Certified Ethical Hacker Program


CyberSecurity 3 web


Certified Ethical Hacker Program

Course Fee** Duration Days*
AED 8,400 5-7 hrs per week/8 weeks Every Monday
(Excluding VAT)      
Next Starting Date** Qualification Usual Timings*
Open Enrollment Certified Ethical   Self-paced
  Hacker Program  
  Certificate Age group 
Delivery Method  Language  Adults
Distance Learning   English  


* These times are based on how the course has been run in the past and are subject to change before each start date. 
**To reserve a seat or for any inquiries, please contact: enquire@saedubai.com  | +971 4 360 6456  


About This Course

This course helps you prepare for EC-Council’s Certified Ethical Hacker – CEH v10 certification exam 31250-. The examination is 4 hours long, consists of 125 multiple choice questions and the passing score is 70%.

The CEH Certification is approved under the DoD 8570 Directive for the CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, and CSSP Incident Responder categories. The Certified Ethical Hacker (CEH) EC Council credentialing and training program provided by the Mission Critical Institute is a respected and trusted ethical hacking program in the industry.

Ethical hacking is where an IT professional uses the same hacking techniques as malicious hackers to protect and prevent a company’s systems from falling into the hands of
criminals. Put simply, the statement at the core of CEH is; ‘to stop a hacker you need to think like a hacker’. By the end of the journey to obtain your CEH, you’ll know what tools do what job, how to use the tools properly and how to conduct an ethical penetration test.


Who it's for

The CEH is not for cybersecurity beginners. CEH is tailored for early to mid-career IT, cyber and/or physical security professionals. The target persona should have a minimum of 2 years of information security related work and preferably, and bachelor’s degree. The candidate should have security experience in design, engineering, implementation, and/or management.


Course Outline

  • Footprint and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Evading IDS, Firewalls and Honeypots Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography