الـــــهــاكـــــــر الأخــــــــــلاقـــــــي الــــمــــعــــتـــــــمــــــــد
Certified Ethical Hacker | CEH
70 ساعة
70 ساعة
Course Overview:
The Certified Ethical Hacker (CEH) course provides students with the knowledge and applied skills required to assess security risks, identify vulnerabilities, and implement countermeasures across modern digital infrastructures. With coverage of the five phases of ethical hacking—reconnaissance, scanning, gaining access, maintaining access, and covering tracks—this course integrates current tools, techniques, and AI-driven methods used by today’s attackers and defenders. Students will learn to evaluate threats across traditional networks, applications, and emerging environments such as IoT, cloud, and operational technology. Practical lab-based training ensures that participants gain hands-on experience with real-world attack scenarios, preparing them for both the CEH certification exam and professional roles in penetration testing, threat analysis, and cybersecurity defense.
Learning Objectives:
By the end of this course, students will be able to:
• Explain the role of ethical hackers and the legal and ethical implications of penetration testing.
• Perform reconnaissance, scanning, enumeration, and vulnerability analysis using industry-standard and AI-enhanced tools.
• Identify, exploit, and secure vulnerabilities in operating systems, networks, and applications.
• Recognize and mitigate threats such as malware, ransomware, sniffing, social engineering, denial-of-service, and session hijacking.
• Bypass security defenses including IDS/IPS, firewalls, EDR, and honeypots while applying appropriate countermeasures.
• Conduct attacks on web servers, web applications, and databases, addressing OWASP Top 10 risks such as injection, XSS, and insecure design.
• Assess and exploit wireless networks, mobile platforms, IoT systems, cloud infrastructures, and OT/SCADA environments.
• Analyze and defend against AI system threats including prompt injection, data poisoning, and model theft.
• Apply cryptographic techniques, evaluate cryptographic weaknesses, and understand emerging post-quantum considerations.
What You Will Learn:
• Introduction to Ethical Hacking – Principles, compliance, and legal considerations
• Footprinting & Reconnaissance – OSINT, active/passive information gathering, AI-assisted recon
• Scanning Networks – Port scanning, service detection, vulnerability identification
• Enumeration – Extracting system details, users, and network resources
• Vulnerability Analysis – Tools, frameworks, and CVSS-based assessment
• System Hacking – Privilege escalation, persistence, covering tracks, steganography
• Malware & Ransomware Threats – Trojans, worms, fileless malware, countermeasures
• Sniffing & Social Engineering – Packet capture, phishing, deepfake-enabled social engineering
• Denial-of-Service Attacks – DoS/DDoS techniques and mitigation strategies
• Session Hijacking – Exploiting active sessions and defensive techniques
• Evading IDS, Firewalls & Honeypots – Bypassing and defeating defensive technologies
• Hacking Web Servers & Applications – Exploiting vulnerabilities, OWASP Top 10 coverage
• SQL and NoSQL Injection – Advanced database exploitation and defenses
• Hacking Wireless Networks – Wi-Fi exploitation, rogue access points, and defenses
• Hacking Mobile Platforms – Android and iOS vulnerabilities, app exploitation
• IoT and OT/SCADA Hacking – Emerging threats to connected and industrial systems
• Cloud Security – Attacks on cloud services, containers, and serverless platforms
• AI Security – Attacks on AI systems including prompt injection and model theft
• Cryptography – Encryption, cryptanalysis, PKI, TLS/SSL attacks, and post-quantum cryptography