Certified Ethical Hacking (CEH v12) Training

This course is ideal for IT professionals and aspiring ethical hackers with basic IT knowledge. Its intermediate difficulty is perfect for those seeking to advance their cybersecurity career or earn the CEH certification.

4.9 | 400 Reviews
feature image

4.7

4.8

4.8

Course Includes

Course Overview

The Certified Ethical Hacker (CEH) v12 course is your comprehensive guide to mastering ethical hacking and cybersecurity. This program equips you to identify vulnerabilities, defend against threats, and secure digital infrastructures. Through hands-on practice, you’ll learn tools, techniques, and methodologies used by ethical hackers to protect systems and networks.

This course is ideal for IT professionals and aspiring ethical hackers with basic IT knowledge. Its intermediate difficulty is perfect for those seeking to advance their cybersecurity career or earn the CEH certification.

 

Course Outline

 

What is your return policy?

We offer a 30-day return policy from the date of purchase.

Do I need a receipt to return an item?

Yes, a valid receipt or proof of purchase is required.

Can I return online purchases in store?

Yes, online purchases can be returned in any of our physical stores.

How long does shipping take?

Standard shipping typically takes 3–5 business days.

Do you ship internationally?

Yes, we ship to most countries worldwide. Additional charges may apply.

Which countries are excluded?

We currently do not ship to embargoed countries or regions with postal restrictions.

Introduction to Ethical Hacking

Introduction to Ethical Hacking and Its Importance
Understanding the Various Phases of Ethical Hacking Methodology
Ethics and Legal Considerations in Ethical Hacking
Footprinting and Reconnaissance

Gathering Information About Targets and Their Networks
Techniques for Footprinting, Such as DNS Queries, Social Engineering, and WHOIS Lookups
Tools and Methodologies for Reconnaissance
Scanning Networks

Understanding Different Scanning Techniques and Their Purposes
Active and Passive Scanning Methods
Conducting Network Scans Using Tools Like Nmap, Nessus, and Wireshark
Enumeration

Techniques for Gathering Information
Enumerating Network Protocols and Their Vulnerabilities
Enumeration Tools and Methodologies
Vulnerability Analysis

Identifying and Analyzing System Vulnerabilities
Vulnerability Scanning Tools and Techniques
Common Vulnerabilities and Exposures (CVE) Databases
System Hacking

Techniques For Gaining Unauthorized Access to Systems
Exploiting System Vulnerabilities, Weak Configurations, and Misconfigurations
Password Cracking, Privilege Escalation, and Backdoor Creation
Malware Threats

Understanding Various Types of Malware (Viruses, Worms, Trojans, Ransomware, Etc.)
Analyzing and Reverse-engineering Malware Samples
Detection and Mitigation Strategies for Malware Attacks
Sniffing

Understanding Network Sniffing Techniques and Protocols
Tools and Countermeasures for Sniffing Detection and Prevention
Analyzing Captured Network Traffic
Social Engineering

Psychological Manipulation Techniques Used for Social Engineering Attacks
Pretexting, Phishing, Baiting, and Other Social Engineering Methods
Mitigation Strategies and Awareness for Social Engineering Attacks
Denial-of-Service (DoS) Attacks

Understanding Dos and Distributed Dos (DDoS) Attacks
Techniques And Tools for Conducting Dos Attacks
Mitigation Strategies and Countermeasures
Session Hijacking

Understanding Session Hijacking Techniques and Their Implications
Man-in-the-middle (MitM) Attacks, Asension Hijacking Tools, and Countermeasures
Protecting Session Integrity and Confidentiality
Evading IDS, Firewalls, and Honeypots

Techniques for Evading Intrusion Detection Systems (IDS), Firewalls, and Honeypots
Firewall and IDS Evasion Tools and Methods
Identifying and Countering Honeypots
Hacking Web Applications

Web Application Vulnerabilities and Their Exploitation
Injection Attacks, Cross-site Scripting (XSS), and Other Web Application Attacks
Web Application Security Best Practices
SQL Injection

Understanding SQL Injection Attacks and Their Impact
Techniques for Exploiting SQL Vulnerabilities
Mitigating SQL Injection Attacks
Wireless Network Hacking

Wireless Network Vulnerabilities and Weaknesses
Wi-Fi Hacking Techniques, Tools, and Countermeasures
Securing Wireless Networks
Mobile Platform Hacking

Mobile Device Vulnerabilities and Security Risks
Techniques for Exploiting Mobile Platforms and Applications
Mobile Device Security Best Practices
IoT (Internet of Things) Hacking

IoT Security Challenges and Vulnerabilities
Hacking IoT Devices, Protocols, and Applications
IoT Security Considerations and Best Practices
Cloud Computing

Cloud Computing Security Risks and Challenges
Assessing and Securing Cloud Infrastructure and Services
Cloud Security Best Practices
Cryptography

Basics of Cryptography and its Importance in Security
Cryptographic Algorithms, Protocols, and their Vulnerabilities
Implementing Secure Cryptographic Practices
Penetration Testing

Introduction to Penetration Testing and its Methodologies
Planning, Conducting, and Reporting on Penetration Tests
Tools and Frameworks for Penetration Testing
Got a Custom Requirement?

"*" indicates required fields

Name**
This field is for validation purposes and should be left unchanged.

Fill the form to reach us

Data Privacy Policy

  1. Introduction

TM SQUARE TECHNOLOGY SOLUTIONS (“we,” “our,” “us”) is committed to protecting the privacy and security of the personal data of our users, clients, and visitors. This Privacy Policy outlines how we collect, use, disclose, and safeguard your information in accordance with Indian law, particularly the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.

  1. Information We Collect

We may collect the following personal information:

  • Name, email address, contact number
  • Educational qualifications
  • Company/Organization details
  • Billing and payment details
  • IP address and device/browser information (for website analytics)
  1. Purpose of Data Collection

We collect your data to:

  • Register you for our training programs
  • Process payments and issue receipts
  • Communicate course updates and reminders
  • Comply with legal obligations
  • Improve our services and user experience
  1. Consent

By accessing our website or enrolling in our services, you explicitly consent to the collection and use of your personal data as outlined in this policy.

  1. Data Sharing & Disclosure

We do not sell your personal data. We may share it with:

  • Payment gateways (e.g., Razorpay, PayU)
  • Third-party service providers strictly for training delivery or support
  • Governmental authorities, if legally required
  1. Data Security

We implement reasonable security practices, including:

  • Encryption of sensitive data
  • Secure servers with restricted access
  • Regular audits and compliance reviews
  1. User Rights

You have the right to:

  • Access and correct your data
  • Withdraw consent at any time
  • Request deletion of your information, subject to legal obligations
  1. Cookies

Our website may use cookies to improve your browsing experience. You can control or disable cookies through your browser settings.

  1. Contact Us

For queries or concerns regarding this policy, email us at: info@tmsquare.co

Terms & Conditions

  1. Acceptance of Terms

By accessing this website or availing our services, you agree to comply with these Terms and Conditions, including our Privacy Policy.

  1. Services Offered

TM SQUARE TECHNOLOGY SOLUTIONS offers training programs to professionals in technical and managerial domains. Course content, delivery mode, and certification details will be as per the information provided on our website or brochures.

  1. Payments & Refunds
  • All course fees are payable in advance via secure online payment.
  • Refunds will only be processed in accordance with our Refund Policy.
  • TM SQUARE TECHNOLOGY SOLUTIONS reserves the right to cancel or reschedule training due to unforeseen circumstances.
  1. Intellectual Property

All training content, including videos, slides, and documents, are the intellectual property of TM SQUARE TECHNOLOGY SOLUTIONS. You may not reproduce, distribute, or share any content without prior written permission.

  1. User Conduct

You agree not to:

  • Engage in plagiarism or unauthorized distribution of course material
  • Misuse the platform in any way that disrupts its services
  • Provide false information during registration
  1. Limitation of Liability

We are not liable for:

  • Technical interruptions or delays beyond our control
  • Job placement outcomes post-training
  • Any indirect damages arising from service use
  1. Governing Law

These terms are governed by the laws of India. Disputes will be subject to the exclusive jurisdiction of courts located in Bengaluru, India.

  1. Amendments

We reserve the right to update these Terms and Privacy Policy at any time. Continued use of our services post-changes implies acceptance of the revised terms.