Singapore
$70,000 SGD
India
₹600,000 INR
Sri Lanka
1.2 Million LKR
Testimonial

Our Students Say!

Lets Watch What Our Students Say !