Ethical Hacking Instructor-Led Training

Join our instructor-led ethical hacking training to prepare for the CEH exam and learn how to scan, hack, and secure systems.

Circular Pattern
Centered Image

About This Class

Important: uCertify is an independent training provider. We do not own, administer, or have any control over the certification exams themselves.

Learn directly from uCertify instructors in this Ethical Hacking training course and build real-world skills in ethical hacking, system defense, and vulnerability analysis. Stuck at a concept? Ask your instructor.

Can't complete a lab? Ask your instructor.

Getting a question wrong repeatedly? Ask your instructor.

Aligned with the EC-Council CEH (312-50) exam, this expert-led training helps you reskill with hands-on practice in reconnaissance, system hacking, social engineering, cryptography, and more. You'll explore key domains like malware threats, denial of service, web and wireless attacks, and cloud security.

With a strong focus on labs, frameworks like MITRE ATT&CK and PTES, and exam prep strategies, this instructor-led class is your guided path to becoming a Certified Ethical Hacker.

Target Audience

Students

Non-IT professionals

Tech-adjacent workers

Experience Level

Intermediate to Expert-level

Prerequisites

2 years of work experience in the information security field

Concept Help Image

Explore your next online class schedule.

Class
Date
Action
Ethical Hacking Instructor-Led Training
Pattern

What Do You Get?

  • Real-time interaction and feedback with instructors
  • Hands-on Labs for practical application
  • Gamified TestPrep tailored to their needs

Training Essentials

  • Estimated Completion Time: 3 Weeks
  • Methodology: Online, Instructor-Led
  • Level: Beginner-friendly
Pattern

JOB Roles You Can Apply For

Ethical Hacker
 Penetration Tester
 Cybersecurity Analyst
 Network Security Administrator
 Information Security Specialist
Pattern

Components Available

Hands-on Labs

72+ LiveLab | 07:29+ Hours

Interactive lessons

12+ Interactive Lessons | 540+ Exercises | 312+ Quizzes | 251+ Flashcards | 251+ Glossary of terms

Video lessons

07:29+ Hours

Skills You'll Gain

Ethical Hacking Techniques
 Vulnerability Assessment and Exploitation
 Network Scanning and Enumeration
 Malware Analysis and Social Engineering
 Web Application and Wireless Network Attacks
 IDS/Firewall Evasion and Cryptographic Attacks
Pattern
Pattern
Lesson Plan

    • Goals and Methods
    • Who Should Read This Course?
    • Strategies for Exam Preparation
    • How This Course Is Organized

    • Security Fundamentals
    • Security Testing
    • Hacking Methodologies and Frameworks
    • Hacking Concepts - Hacker and Cracker Descriptions
    • Ethical Hacking Concepts – Ethical Hackers
    • Test Plans—Keeping It Legal
    • Ethics and Legality
    • Summary
    • Review All Key Topics
    • Exercises

    • The Hacking Process
    • The Ethical Hacker’s Process
    • Information System Security Assessment Framework (ISSAF)
    • Penetration Testing Execution Standard (PTES)
    • MITRE ATT&CK Framework
    • Information Security Systems and the Stack
    • Summary
    • Review All Key Topics
    • Exercises

    • Footprinting
    • Scanning
    • Summary
    • Review All Key Topics
    • Exercises

    • Enumeration
    • System Hacking Phases and Attack Techniques
    • Establishing persistence
    • Summary
    • Review All Key Topics
    • Exercise

    • Social Engineering
    • Malware Threats
    • Vulnerability Analysis
    • Summary
    • Review All Key Topics
    • Exercises

    • Sniffers
    • Session Hijacking
    • Denial of Service (DoS) and Distributed Denial of Service (DDoS)
    • Summary
    • Review All Key Topics
    • Exercises

    • Web Server Hacking
    • Web Application Hacking
    • Database Hacking
    • Summary
    • Review All Key Topics
    • Exercise

    • Wireless and Mobile Device Technologies
    • Wi-Fi
    • Signs of Router/WiFi Hacking
    • Prevent WiFi Hacking
    • WiFi Hacked - what do do?
    • Summary
    • Review All Key Topics
    • Questions

    • Intrusion Detection and Prevention Systems
    • Firewalls
    • Evading NAC and Endpoint Security
    • Mitigation for NAC Evasion
    • IDS/Firewall Evasion Countermeasures
    • Honeypots
    • Summary
    • Review All Key Topics

    • Cryptography History and Concepts
    • Encryption Algorithms
    • Public Key Infrastructure
    • Email and Disk Encryption
    • Cryptoanalysis Tools and Attacks
    • Security Protocols and Countermeasures
    • Summary
    • Review All Key Topics
    • Exercises

    • Cloud Computing
    • Cloud Security
    • IoT
    • Botnets
    • Summary
    • Review All Key Topics
Hands-on Labs

  • Taking a Full Backup
  • Taking an Incremental Backup
  • Examining Security Policies
  • Searching for Exposed Passwords

  • Examining MITRE ATT&CK
  • Analyzing Captured Packets Using a Sniffer
  • Using the tracert Command

  • Performing Passive and Active Reconnaissance
  • Using the whois Program
  • Footprinting a Website
  • Using the curl Command
  • Performing Nmap Scanning

  • Performing Enumeration Using enum4linux, nbtscan, and Nmap Scripts
  • Converting an NTFS Partition to FAT32
  • Managing NTFS Permissions
  • Detecting Rootkits
  • Viewing Syslog for Monitoring Logs
  • Cracking a Linux Password Using John the Ripper
  • Cracking Passwords Using Cain and Abel

  • Performing a Phishing Attack
  • Using Process Explorer
  • Analyzing Malware Using MetaDefender
  • Analyzing Malware Using VirusTotal
  • Generating SHA
  • Analyzing the WannaCry Ransomware Attack
  • Creating RAT
  • Understanding Keyloggers and Spyware
  • Using the Windows Defender Antivirus
  • Performing Vulnerability Scanning Using OpenVAS
  • Conducting Vulnerability Scanning using Nessus

  • Configuring DHCP Snooping
  • Using TCPdump to Capture Packets
  • Performing ARP Spoofing
  • Spoofing a MAC Address
  • Performing Session Hijacking Using Burp Suite
  • Simulating a DDoS Attack

  • Exploring ExploitDB and GHDB
  • Performing a Client-Side Attack Using BeEF
  • Fuzzing Using OWASP ZAP
  • Exploiting Windows 7 Using Metasploit
  • Grabbing a Screenshot of a Target Machine Using Metasploit
  • Defending Against a Buffer Overflow Attack
  • Conducting a Cross-Site Request Forgery Attack
  • Attacking a Website Using XSS Injection
  • Performing SQL Injection in DVWA

  • Setting a Secure Passcode on iPhone
  • Setting a Data-Usage Limit
  • Installing App and Configuring Permissions Settings
  • Performing Factory Reset on a Android Phone
  • Connecting a Printer to a Laptop via Bluetooth
  • Connecting an iPhone to a Laptop via Bluetooth
  • Connecting an iPhone to Wi-Fi
  • Implementing MFA on Mobile Devices
  • Updating iPhone iOS and Security Patches
  • Creating a Home Wireless Network
  • Securing a Wi-Fi Hotspot

  • Implementing IDS and IPS
  • Using the Hping Tool
  • Configuring NAT
  • Configuring a Network Firewall
  • Setting Up a Honeypot

  • Encrypting and Decrypting a File Using OpenSSL
  • Performing Symmetric and Asymmetric Encryption
  • Adding a Digital Certificate
  • Examining PKI Certificates
  • Implementing PGP for Secure Email and File Encryption
  • Using a Digital Signature
  • Hiding Text using Steganography
  • Observing an MD5-Generated Hash Value
  • Observing a SHA256-Generated Hash Value

  • Creating a CI/CD Pipeline
  • Creating an IoT Hub in Azure

Frequently Asked Questions

Have questions? We’ve got answers.

  • No, you don't need to be a programmer to become a competent ethical hacker and achieve Certified Ethical Hacker (CEH) certification. While basic scripting skills in languages like Python, Bash, or PowerShell can help automate tasks, CEH itself doesn't require coding.

  • Ideally, you should have at least two years of experience in information security. Alternatively, foundational certifications like CompTIA A+, Network+, or Security+, and hands-on Linux, networking, and security tool experience, will set you up well.

  • Yes, CEH is considered suitable for beginners, especially those who pair the training with foundational knowledge or entry-level IT experience. It's an excellent stepping-stone into hacking and cybersecurity careers.

  • Live, instructor‑led ethical hacking training gives you access to expert guidance in real time. Ask questions, get immediate feedback on labs, and benefit from hands‑on exercises. All of which helps you learn faster and retain more than self‑paced study.

  • Yes, this class includes live demonstrations of tools, methodologies, frameworks like MITRE ATT&CK and PTES, and labs covering penetration testing techniques, malware analysis, DOS attacks, web application exploits, and more.