Introduction
In a digital era where technological innovations accelerate and cyber threats grow in complexity, the role of the Ethical Hacker emerges as a vital guardian of information security and digital systems. Ethical hacking is an essential proactive method to discover and remediate vulnerabilities before they are exploited by malicious actors.
In the Kingdom of Saudi Arabia, aligned with strategic goals for digital transformation, there is a surging demand for specialized cybersecurity talent. Obtaining the Certified Ethical Hacker (CEH) credential has become a key milestone for excellence in this field, as it reflects a global standard of proficiency and expertise. The CEH certification offers significant value to professionals, standing as one of the most sought-after credentials in the job market, providing advanced practical skills in system analysis, network testing, and security auditing.
General Objective
-
To help trainees master the ethical hacking methodology used in professional penetration testing scenarios.
-
To empower participants with high-demand hacking skills required in both public and private sectors.
-
To prepare trainees to work within a Red Team environment, focusing on attacking systems and accessing networks, applications, and critical databases within secured environments.
-
To understand attack strategies and creative attack vectors that simulate the skills and creativity of malicious hackers.
Detailed Learning Objectives
By the end of the program, the trainee will be able to:
-
Apply the full Attack Life Cycle from reconnaissance to covering tracks.
-
Utilize Open Source Intelligence (OSINT) tools.
-
Perform port and service scanning using Nmap.
-
Analyze system misconfigurations.
-
Execute password attacks (Brute Force and Dictionary attacks).
-
Analyze network traffic and capture packets using Wireshark.
-
Exploit common vulnerabilities such as Buffer Overflow, SQL Injection, and XSS.
-
Assess security risks and prepare technical findings reports.
Training Modules
Module 1: Introduction to Ethical Hacking & Reconnaissance
-
Core definitions: Ethical Hacker, Hacker classes, and the CEH role.
-
Legal aspects: Penetration testing authorization, NDA, and legal boundaries.
-
The Hacking Cycle: Recon → Scan → Exploit → Maintain → Cover Tracks.
-
OSINT Sources: WHOIS, DNS records, SHODAN, crt.sh, Social Engineering, and Google Dorking.
-
Tools: Maltego, Recon-ng, theHarvester, nslookup, dig.
-
Hands-on: Setting up the Kali Linux VM and performing DNS/WHOIS enumeration.
Module 2: Network Scanning & Vulnerability Analysis
-
Scanning basics: TCP SYN, Connect, UDP, ACK, and FIN scans.
-
Evasion techniques: Timing and Fragmentation.
-
OS Fingerprinting and Banner Grabbing.
-
Nmap Mastery: Using the Nmap Scripting Engine (NSE).
-
Vulnerability Scanning: Nessus vs. OpenVAS; understanding CVE and CVSS scores.
-
Web app scanning using Nikto and Dirb.
-
Hands-on: Running a full network scan and generating a prioritized vulnerability report.
Module 3: System Hacking
-
Password Cracking: Brute-forcing, dictionary attacks, and using Hashcat/John the Ripper.
-
Creating Payloads: Reverse and Bind Shells.
-
Metasploit Framework: Searching, exploiting, and managing Meterpreter sessions.
-
Privilege Escalation: SUID bits, sudo misconfigurations (Linux), and Windows escalation checks.
-
Persistence and Covering Tracks (Theoretical & Ethical focus).
-
Hands-on: Exploiting a Metasploitable VM and escalating privileges.
Module 4: Malware Threats
-
Malware types: Viruses, Worms, Trojans, Ransomware, Rootkits, and Spyware.
-
Distribution vectors: Email attachments, Drive-by downloads, and Removable media.
-
Static Analysis: PE headers, strings, and VirusTotal.
-
Dynamic Analysis: Monitoring behavior in an isolated Sandbox.
-
Prevention: Patching, Backups, and Anti-Malware policies.
Module 5: Sniffing, Social Engineering & DoS
-
Sniffing: Capturing packets (Wireshark), analyzing sessions, and ARP poisoning basics.
-
Social Engineering: Phishing, Vishing, Smishing, and the Social-Engineer Toolkit (SET).
-
DoS/DDoS: SYN floods, Amplification attacks, and Mitigation strategies (WAF, CDNs, Scrubbing).
-
Hands-on: Analyzing an HTTP session in Wireshark and designing an educational phishing scenario.
Module 6: Web Attacks, Wireless Hacking & Evasion
-
Web Attacks: OWASP Top 10 (SQLi, XSS, CSRF, RCE).
-
Tools: Burp Suite (Proxy, Repeater), SQLmap, and OWASP ZAP.
-
Wireless Security: WEP/WPA/WPA2/WPA3 vulnerabilities, deauth attacks, and Evil Twin scenarios.
-
Evasion: Bypassing IDS/Firewalls and the role of Honeypots (Cowrie/Dionaea).
-
Hands-on: SQLi/XSS attacks in a safe environment (DVWA) and simulating Wi-Fi handshake capture.
Accreditation & Support
-
Financial Support: Fully supported by the Human Resources Development Fund (HADAF).
-
Local Accreditation: Bisha University – Mutqin for Professional Certificates.
-
International Accreditation: EC-Council, USA.
Program Specifications
-
Language: Arabic, with technical terminology in English.
-
Duration: 40 Training Hours / 8 Days.
-
Format: Online (Distance Learning).
Target Audience
-
Security professionals protecting systems and networks.
-
System Administrators in banks and corporate sectors.
-
Network Engineers and IT professionals.
-
Software Developers.
-
IT and Computer Science students/graduates.
Program Features
-
Internationally recognized curriculum from EC-Council.
-
High percentage of Hands-On lab training.
-
Mastery of over 20 industry-standard tools (Kali, Metasploit, Burp Suite, etc.).
-
Simulation of real-world attacks in a secure, isolated Cyber Range.
-
Full preparation for the international CEH exam (Knowledge & Practical).
-
Course title Certified Ethical Hacker CEHv13
-
Overall time 40 Hour
-
Overall days 8 Day
-
Course type
- Online
About course
Related courses
Online 4100
Online 3450
Online 1840
Online 4800
Online 7300
Online 5500
Online 3000
Online 1840
Online 2850
Online 1595
Online 3165
Online 2200
Online 2800
Online 2200
Online 1595
Online 3125
Online 2595
Online 1650
Online 2800
Online 1650
Online 1595
Online 2800
Online 2800
Online 2800
Online 2400
Online 7745
Online 13700
Online 5300
Online 2390
Online 8000
Online 16500
Online 8000
Online 8000
Online 8000
Online 8000
Online 30000
Online 30000
Online 8400
Online 3700
Online 1800
Online 3165