Course Overview
Overview
The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide. In its 12th version, the Certified Ethical Hacker provides comprehensive training, hands- on learning labs, practice cyber ranges for engagement, certification assessments, cyber
competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework.
Key Learning Outcomes
- Master the 5 Phases of Hacking: Gain hands-on expertise in the systematic process hackers use:
Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Clearing Tracks. - Modern Threat Defense: Learn to combat emerging threats, including Cloud vulnerabilities, IoT/OT attacks, and Fileless Malware.
- Advanced Tool Proficiency: Gain exposure to over 3,500 hacking tools and 500+ attack techniques in a live, virtualized “Cyber Range” environment.
- Vulnerability Analysis: Perform in-depth assessments using AI-powered tools and industry-standard scoring systems (CVSS) to prioritize risks.
- Perimeter Evasion: Learn how to test and bypass defensive controls like Firewalls, IDS/IPS, and Honeypots.
Course Outline
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service (DoS/DDoS)
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
Target Audience
- Information Security Professionals: Including Security Officers, Auditors, and Site Administrators.
- Network & Systems Personnel: Network Administrators, Engineers, and Analysts.
- Aspiring Ethical Hackers: Individuals looking to build a career in penetration testing and offensive security.
Exam Code
312-50
| 2026 CLASSES | |||||
|---|---|---|---|---|---|
| Jan | Feb | Mar | Apr | May | Jun |
| 12 – 16 | – | 9 – 13 | – | 18 – 22 | – |
| Jul | Aug | Sep | Oct | Nov | Dec |
| 13 – 17 | – | 21 – 25 | – | 9 – 13 | – |
Overview
The Certified Network Defender (CND) v2 is a “Blue Team” focused program that shifts the perspective from offensive hacking to proactive network defense. It is designed to equip IT professionals with the skills to protect, detect, and respond to network threats while also leveraging threat intelligence to predict attacks before they occur.
The v2 curriculum has been significantly upgraded to cover modern network challenges, including remote work security, IoT defense, and cloud infrastructure protection.
Key Learning Outcomes
- Adaptive Security Strategy: Master the four-step process of Protecting the network, Detecting anomalies, Responding to incidents, and Predicting future threats.
- Blue Team Tactics: Learn to implement a Defense-in-Depth strategy, ensuring that if one security layer fails, others are in place to protect the asset.
- Endpoint & Infrastructure Hardening: Gain hands-on experience in securing Windows, Linux, Mobile, IoT, and OT (Operational Technology) devices.
- Perimeter Defense: Master the configuration and management of Firewalls, IDS/IPS, and VPNs to create a secure network perimeter.
- Cloud & Virtualization: Learn specific security protocols for virtualized environments and major cloud platforms like AWS, Azure, and Google Cloud.
Course Outline
- Network Attacks and Defense Strategies
- Administrative Network Security (Policies & Compliance)
- Technical Network Security (Access Control & PKI)
- Network Perimeter Security
- Endpoint Security – Windows Systems
- Endpoint Security – Linux Systems
- Endpoint Security – Mobile Devices
- Endpoint Security – IoT Devices
- Administrative Application Security
- Data Security (Encryption & DLP)
- Enterprise Virtual Network Security
- Enterprise Cloud Network Security
- Enterprise Wireless Network Security
- Network Traffic Monitoring and Analysis
- Network Logs Monitoring and Analysis
- Incident Response and Forensics Investigation
- Business Continuity and Disaster Recovery
- Risk Anticipation with Risk Management
- Threat Assessment with Attack Surface Analysis
- Threat Prediction with Cyber Threat Intelligence
Target Audience
- Network Administrators & Engineers: Looking to add a security layer to their existing infrastructure skills.
- Security Analysts & Operators: Who need a deeper understanding of defensive network operations.
- Blue Team Aspirants: Professionals aiming for roles in a Security Operations Center (SOC).
Exam Code
312-38
| 2026 CLASSES | |||||
|---|---|---|---|---|---|
| Jan | Feb | Mar | Apr | May | Jun |
| 12 – 16 | – | 9 – 13 | – | 18 – 22 | – |
| Jul | Aug | Sep | Oct | Nov | Dec |
| 13 – 17 | – | 21 – 25 | – | 9 – 13 | – |
Overview
The Certified Penetration Testing Professional (CPENT) program is EC-Council’s most comprehensive and advanced penetration testing track. It is designed to bridge the gap between “flat-network” testing and the complex, segmented environments found in modern enterprises. CPENT teaches you how to perform a full-scope penetration test by attacking, exploiting, evading, and pivoting through multiple network zones. A unique feature of this program is its dual-certification outcome: candidates who perform exceptionally well (scoring 90% or above) earn both the CPENT and the prestigious LPT (Master) credential with a single exam.
Key Learning Outcomes
- Advanced Pivoting & Lateral Movement: Learn the latest techniques to move between segmented networks, including single and double pivoting to reach hidden targets.
- IoT & OT Penetration Testing: Master the skills to search for, gain access to, and perform firmware reverse engineering on IoT and Industrial Control Systems (ICS/SCADA).
- Binary Analysis & Exploitation: Move beyond tools by learning to write your own exploits, perform fuzzing, and conduct binary exploitation using assembly language.
- Active Directory Attacks: Deep dive into Windows Domain security, including PowerShell bypasses and Kerberos attacks (Golden/Silver Tickets).
- AI-Driven Pentesting: Learn to leverage AI tools to automate reconnaissance, enhance vulnerability discovery, and accelerate the reporting process.
Course Outline
- Introduction to Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement
- Open-Source Intelligence (OSINT)
- Social Engineering Penetration Testing
- Network Penetration Testing – External
- Network Penetration Testing – Internal
- Network Penetration Testing – Perimeter Devices
- Web Application Penetration Testing
- Wireless Penetration Testing
- IoT Penetration Testing
- OT/SCADA Penetration Testing
- Cloud Penetration Testing
- Binary Analysis and Exploitation
- Report Writing and Post-Testing Actions
Target Audience
- Ethical Hackers: Looking to advance beyond the CEH level.
- Penetration Testers: Seeking a rigorous, hands-on validation of their end-to-end skills.
- Security Analysts & Engineers: Responsible for assessing enterprise-scale risks.
- LPT (Master) Aspirants: Professionals aiming for the highest tier of penetration testing certification.
Exam Code
412-79
| 2026 CLASSES | |||||
|---|---|---|---|---|---|
| Jan | Feb | Mar | Apr | May | Jun |
| – | 23 – 27 | – | 13 – 17 | – | 8 – 12 |
| Jul | Aug | Sep | Oct | Nov | Dec |
| – | 10 – 14 | – | 5 – 9 | – | 7 – 11 |