Template id = 976
Document id = 23176
Parent id = 23150

Certified Ethical Hacker – CEH v12

Become a Certified Ethical Hacker in 5 days (incl. the official CEH v12 exam of EC-Council). To beat a hacker, you need to think like a hacker!

Certified Ethical Hacker (CEH) v12 – mode of study

Option 1: 5-day training (in-class and live online)
Option 2: In-company training

Why become a Certified Ethical Hacker (CEH)?

Certified Ethical Hacker - IMF AcademyA (certified) ethical hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A certified ethical hacker understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, certified ethical hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. To beat a hacker, you need to think like a hacker!

Why is CEH in demand globally?

Certified Ethical Hacker (CEH) is the most trusted and desired information security certification and is recommended by employers globally. CEH represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.

What is new in CEH version 12?

CEH v12 covers more than 500 new threats and vulnerability scenarios. These include but are not limited to APT, fileless malware, web API threats, webhooks, web shell, OT attacks, cloud attacks, AI, ML and much more. CEH v12 now includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more.

About the CEH exam

The Certified Ethical Hacker (CEH) exam is a 4-hour exam with 125 multiple choice questions. This knowledge-based exam will test your skills in information security threats and attack vectors, attack detection, attack prevention, procedures, methodologies and more.

P.S.  Should you not pass the CEH exam the first time, you may reattend the CEH training for free (within a period of 1 year). We also offer you 2 resits free of charge!

Who should be CEH trained and certified?

This official EC-Council accredited CEH training is a must for (aspiring) ethical hackers; system and network administrators; information systems security engineers and managers; IT auditors; information security analysts and administrators; information security professionals and officers; Information Assurance (IA) security officers; risk/threat/vulnerability analysts and many other security professionals.

About EC-Council

EC-Counsil - IMF AcademyEC-Council is the world's largest cyber security technical certification body and operates in more than 145 countries globally. EC-Council has trained and certified over 200,000 information security professionals worldwide. EC-Council is the owner and developer of a.o. the worldwide known Certified Ethical Hacker (CEH) certification, the C/CISO (Certified Chief Information Security Officer) certification and the Certified Threat Intelligence Analyst (C/TIA) certification.

Also interesting!

The following trainings could be interesting/relevant for you and/or your colleagues too:


With at least 5 participants, an in-house training could be your best choice. An in-company training, customized to the needs of your organization, has many advantages and:

  • saves you and your colleagues time
  • enables you to be trained in the comfort of your own working environment
  • saves travel and accommodation costs
  • can be arranged at a time convenient for you
  • sensitive issues can be discussed openly since no outsiders are present

Would you prefer an in-company training? Please contact us for more information. We are more than happy to discuss the various possibilities with you!


CEH is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines.

1. Introduction to Ethical Hacking
Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

2. Foot Printing and Reconnaissance
Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.

3. Scanning Networks
Learn different network scanning techniques and countermeasures.

4. Enumeration
Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.

5. Vulnerability Analysis
Learn how to identify security loopholes in a target organization's network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools.

6. System Hacking
Learn about the various system hacking methodologies - including stenography, steganalysis attacks, and covering tracks - used to discover system and network vulnerabilities.

7. Malware Threats
Learn different types of malware (Trojan, virus, worms, etc.), APT and fileless malware, malware analysis procedure, and malware countermeasures.

8. Sniffing
Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

9. Social Engineering
Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

10. Denial-of-Service
Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

11. Session Hijacking
Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

12. Evading IDS, Firewalls, and Honeypots
Get introduced to firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

13. Hacking Web Servers
Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

14. Hacking Web Applications
Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.

15. SQL Injection
Learn about SQL injection attacks, evasion techniques, and SQL injection countermeasures.

16. Hacking Wireless Networks
Understand different types of wireless technologies, including encryption, threats, hacking methodologies, hacking tools, Wi-Fi security tools, and countermeasures.

17. Hacking Mobile Platforms
Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

18. IoT and OT Hacking
Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.

19. Cloud Computing
Learn different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools.

20. Cryptography
Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Request brochure


When you successfully pass the official EC-Council Certified Ethical Hacker exam you will earn the official CEH title.


Your instructor is a very experienced EC-Council accredited and certified CEH trainer.

Start date(s)

The CEH training lasts for 5 days, in-class and remote/live online (up to your choice). The training will be organized close to Amsterdam, almost every month! You can join the training on the following dates:

  • 8 - 12 January 2024
  • 12 - 16 February 2024
  • 4 - 8 March 2024
  • 8 - 12 April 2024
  • 12 - 17 May 2024
  • 17 - 21 June 2024

Fee / Registration

The fee of the CEH training is € 3,995. The fee includes all lunches, coffee/tea, the official EC-Council study guide, a toolkit and a voucher for the CEH exam. You can join the in-class training or attend live online. Should you fail to pass the CEH exam the first time, you may re-attend the CEH training (within a period of 1 year) for free. We also offer you 2 resits free of charge!!

Step 1/4: Your selection *

Terms & conditions
In case you are not able to attend, delegate substitution may be made up until 3 days before the start date of the CEH training without any additional charge. Cancellation (only in writing) will be accepted up to 4 weeks prior to the starting date of the CEH training:
For cancellations up to 4 weeks before the start of the training, we will charge € 95 for administration costs plus the costs for already received training materials
For cancellations between 4 and 2 weeks before the start of the training, we will charge 25% of the training fee, € 95 for administration costs plus the costs for already received training materials
For cancellations within 2 weeks before the start of the training, we will charge 75% of the training fee, € 95 for administration costs plus the costs for already received training materials.
Payment of training fees must be received within 30 days of the invoice date, though always before the start of the CEH training.

Certified Ethical Hacker – CEH v12

Register! Brochure IN-COMPANY